IT Agents  >   Standards Organizations  >   Information Industry Standards Organizations  >  

INCITS

RSS Feed    Add to Google    Add to My Yahoo!
INCITSWhite Papers (View All Report Types)
 
IT jobswatch – trends in media IT recruitment
sponsored by ComputerWeekly.com
WHITE PAPER: This quarters figures compiled by jobadswatch.co.uk show that during the fourth quarter of 2010 the IT jobs market for permanent staff being recruited by media organisations is up by 1.8%. This is the sixth consecutive quarter that has seen higher demand.
Posted: 20 Oct 2011 | Published: 15 Mar 2011

ComputerWeekly.com

Viewing Application Performance from the End-User Perspective
sponsored by Fluke Networks
WHITE PAPER: This resource introduces Application-Aware Network Performance Management, which quickly identifies the root cause of performance issues within a complex application environment.
Posted: 16 Jun 2014 | Published: 16 Jun 2014

Fluke Networks

Project Management Network Diagram: A Tool for Understanding the PM Life Cycle
sponsored by Global Knowledge
WHITE PAPER: The Project Management Network Diagram (PM Network Diagram) provides a visual illustration of the project management life cycle (in terms of the chain of events that take place in a project).
Posted: 06 Jul 2006 | Published: 01 Jan 2005

Global Knowledge

Gartner Middle East CIO Leadership Forum
sponsored by Gartner
WHITE PAPER: Join Gartner analysts from 28 February to 1 March in Dubai, industry thought leaders and a select group of your peers to find new answers to new questions - and learn how your IT leadership can create and follow the path to world class best practice.
Posted: 28 Jan 2011 | Published: 28 Jan 2011

Gartner

The 7 Deadly Skills Your IT Team Should Possess
sponsored by Skillsoft
WHITE PAPER: This resource examines IT skill shortages, how to minimise them within your company, and 7 deadly skills that your IT team should possess.
Posted: 18 Apr 2012 | Published: 18 Apr 2012

Skillsoft

Working Together To Improve Strategic Planning
sponsored by Oracle Corporation
WHITE PAPER: This report reveals compelling examples of how organizations foster collaboration between finance and IT to ensure successful strategic planning.
Posted: 01 Oct 2010 | Published: 01 Oct 2010

Oracle Corporation

Extending Reach and Ensuring Effectiveness of Leadership Development: The Role of Technology-Based Learning
sponsored by Skillsoft
WHITE PAPER: This paper discusses leadership development and the role of technology-based learning in leadership development programs.
Posted: 18 Apr 2012 | Published: 01 Apr 2010

Skillsoft

The 7 Deadly Skills of The Perfect Employee
sponsored by Skillsoft
WHITE PAPER: This resource examines the 7 skills essential to employee success and how to keep your employees productive and satisfied.
Posted: 23 Apr 2012 | Published: 23 Apr 2012

Skillsoft

ITIL Version 3.0 -- What It Means to You
sponsored by Global Knowledge
WHITE PAPER: As the IT industry standardizes its operations to solve business problems in the most efficient, effective, economical, and equitable way, ITIL v3 becomes a critical tool.
Posted: 06 Jul 2006 | Published: 01 Jul 2006

Global Knowledge

A Prescription for IT Efficiency
sponsored by Dell, Inc. and Windows 8 Pro
WHITE PAPER: This resource examines new risks and threats that are making Windows XP unsafe for use in a healthcare setting, and details the essential security capabilities and benefits offered by Windows 7 and Windows 8.
Posted: 04 Nov 2013 | Published: 04 Nov 2013

Dell, Inc. and Windows 8 Pro

CW+: Overview of the Open Group Security Forum
sponsored by ComputerWeekly.com
WHITE PAPER: The Security Forum is a membership group of security experts from both the customer and supply sides of industry, government, and academia, who share a common aim to raise confidence levels in IT business operations.
Posted: 20 Oct 2011 | Published: 19 Oct 2010

ComputerWeekly.com

Anatomy of an Analytic Enterprise
sponsored by SAS
WHITE PAPER: The following white paper provides readers with the anatomy of a successful analytic enterprise and reveals key technology, implementation practices, pain points to avoid, and more.
Posted: 08 Jul 2014 | Published: 08 Jul 2014

SAS

Anatomy of an Analytic Enterprise
sponsored by SAS
WHITE PAPER: The following white paper provides readers with the anatomy of a successful analytic enterprise and reveals key technology, implementation practices, pain points to avoid, and more.
Posted: 24 Sep 2014 | Published: 24 Sep 2014

SAS

The Evolution of Threat Detection and Management
sponsored by SearchSecurity.com
EGUIDE: This e-guide from SearchSecurity.com explores the [evolution of threat detection and management] and offers advice on how to tackle potentially disastrous APTs, detailing multiple mitigation methods, from SIEMs and big data to sandboxing and whitelisting.
Posted: 19 Jun 2013 | Published: 19 Jun 2013

SearchSecurity.com

Strategies to Capture Greater Value from Systems Engineering
sponsored by IBM
WHITE PAPER: Access this helpful white paper to learn how you can capture greater value from systems engineering by embracing a more holistic approach to manage complexity in both product and process.
Posted: 11 Nov 2013 | Published: 11 Nov 2013

IBM

Keeping up to Date with your Organization's Threat and Authentication Techniques
sponsored by SearchSecurity.com
EGUIDE: Enterprises must have an understanding around two main topics when looking to protect their organizations. This expert e-guide explores the allure of risk-based authentication and how to make access easy for your clients while still make sure their data is secure.
Posted: 05 Dec 2013 | Published: 05 Dec 2013

SearchSecurity.com

An Inside Track on Insider Threats
sponsored by Imperva
WHITE PAPER: Read this informative report for details on the impact of insider threats, as well as recommended strategies for businesses to apply in preventing and remediating these critical issues.
Posted: 11 Jul 2014 | Published: 31 Dec 2012

Imperva

Quick Wins with Website Protection Services
sponsored by Akamai Technologies
WHITE PAPER: The following white paper examines the current state of website security and demonstrates the all-too-common error of neglecting security in this realm. Additionally, lean about a website protection solution that can quickly add measurable security to your web presence with a price for enticing than deploying an in-house solution.
Posted: 08 Oct 2014 | Published: 08 Oct 2014

Akamai Technologies

Integrated Systems for Simpler Application, Platform, and System Management
sponsored by IBM
WHITE PAPER: In this comprehensive resource, explore the ins and outs of a pre-integrated system that offers the compute, storage, and networking resources you need to meet the demands of today's complex applications.
Posted: 28 Jan 2014 | Published: 31 Oct 2013

IBM

Defending Against Application Denial of Service Attacks
sponsored by Akamai Technologies
WHITE PAPER: This paper will dig into application DoS attacks, offering both an overview of common attack tactics and possible mitigations for each. By the end of the paper you should have a guide and an understanding of how your application availability will be attacked, and what you can do about it.
Posted: 08 Oct 2014 | Published: 08 Oct 2014

Akamai Technologies

A Guide To Multi-Layered Web Security
sponsored by Akamai Technologies
WHITE PAPER: Unfortunately, multilayered web security is not as straightforward as businesses would like, which makes thwarting security attacks like the Heartbleed virus even more stressful. So what does it take to do it? Consult this guide to uncover the strategies and technology needed to deploy a powerful, multilayered web security project.
Posted: 07 Oct 2014 | Published: 07 Oct 2014

Akamai Technologies

Exploiting Big Data: Strategies for Integrating with Hadoop to Deliver Business Insights
sponsored by BeyeNETWORK
EBOOK: This e-book, penned by business intelligence expert Wayne Eckerson, will explain how big data -- the combination of Hadoop and analytical databases -- is transforming the business intelligence industry.
Posted: 01 Jun 2012 | Published: 01 Jun 2012

BeyeNETWORK

Securosis Report: Replacing Your SIEM Yet?
sponsored by Intel Security
WHITE PAPER: This report offers pragmatic advice and walks you through the entire process of updating your SIEM solution for improved threat management, operational efficiency and compliance.
Posted: 10 Sep 2014 | Published: 01 Feb 2014

Intel Security

Computer Weekly - 23 August 2011: Download this week's issue of the UK's leading technology publication, with our analysis of the latest news and IT trends
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, Oxfam's CIO talks about how IT supports a global aid operation; we ask if £530m government funding will be enough to roll-out superfast broadband; we examine the security issues around moving to IPv6; plus our analysis of the week’s biggest news stories in IT. Download the latest issue now.
Posted: 22 Aug 2011 | Published: 23 Aug 2011

ComputerWeekly.com

Cloud-Ready Data Center Reference Architecture
sponsored by Juniper Networks, Inc.
WHITE PAPER: Without effective data center network architecture and processes in place, your business cannot embrace cloud computing. This white paper examines the current state of the data center and the steps you need to take to adapt to changing trends and enable the cloud.
Posted: 11 Jun 2012 | Published: 31 Dec 2011

Juniper Networks, Inc.

Expert Ebook: Mastering PCI
sponsored by Information Security Magazine Sponsored by: Breach, Cisco, Fiberlink, Rapid7, Sentrigo, Solidcore, Thawte, Tripwire, and Utimaco
BOOK: This eBook gives expert advice on successfully achieving PCI compliance, by selecting the right auditor and implementing new requirements into your company's IT infrastructure. Read this book and learn how to master PCI compliance.
Posted: 20 Aug 2008 | Published: 20 Aug 2008

Information Security Magazine Sponsored by: Breach, Cisco, Fiberlink, Rapid7, Sentrigo, Solidcore, Thawte, Tripwire, and Utimaco

eBook: Virtualization Security
sponsored by TechTarget
EBOOK: Space savings and reductions in energy costs are causing more organizations to move, or at least consider the move, to virtual environments. Download this eBook and discover how to mitigate the inherent security risks associated with the adoption of virtualization security.
Posted: 21 May 2009 | Published: 21 May 2009

TechTarget

Establishing a Formal Cyber Intelligence Capability
sponsored by Verisign, Inc.
WHITE PAPER: While the benefits of advanced intelligence are substantial, achieving the capability requires a careful planning and consideration. In this paper, uncover best practices and a proven process for establishing a formal cyber intelligence capability as well as explore key considerations.
Posted: 03 May 2012 | Published: 03 May 2012

Verisign, Inc.

March Issue of Information Security magazine: “Virtual Certainty: VMs introduce a new security dynamic”
sponsored by Information Security Magazine
EZINE: This month’s Information Security Magazine Online cover story explores the need for sound security and risk management strategies around virtualization technology.
Posted: 04 Mar 2011 | Published: 04 Mar 2011

Information Security Magazine

eBook: Strategies for Securing Virtual Machines
sponsored by Information Security Magazine
EBOOK: Check out this expert eBook to learn about the special security concerns of virtualization and get best practices for securing virtual machines.
Posted: 18 Dec 2008 | Published: 18 Dec 2008

Information Security Magazine

Computer Weekly – 13 November 2012: Government commits to open standards
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we look at the government's controversial new policy on open standards and what it means for public sector IT. After hurricane Sandy hit New York, we talk to one datacentre operator about how it kept services running. And our latest buyers' guide examines the market for infrastructure on demand. Read the issue now.
Posted: 09 Nov 2012 | Published: 13 Nov 2012

ComputerWeekly.com

Enterprise Decisions E-Zine Feature: How mobile IT is revamping network strategies
sponsored by SearchCIO.com
EZINE: Inside this edition of CIO Decisions E-zine, find out how your peers are keeping up with consumerization trends. Uncover practical network management advice from the experiences of several high-profile organizations.
Posted: 07 Nov 2012 | Published: 07 Nov 2012

SearchCIO.com

Gartner IT Financial, Procurement & Asset Management Summit 2013
sponsored by Gartner
BROCHURE: This brochure outlines the Gartner IT Financial, Procurement & Asset Management Summit 2013, a conference that aims to help you destroy legacy costs and create value from new technologies and trends. View now to learn more!
Posted: 19 Jul 2013 | Published: 19 Jul 2013

Gartner

Unleash the Power of Marketing to Drive Innovation and Profit
sponsored by SAS
WHITE PAPER: In this white paper, learn what genuine customer centricity looks like, why it matters more than ever, and how organizations can achieve it.
Posted: 11 Oct 2011 | Published: 11 Oct 2011

SAS
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement