ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "computer weekly BCS Wiley book extractstart=10start=20start=30start=30start=30"

  • Why zero trust is IT security's best hope

    Sponsored by: TechTarget ComputerWeekly.com

    This guide provides both overarching advice and specific guidance on how to deal with particular issues, including cloud and legacy tools, app development and more. Learn the ideas and approaches that underpin zero trust, and also get solid ideas on where to begin to make it a reality.

  • Guide to Environmental Sustainability Metrics for Data Centers

    Sponsored by: Schneider Electric

    To find out how your organization can improve both the accuracy of your sustainability tracking in the data center and the utility of your ESG reports, download this essential guide to environmental sustainability metrics.

  • Shields up! Why Russia's war on Ukraine should matter to security pros

    Sponsored by: TechTarget ComputerWeekly.com

    The build-up to the attack on Ukraine by Russia on 24 February saw widespread warnings from cyber security companies and government agencies that the world was on the verge of a devastating cyber war. In this E-Guide, we will explore some of the more impactful cyber security stories that have unfolded around the war.

  • IT Project: Internet of Things

    Sponsored by: TechTarget ComputerWeekly.com

    The internet of things, or IoT, is moving from far-fetched to reality in 2016, and more and more enterprises are taking a serious look at how they can capitalise on this to improve their processes.

  • Disaster recovery has never been so easy or important

    Sponsored by: TechTarget ComputerWeekly.com

    Disaster recovery has never been more important because at the same time that digital transformation has made most modern enterprises entirely dependent on their IT systems to function, cyber attackers have stepped up their capabilities to go after sensitive data wherever it is found, with most IT leaders reporting major systems outages.

  • How APAC enterprises can scale up their AI initiatives

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, we take a look into the main trends for AI deployment in APAC, what are the best strategies for enterprises that are looking to scale up their AI initiatives, and how APAC firms are using AI to increase innovation and optimise business processes.

  • CW Benelux November 2019-January 2020: Dutch banks fight money laundering

    Sponsored by: TechTarget ComputerWeekly.com

    Dutch banks have decided to work together in the fight against money laundering. Globally, only about 3% of money laundering activity is detected and stopped.

  • Towards software-defined and cloud-native networking

    Sponsored by: TechTarget ComputerWeekly.com

    As networking equipment rapidly evolves to being software-defined and cloud-native, there is pronounced interest in products and services to accelerate service delivery, improve end-user experiences, and reduce infrastructure and operational costs in service delivery applications. Read more in this e-guide.

  • Public Sector Leaders Discuss IT Infrastructure

    Sponsored by: Red Hat

    In this e-book, join PeerSpot members who work in government and the public sector as they discuss why they selected Red Hat Enterprise Linux (RHEL) as their Linux distribution of choice.

  • The Threat Prevention Buyer’s Guide

    Sponsored by: Zscaler

    This Threat Prevention Buyer's Guide explores the evolving security landscape, emphasizing the need for cloud-native sandboxing that can detect and prevent unknown threats inline without disrupting user productivity. Learn how to choose the right cloud sandbox solution. Read the full buyer's guide.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.