ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "computer weekly BCS Wiley book extractstart=10start=20start=30start=10start=30"

  • Cyber Help (And Hope) For K-12 Targets

    Sponsored by: SonicWall

    Because K–12 systems usually employ fewer cybersecurity experts than other industries, they are a prime target for cybercriminals. So, how can K–12 environments improve security? For guidance, check out this 8-page white paper.

  • A Computer Weekly buyer's guide to containerisation in the enterprise

    Sponsored by: TechTarget ComputerWeekly.com

    Containerisation is becoming a key part of IT strategy. In this 12-page buyer's guide, Computer Weekly looks at how it can help businesses in a post-pandemic world, assesses the main considerationsfor Kubernetes backup and discusses how to manage enterprise-class containerisation.

  • Inside India: The world's IT powerhouse

    Sponsored by: TechTarget ComputerWeekly.com

    The Covid-19 pandemic is turning out to be a big fork in the road for many companies. But what about the industry that keeps the lights on for them?

  • CHAPTER 1: Preparing for the Exam

    Sponsored by: McGraw Hill

    The Project Management Professional (PMP) and the Certified Associate in Project Management (CAPM) exams are a reliable way to help validate your project management skillset. With this exam prep guide, learn how to qualify for the PMP and the CAPM certification and create a strategy to pass the exam. Get started here.

  • Navigating The Paths Of Risk The State of Exposure Management in 2024

    Sponsored by: XM Cyber

    In 2023, the XM Cyber Continuous Exposure Management (CEM) platform uncovered more than 40 million exposures. To access 7 key findings that these exposures illuminated, and to deepen your understanding of the state of exposure management in 2024, dig into this research report.

  • A Computer Weekly buyer's guide to zero-trust security

    Sponsored by: TechTarget ComputerWeekly.com

    Zero trust is a conceptual architectural model that uses microperimeters and microsegmentation to secure corporate networks. In this 12-page buyer's guide, Computer Weekly looks at why trust should be considered a security risk and the need for additional authentication strategies to have an appropriate level of security.

  • The State of Cybersecurity in Healthcare

    Sponsored by: CyberMaxx

    To deepen your understanding of the state of cybersecurity in the healthcare industry, and to learn about 3 major security risks, download this 8-page white paper.

  • 2018/19 Salary Survey Results - UKI

    Sponsored by: TechTarget ComputerWeekly.com

    In the results of Computer Weekly's 2018 Salary Survey, we get a snapshot of what IT professionals in the UK and Ireland are getting paid, as well as their attitudes towards work, training and future prospects.

  • Cyber Security: 2021 Worst in Show

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide: Throughout 2021, there has been a strong focus worldwide on how to combat cyber security attacks for most businesses. In this e-guide we take a look at the best of the worst of those attacks to happen throughout January to June this year and how businesses can learn/adapt from these attacks.

  • Business transformation through application modernization in the cloud

    Sponsored by: AWS

    The eBook “Unleash the Power of Generative AI: Build Better Applications, Faster” describes how companies and their application developers can overcome the barriers to generative AI adoption by leveraging AWS tools and services.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.