Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Criminal Law  >   Crime  >   Terrorism  >  

Biological Warfare

RSS Feed    Add to Google    Add to My Yahoo!
Biological Warfare Reports
Data Protection Masterclass: New EU Data Protection Regulation
sponsored by
PRESENTATION: Law firm, Morrison & Foerster, examines the impact of new EU Data Protection legislation on buinsesses.
Posted: 28 Sep 2012 | Published: 28 Sep 2012

Key legal and commercial issues with data centre services
sponsored by
RESEARCH CONTENT: This briefing from law-firm DLA Piper looks at the main types of data centre services that are available on the market, common pitfalls and key legal and commercial issues to consider.
Posted: 09 Sep 2013 | Published: 09 Sep 2013

New Reality of Stealth Crimeware Video
sponsored by Intel
WEBCAST: An overwhelming amount of new malware is created everyday and it puts your sensitive data at risk. View this informative webcast to learn more about the implications of stealth crimeware and the possible repercussions they could have on your business.
Posted: 03 Oct 2012 | Premiered: Oct 3, 2012


Web Exploits: There’s an App for That
sponsored by M86 Security
WHITE PAPER: The main motivation driving the cybercrime industry is the possibility of monetary gain. Savvy, knowledgeable individuals with skills in developing Web applications and basic knowledge in hacking have filled a niche by creating exploit kits. Read this white paper to learn the basics about exploit kits, what they do, and why the bad guys use them.
Posted: 27 May 2010 | Published: 27 May 2010

M86 Security

How SkillSoft Learning Impacts Performance of Individuals and Organizations
sponsored by Skillsoft
WHITE PAPER: In late 2010, Skillsoft asked KnowledgeAdvisors, the world's largest learning analytics firm, to conduct an independent study to determine the value that SkillSoft training provides to individuals and organizations. Check out this white paper to explore the results of this study and key findings.
Posted: 28 Aug 2012 | Published: 28 Feb 2011


Global Security Report 2011
sponsored by Trustwave
WHITE PAPER: In 2010, SpiderLabs performed more than 220 investigations worldwide. In 85% of the investigations, a system breach was confirmed. Of those entities in which a system breach was confirmed, 90% involved the actual theft of sensitive data, representing criminals’ effectiveness in extracting data once system access is obtained.
Posted: 27 Jan 2011 | Published: 26 Jan 2011


Bringing BI to the Masses
sponsored by
EZINE: This issue of Enterprise CIO Decisions E-Zine highlights several success stories showcasing how today's IT leaders are finding enough success to increase BI investments and, ultimately, putting their data growth management concerns to rest.
Posted: 25 Apr 2012 | Published: 24 Apr 2012

Serena Service Management: Free Trial
sponsored by SERENA Software, Inc.
TRIAL SOFTWARE: Serena Service Manager is an processed-based ITSM solution that keeps people and processes perfectly in sync. View now to try Pink Elephant's ITIL innovation of the year.
Posted: 05 Apr 2012 | Premiered: 05 Apr 2012

SERENA Software, Inc.

Protecting Commercial Online Banking Customers from Next-Generation Malware
sponsored by IronKey
WHITE PAPER: Cybercriminals are now using advanced malicious software (malware) to attack the computers of finance professionals in companies and government agencies. Read this paper now to learn how your business can stay protected from these threats.
Posted: 22 Nov 2010 | Published: 22 Nov 2010


Becoming a Social Business: The IBM Story
sponsored by IBM
WHITE PAPER: In this white paper, IDC explores example case studies of IBM’s internal evolution to a social business as a means to guide other large organisations considering making a similar transition.
Posted: 23 Jun 2011 | Published: 22 Jun 2011

Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement