Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >  

Labor Law

RSS Feed    Add to Google    Add to My Yahoo!
Labor LawWhite Papers (View All Report Types)
 
Five Essentials for Building Trust and Engagement through Employee Development
sponsored by SAP
WHITE PAPER: The following white paper examines the top 5 best practices for building trust and engagement through employee development. Learn how to develop leaders, allocate roles, learn how to decipher the areas that need greater attention, and more.
Posted: 25 Jul 2014 | Published: 25 Jul 2014

SAP

Getting the Most out of Your Business Analysts and Business Architects
sponsored by Global Knowledge
WHITE PAPER: The following white paper provides a detailed approach in 6 easy steps on how to get the most out of business analysts and architects.
Posted: 25 Oct 2013 | Published: 25 Oct 2013

Global Knowledge

Recruiting 101: Establish a Process to Hire Right the First Time
sponsored by ConnectWise
WHITE PAPER: Recruiting is an essential process to build the infrastructure of your business. By planning out the recruiting and hiring process, you will have much greater success finding the right candidates the first time around. In this eBook, you'll learn how to plan, interview, and make hiring decisions with confidence.
Posted: 22 Jul 2013 | Published: 22 Jul 2013

ConnectWise

Methods, Motivations, and Mitigation of Insider Threats
sponsored by VeriSign, Inc
WHITE PAPER: This white paper takes a closer look at the real impact of insider threats. From the motives and means, to types of insider attacks and best practices, learn more about how this complicated criminal behavior is impacting enterprise today.
Posted: 28 Nov 2007 | Published: 13 Feb 2007

VeriSign, Inc

The Top Six Risks of Employee Internet Use and How to Stop Them
sponsored by St. Bernard Software
WHITE PAPER: Learn the legal issues and security risks associated with unmanaged employee Internet use. This white paper discusses the security controls needed to mitigate risk, reduce threats and achieve compliance in the enterprise.
Posted: 27 Sep 2007 | Published: 27 Sep 2007

St. Bernard Software

The Desktop Dilemma: Liberty vs. Lockdown
sponsored by Bit9, Inc.
WHITE PAPER: CIOs and IT departments are under tremendous pressure to implement better processes over how software is deployed, managed, and used by their employees on their company computers. This document will outline a nine-step methodology that can make or break your transition to a well-managed and controlled Windows environment.
Posted: 09 Jun 2009 | Published: 09 Jun 2009

Bit9, Inc.

Managing Access to Critical Data for Protection and Privacy
sponsored by Symantec Corporation
WHITE PAPER: Download this white paper today and learn more about how to effectively secure company data with effective access management and monitor and secure valuable company information to ensure that it doesn't fall into the wrong hands.
Posted: 30 Mar 2007 | Published: 01 Jan 2006

Symantec Corporation

The Powerful Technologies behind Best-of-Breed Internet Filtering
sponsored by St. Bernard Software
WHITE PAPER: This paper outlines the available filtering and classification technologies that can be deployed to secure your Internet access, while reviewing the advantages and disadvantages of filtering systems.
Posted: 20 Feb 2006 | Published: 01 Jul 2005

St. Bernard Software

Top 10 Best Practices for Email Archiving
sponsored by ZANTAZ
WHITE PAPER: Email archive software can address a number of issues from compliance to electronic discovery to storage concerns. This checklist outlines the common mistakes made by administrators when researching, implementing and managing email archive solutions.
Posted: 03 Oct 2006 | Published: 03 Oct 2006

ZANTAZ

The Extraordinary Failure of Anti-Virus Technology
sponsored by SecureWave
WHITE PAPER: Anti-Virus technology fails to prevent computers from virus infections. This paper examines how whitelisting prevents malware and defends against evolving threats. Learn about five common security breaches and how whitelisting can help prevent them.
Posted: 02 Feb 2007 | Published: 01 Feb 2007

SecureWave
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement