Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Criminal Law  >   Crime  >   Terrorism  >  

Biological Warfare

RSS Feed    Add to Google    Add to My Yahoo!
Biological WarfareReports
 
Advanced identity tracking for social networking sites: Using HP ArcSight ESM to identify online predators
sponsored by Hewlett-Packard Company
WHITE PAPER: This critical resource exposes the truth behind online predators using social networking sites to stalk intended victims without being detected by authorities. Click now to see how a correlation engine can help pinpoint these criminals before their next attack.
Posted: 19 Aug 2014 | Published: 31 May 2012

Hewlett-Packard Company

Case Study: How John Lewis Conquered the Web
sponsored by ComputerWeekly.com
BOOK: Bill Goodwin tells the inside story of John Lewis £40m website redevelopment project, assesses the technical and business challenges faced and its impact on the business.
Posted: 17 Mar 2014 | Published: 17 Mar 2014

ComputerWeekly.com

Data Privacy: Where Should I House My Data?
sponsored by IntraLinks, Inc
WHITE PAPER: This white paper offers 6 top recommendations on how to keep your data protected in the cloud and compliant with varying regulatory mandates across country borders.
Posted: 17 Apr 2014 | Published: 17 Apr 2014

IntraLinks, Inc

Why Data Protection Law Supports the Use of Managed Security Services
sponsored by Dell SecureWorks
WHITE PAPER: This white paper clarifies the truth behind using managed security service providers (MSSPs) while maintaining compliance with European data protection laws.
Posted: 02 Apr 2014 | Published: 31 Aug 2013

Dell SecureWorks

European IT Law Briefing: Recruitment and social media
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Four leading European law firms help you navigate the legal maze when using social media for recruitment in France, Germany, UK and Italy.
Posted: 20 May 2013 | Published: 20 May 2013

ComputerWeekly.com

Attacks on Point of Sale Systems
sponsored by Symantec Corporation
WHITE PAPER: Identity theft is one of the most common forms of cybercrime, and your Point of Sale (POS) system is especially vulnerable to this attack type. This in-depth guide explores how cybercriminals use malware to steal credit card information at the POS.
Posted: 11 Mar 2014 | Published: 11 Mar 2014

Symantec Corporation

CIO Decisions E-Zine: PPM: Validating the Value of IT
sponsored by SearchCIO.com
EZINE: This e-zine breaks down how PPM tools and best practices simplified project management and justified IT project service delivery and costs.
Posted: 02 Apr 2013 | Published: 02 Apr 2013

SearchCIO.com

2010 Threat Report
sponsored by Websense, Inc.
WHITE PAPER: Websense® Security Labs™ uses the Websense ThreatSeeker® Network to discover,classify, and monitor global Internet threats and trends. Featuring the world’s first Internet HoneyGrid™, the system uses hundreds of technologies to parse through more than 1 billion pieces of content daily,searching for security threats.
Posted: 11 Jan 2011 | Published: 11 Jan 2011

Websense, Inc.

Using ICD-10 Codes and Electronic Health Records to Achieve Value
sponsored by Dell, Inc.
WHITE PAPER: This white paper demonstrates how adopting ICD-10 and EHRs can provide information that would be useful to streamlining administrative burdens that plague both health plans and providers.
Posted: 20 Jun 2012 | Published: 20 Jun 2012

Dell, Inc.

Presentation Transcript: Key tips for a successful healthcare analytics program
sponsored by Orion Health
PRESENTATION TRANSCRIPT: This presentation transcript presents key tips for a successful health care analytics program. Listen now for valuable perspectives on the challenges and lessons learned regarding data analytics and how it effects EHR and health information exchange (HIE) initiatives.
Posted: 10 Dec 2012 | Published: 10 Dec 2012

 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement