ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "computer weekly BCS Wiley book extractstart=10start=20start=30start=30"

  • UNIT 42 Managed Services Threat Report Summary

    Sponsored by: Palo Alto Networks

    The MITRE Engenuity Unit 42 team identified a sophisticated attack involving APT10 and BlackCat groups. The report details the attack vectors, malware analysis, and recommendations to enhance your security posture. Read the full report to understand the impact and mitigate the risk of similar attacks.

  • Implementing GenAI: Use cases & challenges

    Sponsored by: TechTarget ComputerWeekly.com

    The use cases of generative AI are wide-ranging and have the potential to impact nearly all areas in business and IT. In this e-guide on generative AI, learn how to put the technology to work in business applications, DevOps and IT, as well as manage implementation challenges and risks.

  • The Secure Coding Handbook

    Sponsored by: Veracode

    This 31-page eBook provides a roadmap to secure coding in practice. Inside, find a deep dive into common software vulnerabilities, how hackers exploit them, what you need to know to prevent a breach, and more.

  • The 2024 Technology Trends Report

    Sponsored by: Upstack, Inc.

    This report is a powerful glimpse into the future of the changing IT landscape informed by insights gleaned from UPSTACK's leading technology experts.

  • Information Security and Compliance Future Trends 2024

    Sponsored by: Cloudflare

    Explore how regulation, sophisticated attacks, and AI will shape security spending in the near future. Learn about the latest trends in API security, data privacy, identity management, and more. Download this comprehensive analyst report to stay ahead of the evolving cybersecurity landscape.

  • Computer Weekly – 4 July 2017: Be better connected in a wireless world

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we look at the latest developments in wireless technology and how to deliver secure and reliable wireless networks. We examine Microsoft's PowerShell scripting language to understand why it's such an important tool. And we ask CIOs what it's like to cross the divide and work for IT suppliers. Read the issue now.

  • CW500: Key trends for IT leaders in 2017 – skills, careers and recruitment

    Sponsored by: TechTarget ComputerWeekly.com

    A look forward to the 12 months ahead for IT leaders and the key trends of the coming year - this presentation came from Chris Chandler, head of executive search at La Fosse Associates, discussing the skills, recruitment and career development issues affecting IT leaders.

  • Explore the CMS interoperability and prior authorization rule

    Sponsored by: ZeOmega

    The CMS Interoperability and Prior Authorization final rule is here, with new requirements for Medicare Advantage, Medicaid, and CHIP plans. Learn how ZeOmega's HealthUnity platform can help you comply and streamline payer-provider collaboration. Read the full details.

  • Royal Holloway: The Computer Misuse Act and the characteristics of convicted hackers

    Sponsored by: TechTarget ComputerWeekly.com

    In this Royal Holloway article, the authors go beyond the perpetuated stereotypes often found in media surrounding hackers by analysing the characteristics of real-life convicted hackers in the UK, who were charged under the Computer Misuse Act

  • Data quality emerges from Covid-19 more critical than ever

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide: The public has been drenched in data during the Covid-19 pandemic. And the issue of the quality of that data has increasingly come to the fore.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.