ComputerWeekly.com Research Library

Powered by Bitpipe.com

Search Results for "computer weekly BCS Wiley book extractstart=10"

  • Virtualization Security: Protecting Virtualized Environments

    Sponsored by: TechTarget ComputerWeekly.com

    This extract from the book Virtualization Security, includes a 30% discount for Computer Weekly readers.

  • Benefits Management: How to increase the business value of your IT projects

    Sponsored by: TechTarget ComputerWeekly.com

    This book extract explains how organisation can uses benefits management techniques to increase the value of IT projects to the business.

  • Stories That Move Mountains: Improve your presentation skills

    Sponsored by: TechTarget ComputerWeekly.com

    Learn how to make your presentation stand out from the crowd and make 'death by slide presentation' a thing of the past with this book extract especially written for IT professionals.

  • Attack Surface Management

    Sponsored by: Palo Alto Networks

    With more cloud environments and digital assets in play than ever before, the enterprise attack surface has become increasingly complex and difficult to manage. This Attack Surface Management (ASM) for Dummies, e-book presents a coherent overview of ASM. Download now to unlock the extensive e-book and all the insights contained within it.

  • IT Project Management: Guide to estimating timescales and resources.

    Sponsored by: TechTarget ComputerWeekly.com

    Learn how to estimate the effort and timescales required for IT projects with this extract from Project management for IT-related projects.

  • Low-Code Apps for Dummies 2nd ServiceNow Special Edition

    Sponsored by: ServiceNow

    In this 64-page ultimate guide to low-code application development, discover what questions you should ask before building, 10 development tips, and much more.

  • Zero Trust Network Access

    Sponsored by: Palo Alto Networks

    The rise of sophisticated cyberattacks has resulted in many businesses adopting Zero Trust Network Access (ZTNA) solutions, some which are ZTNA 1.0 and some ZTNA 2.0. Explore this e-book to learn how ZTNA 2.0 solutions have emerged to usher in secure access for today’s new norm: remote work.

  • DevSecOps

    Sponsored by: VMware Tanzu

    DevSecOps is about making security an inextricable, if not intrinsic, part of the application lifecycle to support increasingly complex, cloud-native applications. But where do you start? Begin by downloading a copy of this comprehensive DevSecOps for Dummies e-book, in which you’ll find helpful definitions and how-tos.

  • Business Apps for SharePoint and Office 365 for Dummies

    Sponsored by: K2

    Overcome common challenges and leverage best practices for app development within SharePoint.

  • Kubernetes on vSphere

    Sponsored by: VMware Tanzu

    Due to its portability and flexibility, Kubernetes has transformed the way organizations think about their multi-cloud strategies. But what is the best way to deploy your Kubernetes? Download this Kubernetes on vSphere for Dummies e-book to unlock over 60 pages of information that will guide you through the basics of deploying your Kubernetes.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.