Search Results for "computer weekly BCS Wiley book extractstart=10start=20start=30start=30start=30"
-
Chapter 1: Security and Risk Management
Sponsored by: McGraw HillIn this 174-page chapter download from McGraw Hill, learn everything you need to know about the first domain, security and risk management, to help you excel at your CISSP exam.
-
CW APAC, May 2022: Trend Watch: Datacentres
Sponsored by: TechTarget ComputerWeekly.comIn this handbook, focused on datacentres in the Asia-Pacific region, Computer Weekly looks at the shift towards colocation facilities.
-
The Modern IT Professional’s Guide To Shadow IT
Sponsored by: Auvik Networks, Inc.Unapproved tools put organizations at risk. Learn how to govern, identify, protect, detect, respond, and recover from shadow IT. Read this white paper for a comprehensive plan to shed light on the shadows – also inside, find a self-assessment quiz that helps you determine your risk factor.
-
Computer Weekly – 13 June 2017: Tips for buying hyper-converged systems
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we examine the growing market for hyper-converged infrastructure, and assess the options available. We ask mature users of the cloud what's next for their migration to off-premise systems. And we analyse how retail supply chains are developing to keep up with online and mobile shopping trends.
-
Three Key Ingredients Every Modern Enterprise Needs In Their Outsourced It Service Provider
Sponsored by: Zadara StorageExplore three strategic elements - Collaboration, Competitiveness, and Compatibility - essential for IT providers to tackle cloud cost, data sovereignty, and performance issues. Discover how Zadara Edge Cloud offers the foundation for modern applications in our White Paper.
-
Why Businesses Must Plan for Succession
Sponsored by: PaycomSuccession planning is critical, yet only 21% of companies have a plan in place. This guide offers 7 strategies to prepare, including starting loose, checking egos, and developing talent. Plan now so your business can thrive for decades. Read the full white paper for insights to ensure continuity.
-
CW APAC - February 2022: Trend Watch - enterprise 5G
Sponsored by: TechTarget ComputerWeekly.comIn this handbook, focused on enterprise 5G in the Asia-Pacific region, Computer Weekly looks at what the technology means for enterprises across the region.
-
Computer Weekly – 7 March 2017: Industrial control systems pose big risk to security
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we examine the risks to national infrastructure from vulnerabilities in industrial control systems. DevOps is growing in popularity – we find out about the organisational, process and cultural approaches to make it succeed. And we ask CIOs how they are becoming hybrid IT and digital leaders. Read the issue now.
-
Calculating ROI of DCIM Monitoring for Distributed IT Sites
Sponsored by: Schneider ElectricIn this white paper, discover a framework and a tool for quantifying DCIM value to help justify investment in DCIM monitoring and alarming functions.
-
The Essential Guide to the 2023 MITRE Engenuity ATT&CK Evaluations
Sponsored by: Palo Alto NetworksDiscover how Palo Alto Networks' Cortex XDR performed in MITRE's 2023 cyberattack simulations versus Turla. Achieving 100% visibility, it blocked all techniques, ensuring top-quality detections. Delve into the results and uncover Cortex XDR's effectiveness in this report.