Search Results for "computer weekly BCS Wiley book extractstart=20start=10start=10start=20start=30"
-
GEP Procurement & Supply Chain Tech Trends Report
Sponsored by: GEPAs procurement and supply chain leaders continue to navigate customer service challenges while battling macroeconomic struggles, extreme weather conditions, and geopolitical upheavals, many organizations are looking for new ways they can thrive in an uncertain world. Browse this report to learn more.
-
Jargon buster guide to GDPR
Sponsored by: TechTarget ComputerWeekly.comIn this guide, we provide the 10 most important things you need to know about GDPR, and a jargon-buster explanation for some of the key terminology.
-
CW Benelux November 2019-January 2020: Dutch banks fight money laundering
Sponsored by: TechTarget ComputerWeekly.comDutch banks have decided to work together in the fight against money laundering. Globally, only about 3% of money laundering activity is detected and stopped.
-
Navigating the Cloud: A Comprehensive Guide to Cloud Migration
Sponsored by: AdvancedWhether you are a business owner or an IT professional, download this e-book for the knowledge and tools you need to make the transition to the cloud with confidence.
-
Enterprise Buyers’ Guide to Data Protection 2024
Sponsored by: Veeam SoftwareThe Enterprise Buyers' Guide to Data Protection 2024 is designed to highlight key market trends and challenges while providing information on what capabilities and processes organizations should consider implementing.
-
How to Manage SAP User Accounts and Access Rights with Identity Manager
Sponsored by: One IdentityLearn how Identity Manager can streamline user administration for the SAP ecosystem, including on-premises and cloud offerings. Manage user identities, privileges and security across the enterprise with integrated IAM. Read this white paper to see the benefits.
-
Calculating ROI of DCIM Monitoring for Distributed IT Sites
Sponsored by: Schneider ElectricIn this white paper, discover a framework and a tool for quantifying DCIM value to help justify investment in DCIM monitoring and alarming functions.
-
Computer Weekly – 19 December 2023: The ransomware threat to UK critical infrastructure
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, a parliamentary report warns that a lack of ransomware preparedness at the highest levels of government is leaving UK critical national infrastructure dangerously exposed – we analyse the risks. We also examine how AI tools are helping to enhance cloud security. Read the issue now.
-
How Passkeys Work
Sponsored by: OktaPasskeys are a new FIDO-based authentication standard that enables faster, easier, and more secure sign-up and sign-in experiences. This white paper explains how passkeys work, the technical flows involved, and implementation considerations for developers. Read the full white paper to learn more.
-
Virtual currencies and their potential role in cyber crime
Sponsored by: TechTarget ComputerWeekly.comThis article in our Royal Holloway Security Series looks at the potential for misuse of virtual currencies and legal landscape in the UK.