Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Criminal Law  >   Crime  >   Terrorism  >  

Biological Weapons

RSS Feed    Add to Google    Add to My Yahoo!
Biological WeaponsWhite Papers (View All Report Types)
 
Beyond Work-Life Balance
sponsored by Hewlett-Packard Limited
WHITE PAPER: This white paper takes an uncommon look at how – thanks to mobile and cloud technologies – the world of work is changing and why. Specifically, it focuses on ways IT leaders can be proactive about building a work environment that's ready for the future.
Posted: 12 Nov 2012 | Published: 12 Nov 2012

Hewlett-Packard Limited

Attacks on Point of Sale Systems
sponsored by Symantec Corporation
WHITE PAPER: Identity theft is one of the most common forms of cybercrime, and your Point of Sale (POS) system is especially vulnerable to this attack type. This in-depth guide explores how cybercriminals use malware to steal credit card information at the POS.
Posted: 11 Mar 2014 | Published: 11 Mar 2014

Symantec Corporation

Choosing the Right Enterprise Resource Planning (ERP) System: How to Avoid the 7 Fatal Flaws
sponsored by CDC Software - Ross Enterprise
WHITE PAPER: This paper explains the importance of choosing the Right Enterprise Resource Planning (ERP) System to avoid the 7 Fatal Flaws.
Posted: 14 Nov 2008 | Published: 14 Nov 2008

CDC Software - Ross Enterprise

Better Healthcare Starts with Better Information
sponsored by Dell, Inc.
WHITE PAPER: This white paper examines Dell's holistic solutions, bringing together implementation services, process improvement consulting and customized IT technology so caregivers have better information for better patient care.
Posted: 20 Jun 2012 | Published: 20 Jun 2012

Dell, Inc.

From Fear to Value: CIO strategies for propelling business through the economic crisis
sponsored by IBM
WHITE PAPER: Your aspiration: As a CIO, drive change, innovation and efficiency to help build a smarter enterprise that will prosper amidst global competition. Your daily challenge: As a CIO, deliver business results faster and better–with less. This whitepaper outlines key strategies for CIOs to drive business results through the economic crisis.
Posted: 18 Jun 2010 | Published: 17 Mar 2009

IBM

Advanced identity tracking for social networking sites: Using HP ArcSight ESM to identify online predators
sponsored by Hewlett-Packard Company
WHITE PAPER: This critical resource exposes the truth behind online predators using social networking sites to stalk intended victims without being detected by authorities. Click now to see how a correlation engine can help pinpoint these criminals before their next attack.
Posted: 21 Nov 2013 | Published: 31 May 2012

Hewlett-Packard Company

What is FakeAV?
sponsored by Sophos, Inc.
WHITE PAPER: FakeAV, or Fake AntiVirus, is a class of malware that display false alert messages concerning threats that do not really exist. The alerts prompt users to visit a website where they will be asked to pay for these non-existent threats to be cleaned up. Read on to learn where FakeAV comes from, how they act, and how to protect yourself.
Posted: 25 Jun 2010 | Published: 24 May 2010

Sophos, Inc.

Oracle Accelerate - Not Just Smart but Timely
sponsored by Oracle Corporation
WHITE PAPER: This paper gives you an overview of how Ovum has helped penetrate the upper-midmarket. Even when the slowing growth of the market hasn't.
Posted: 24 Sep 2009 | Published: 01 Mar 2009

Oracle Corporation

Virtual and Superior: How to Build Teams that Get Things Done
sponsored by Citrix
WHITE PAPER: This white paper highlights tips and best practices for CIOs looking for more effective ways to cut risk and create value in virtual environments through better teamwork.
Posted: 12 Sep 2012 | Published: 12 Sep 2012

Citrix

Take Back the Endpoint
sponsored by Kaspersky Lab
WHITE PAPER: During the course of three days in late 2009, cybercriminals acquired the banking credentials,username and password, for Hillary Machinery, Inc., located in Plano, Texas, and conducted more than 45 separate transactions to over 40 different payees. The result was a loss of $801,495.
Posted: 08 Feb 2011 | Published: 08 Feb 2011

Kaspersky Lab
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement