IT Agents  >   Research Institutes and Consortia  >   Software Engineering Institute  >  

CERT

RSS Feed    Add to Google    Add to My Yahoo!
CERTWhite Papers (View All Report Types)
 
IT jobswatch – trends in media IT recruitment
sponsored by ComputerWeekly.com
WHITE PAPER: This quarters figures compiled by jobadswatch.co.uk show that during the fourth quarter of 2010 the IT jobs market for permanent staff being recruited by media organisations is up by 1.8%. This is the sixth consecutive quarter that has seen higher demand.
Posted: 20 Oct 2011 | Published: 15 Mar 2011

ComputerWeekly.com

Gain Faster Value from Your CMS
sponsored by Hewlett-Packard Company
WHITE PAPER: This white paper highlights the true value of deploying a configuration management system (CMS).
Posted: 05 Mar 2014 | Published: 31 Jul 2012

Hewlett-Packard Company

SysML-Based Systems Engineering Using a Model-Driven Development Approach
sponsored by IBM
WHITE PAPER: This paper describes a SysML-based (Systems Modeling Language) process that systems engineers can use to capture requirements and specify architecture. The approach uses model execution as a means for requirements verification and validation.
Posted: 23 Feb 2009 | Published: 01 Oct 2008

IBM

Working Together To Improve Strategic Planning
sponsored by Oracle Corporation
WHITE PAPER: This report reveals compelling examples of how organizations foster collaboration between finance and IT to ensure successful strategic planning.
Posted: 01 Oct 2010 | Published: 01 Oct 2010

Oracle Corporation

Gartner Middle East CIO Leadership Forum
sponsored by Gartner
WHITE PAPER: Join Gartner analysts from 28 February to 1 March in Dubai, industry thought leaders and a select group of your peers to find new answers to new questions - and learn how your IT leadership can create and follow the path to world class best practice.
Posted: 28 Jan 2011 | Published: 28 Jan 2011

Gartner

The 7 Deadly Skills of The Perfect Employee
sponsored by Skillsoft
WHITE PAPER: This resource examines the 7 skills essential to employee success and how to keep your employees productive and satisfied.
Posted: 23 Apr 2012 | Published: 23 Apr 2012

Skillsoft

The 7 Deadly Skills Your IT Team Should Possess
sponsored by Skillsoft
WHITE PAPER: This resource examines IT skill shortages, how to minimise them within your company, and 7 deadly skills that your IT team should possess.
Posted: 18 Apr 2012 | Published: 18 Apr 2012

Skillsoft

Extending Reach and Ensuring Effectiveness of Leadership Development: The Role of Technology-Based Learning
sponsored by Skillsoft
WHITE PAPER: This paper discusses leadership development and the role of technology-based learning in leadership development programs.
Posted: 18 Apr 2012 | Published: 01 Apr 2010

Skillsoft

Five Myths of Agile Development
sponsored by VersionOne Inc.
WHITE PAPER: In this white paper, you will gain insight into five myths commonly associated with agile development. Explore what agile development is in reality, what it is not, and the true benefits of transitioning to agile methods in your organization.
Posted: 15 Oct 2008 | Published: 26 Sep 2008

VersionOne Inc.

2012 Security Outlook
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This report from the Corporate Executive Board, based on extensive research with Chief Information Security Officers, identifies the top 10 security imperatives for 2012.
Posted: 24 Feb 2012 | Published: 24 Feb 2012

ComputerWeekly.com

UK steps towards “Digital Britain” with the introduction of the Digital Economy Act 2010
sponsored by ComputerWeekly.com
WHITE PAPER: In this article, we describe how some key Digital Britain proposals have been implemented in the Digital Economy Act 2010.
Posted: 25 Oct 2011 | Published: 02 Jun 2010

ComputerWeekly.com

CW Special report on Symantec
sponsored by ComputerWeekly.com
WHITE PAPER: This in-depth profile from Computer Weekly, updated for 2013, gives you the key facts on Symantec's products, financial performance and strategy.
Posted: 14 May 2013 | Published: 14 May 2013

