Search Results for "computer weekly BCS Wiley book extractstart=20start=10start=10start=20start=30"
-
The rise and rise of SD-WAN in post Covid-19
Sponsored by: TechTarget ComputerWeekly.comSo much has been up in the air in the wake of the onset of Covid-19 and the lockdowns and stay-at-home orders issued by various governments around the world. But there has been one thing that is pretty fixed: the rise and rise of software-defined wide area networks (SD-WANs).
-
Living Off The Land Attacks
Sponsored by: CyberFOXCybercriminals are using legitimate tools to infiltrate systems and steal data. Learn how privileged access management and blocklisting can reduce your attack surface and prevent "living off the land" attacks. Read the full e-book to discover practical ways to enhance your security.
-
What Is Great Content for Buyers and Why’s It So Hard?
Sponsored by: Enterprise Strategy GroupThis e-book, “What Is Great Content for Buyers and Why’s It So Hard?” explains why great content is so important, what makes for greatness, why that’s so hard, and how your team can get there. Download your copy to get started.
-
Grow and Innovate on Energy-Efficient, Sustainable IT Infrastructures
Sponsored by: Dell TechnologiesDiscover the unique benefits of Dell APEX Cloud Platform for Azure running on PowerEdge servers and how this solution addresses the immediate technological requirements of businesses and contributes significantly to long-term sustainability goals.
-
The Evolution of Ecommerce
Sponsored by: LexisNexis® Risk SolutionsPH
-
Royal Holloway: Protecting investors from cyber threats
Sponsored by: TechTarget ComputerWeekly.comThe cyber security of personal investors who use UK investment platforms to manage their pensions or savings is not well understood and not often discussed. In this Royal Holloway security article, we identify the principal cyber threats to investors' assets on UK investment platforms and what can be done to prevent or mitigate these threats.
-
Ultimate Guide to Zero-Trust Security
Sponsored by: Trustmarque Solutions Ltd.Read this custom TechTarget eGuide to access tips on implementing zero-trust security, including best practices and insights into the top challenges organizations typically face when adopting a zero-trust model.
-
Deloitte Global CIO Survey 2018 – UK Edition
Sponsored by: TechTarget ComputerWeekly.comFewer than 10% of CIOs identified themselves and their companies as being advanced in the journey to incorporate technology into their digital business strategies, Deloitte's 2018 CIO survey reveals in the UK edition of its 2018 global CIO survey, Manifesting Legacy: Looking Beyond the Digtal Era.
-
Secure Voting
Sponsored by: TechTarget ComputerWeekly.comThis report from WebRoots Democracy, a pressure group for e-voting, aims to answer the key questions surrounding online voting security and the potential e-voting systems.
-
Doing More With Less Cost-Effective Application Security And Performance Strategies From 7 Companies.
Sponsored by: CloudflareWhile the cost of security breaches continues to increase, many security teams have found ways of achieving success with limited resources. This white paper shares real-life stories of companies that have successfully created efficiencies and cut costs in their application security strategy. Download now to discover more.