Search Results for "computer weekly BCS Wiley book extractstart=10start=20start=30start=30"
-
Computer Weekly – 11 June 2019: Are schools delivering on digital skills?
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we look at the differing approaches to teaching computer science across the UK and assess the pros and cons of each. Our latest buyer's guide examines the technologies and best practices of multicloud environments. And we find out what you get for your money when buying cyber insurance. Read the issue now.
-
Zscaler ThreatLabz State of Encrypted Attacks Report
Sponsored by: ZscalerEncrypted attacks grew 24.3% year-over-year, with malware, ad spyware sites, and phishing making up 99% of threats. Education and government saw the largest increases. Learn how to defend against these evolving encrypted threats in the Zscaler ThreatLabz State of Encrypted Attacks Report.
-
Key Considerations for Securing Different Non-human Identities
Sponsored by: CyberArkToday's enterprises are powered by a wide variety of non-human identities. And these non-human identities use secrets to access the critical systems they need to do to their jobs. In this eBook, CyberArk walks through the seven types of non-human identities that need to be secured and how a centralized approach to secrets management can help.
-
CW Buyer's Guide to 5G mobile networking
Sponsored by: TechTarget ComputerWeekly.com5G mobile networking has the potential to propel business into the future. In this 17-page buyer's guide, Computer Weekly looks at how to optimise 5G, the advantages of advanced communications and what Télécoms Sans Frontières has achieved through harnessing it.
-
MicroScope: The digital transformation
Sponsored by: MicroScopeThe phrase might be one that gets over used at conferences and in pitches but it refers to something that is really happening and to revenue opportunities that are emerging right now. This e-guide will share some of the recent developments in the channel and the latest thoughts about the issue.
-
How to Choose a Background Check Provider for Hiring at Scale
Sponsored by: CheckrIn a tight labor market, choosing the wrong background screening provider could be a costly mistake. This guide shares five ways the best background check partner can help you get ahead in your hiring market—plus the questions you need to ask and must-have solutions when choosing a provider.
-
Calculating ROI of DCIM Monitoring for Distributed IT Sites
Sponsored by: Schneider ElectricIn this white paper, discover a framework and a tool for quantifying DCIM value to help justify investment in DCIM monitoring and alarming functions.
-
APAC 2021 Salary Survey Results
Sponsored by: TechTarget ComputerWeekly.comInside this guide, you'll find an overview of the career and salary trends we're seeing in APAC as well as a breakdown of the results from ANZ, ASEAN and India so you can see for your location which job functions are getting paid what, what IT professionals are thinking in terms of career, and their salary expectations for the next 12 months.
-
Computer Weekly – 4 October 2022: Putting APIs to work
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, our latest buyer's guide looks at application programme interfaces (APIs) and how they can connect internal and external business processes. We examine the challenges and opportunities of using AI in healthcare. And we find out how retailers are turning to specialist apps to reduce food waste. Read the issue now.
-
How To Deploy A Password Policy
Sponsored by: Specops SoftwareThis white paper provides an end-to-end guide for rolling out a new password policy in your organization. Learn how to plan, set up, deploy, and communicate the policy to keep your Active Directory secure. Download the white paper to get started.