ComputerWeekly.com

Threat Intelligence and Data Solutions for your Security Strategy
sponsored by Dell SecureWorks UK
WHITE PAPER: This paper will discuss the benefits of threat intelligence for both the enterprise and individual security professionals, plus what costs organizations to not have threat intelligence.
Posted: 11 Apr 2011 | Published: 11 Apr 2011

Dell SecureWorks UK

Next Generation Enterprise Network Security Solutions: The Importance of Incorporating Vulnerability Intelligence-
sponsored by Hewlett-Packard Company
WHITE PAPER: This crucial paper surveys today's network security threat landscape, discussing available tools, best practices, and the critical role that vulnerability intelligence must play in your security strategy.
Posted: 25 Feb 2014 | Published: 25 Feb 2014

Hewlett-Packard Company

The Dynamic Duo: SAM & Security
sponsored by CDW Corporation
WHITE PAPER: This whitepaper offers software asset management as a solution that can meet new licensing and security challenges.
Posted: 02 Apr 2014 | Published: 02 Apr 2014

CDW Corporation

The Next Generation in Application Monitoring
sponsored by Hewlett-Packard Limited
WHITE PAPER: Access this resource to discover the 3 major components to application security that will best keep your assets protected across the network.
Posted: 08 Apr 2014 | Published: 31 May 2012

Hewlett-Packard Limited

See What CDI Success Looks Like
sponsored by Nuance
WHITE PAPER: This informative white paper provides a documentation management solution that helps bridge the clinical and coding gap by offering peer-to-peer instruction for your physicians, nurses, coders, and administrators.
Posted: 12 Mar 2014 | Published: 31 Dec 2012

Nuance

How to handle requirements for risk assessment methodologies
sponsored by ComputerWeekly.com
WHITE PAPER: Over time, the information security/risk management profession has developed a variety of methods for assessing risk within an organization.
Posted: 24 Oct 2011 | Published: 25 Nov 2010

ComputerWeekly.com

Is the mobile gambling market still a safe bet for business?
sponsored by ComputerWeekly.com
WHITE PAPER: This whitepaper is based on Juniper Research’s August 2010 report entitled “Mobile Gambling Markets: Casinos, Lotteries and Betting 2010-2015.”
Posted: 24 Oct 2011 | Published: 30 Nov 2010

ComputerWeekly.com

Justifying a Computer Incident Response Plan
sponsored by Dell SecureWorks UK
WHITE PAPER: This essential resource explores the need for effective incident response in order to reduce the costs of data breaches and mitigate risk. It also outlines best practices for creating an effective Computer Incident Response Plan (CIRP) – read on to learn more now.
Posted: 07 Feb 2013 | Published: 07 Feb 2013

Dell SecureWorks UK

Thinking Locally, Targeted Globally: New Security Challenges for State and Local Governments
sponsored by FireEye
WHITE PAPER: In a world where cybercrime is growing in complexity and frequency, you don't have room for system vulnerabilities. This guide explores the current role of APTs in and how you can combat these advanced attacks.
Posted: 03 Mar 2014 | Published: 31 Dec 2013

FireEye

BlackBerry 10 & BES10 Security Guide: The Perfect Balance of Protection & Productivity
sponsored by BlackBerry
WHITE PAPER: This exclusive white paper examines a mobile security solution that provides end-to-end protection for your mobile data without sacrificing the experience that keeps employees productive and efficient.
Posted: 17 Mar 2014 | Published: 17 Mar 2014

BlackBerry

Key HR trends: New technologies are changing the HR game
sponsored by Ultimate Software
EGUIDE: Analysts predict that 2013 will be a year of major changes for HR. In order to keep pace with business trends like mobility, savvy HR managers are looking to innovative technologies for support. Read this guide to learn 5 HR tech trends predicted to have a major impact and discover 3 action-items that will help jumpstart your HR overhaul.
Posted: 11 Jan 2013 | Published: 11 Jan 2013

Ultimate Software

Needle in a Datastack: The rise of big security data
sponsored by ComputerWeekly.com
RESEARCH CONTENT: This research from McAfee investigates how well organisations are positioned to address the challenges of managing security in a world of ever increasing amounts and types of data.
Posted: 08 Jul 2013 | Published: 08 Jul 2013

ComputerWeekly.com

Best Practices for Selecting a Vulnerability Management (VM) Solution
sponsored by Qualys
WHITE PAPER: This guide explores some best practices for deploying a VM solution and outlines how it is essential for your security strategy.
Posted: 15 Apr 2014 | Published: 16 May 2013

Qualys

How to tackle risk taxonomy
sponsored by ComputerWeekly.com
WHITE PAPER: This Technical Standard provides a taxonomy describing the factors that drive risk – their definitions and relationships. This Technical Standard is not a reference or tutorial on how to assess or analyze risk, as there are many such references already available.
Posted: 24 Oct 2011 | Published: 25 Nov 2010

ComputerWeekly.com

Cyber Vulnerability Index 2012
sponsored by ComputerWeekly.com
RESEARCH CONTENT: More than three-quarters of the Forbes 2000 companies leak potentially dangerous data that could be exploited by hackers, this research from KPMG reveals.  The report explains the risks and the actions companies need to take to protect themselves.
Posted: 31 Aug 2012 | Published: 05 Jul 2012

ComputerWeekly.com

Open Group technical document: IT Specialist Certification Accreditation Policy
sponsored by ComputerWeekly.com
WHITE PAPER: A common characteristic of people-certification programs in the marketplace is that most test or validate the existence of relevant knowledge. Few reach beyond this.
Posted: 20 Oct 2011 | Published: 22 Oct 2010

ComputerWeekly.com

Critical Factors to Endpoint Security
sponsored by Dell, Inc.
WHITE PAPER: This white paper highlights the need for a new layered, defense-in-depth security approach – one that fortifies the endpoint itself through a handful of security controls and critical factors to keep users and endpoints safe.
Posted: 19 Mar 2014 | Published: 19 Mar 2014

Dell, Inc.

Automating the SANS 20 Critical Security Controls
sponsored by Qualys
WHITE PAPER: This guide explores security automation and how you can ensure system security with 4 main strategies.
Posted: 10 Apr 2014 | Published: 31 Mar 2013

Qualys

Security strategy essential to keep ahead of rapidly changing threats
sponsored by ComputerWeekly.com
WHITE PAPER: This 12-page Buyer’s Guide to Security aims to help CIOs and senior IT professionals decide when to rely on what is provided by infrastructure suppliers and when to turn to IT specialists.
Posted: 21 Oct 2011 | Published: 27 Jan 2011

ComputerWeekly.com

How Red Hat Delivers a Secure Enterprise Platform for Next-Generation DataCenters
sponsored by Red Hat
WHITE PAPER: This whitepaper will introduce you to the key differentiators that set Red Hat Enterprise Linux apart in regards to security for next-generation datacenters. Read on to learn more.
Posted: 04 Sep 2013 | Published: 04 Sep 2013

Red Hat

How Red Hat Delivers a Secure Enterprise Platform for Next-Generation DataCenters
sponsored by Red Hat
WHITE PAPER: This whitepaper shows you how Red Hat Enterprise Linux delivers an exceptionally secure, open source server platform via an extensive set of processes and practices.
Posted: 20 Nov 2013 | Published: 20 Nov 2013

Red Hat

2014 HR Technology Market trends
sponsored by Ultimate Software
EGUIDE: Talent management suites, HR analytics, social performance management software and corporate learning were all hot topics in HR technology for 2013. While these trends will still carry over into 2014, what others will pick up speed?
Posted: 19 Feb 2014 | Published: 19 Feb 2014

Ultimate Software
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement