Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Criminal Law  >   Crime  >   Terrorism  >  

Biological Weapons

RSS Feed    Add to Google    Add to My Yahoo!
Biological Weapons Reports
European IT Law Briefing: Monitoring employees' use of social media
sponsored by
ESSENTIAL GUIDE: Leading European law firms explain the key legal requirements for companies monitoring employees' social media use in France, Germany, UK and Italy.
Posted: 20 May 2013 | Published: 20 May 2013

Business leaders agenda 2012
sponsored by
RESOURCE: This report from KPMG identifies business priorities across a wide range of geographies and industries, and assesses the economic outlook.
Posted: 16 Mar 2012 | Published: 16 Mar 2012

Virtual currencies and their potential role in cyber crime
sponsored by
ESSENTIAL GUIDE: This article in our Royal Holloway Security Series looks at the potential for misuse of virtual currencies and legal landscape in the UK.
Posted: 04 Aug 2016 | Published: 04 Aug 2016

A clearer horizon. Do CIOs have more clarity about cloud computing?
sponsored by
IT BRIEFING: This research from management consultants, Xantus, shows that while there is still a lack of clarity and a reluctance to fully commit to the cloud, there is a general acceptance from CIOs of the benefits and a growing commitment to develop those benefits.
Posted: 01 Dec 2011 | Published: 01 Dec 2011

ACOs: Treat Patients More Effectively with Health Analytics
sponsored by IBM
EGUIDE: This e-guide from highlights the importance of data analytics in the success of today's ACOs. Read now to learn the difference between collaborative and captive ACOs and discover how predictive analytics can provide the information necessary to dramatically improve patient care.
Posted: 29 Mar 2013 | Published: 29 Mar 2013


Infographic: Bridging the Gap Between Business and IT
sponsored by IBM
WHITE PAPER: This infographic illustrates the necessity of integration between business and IT, as well as the fundamental disagreements that exist between the two groups.
Posted: 04 Sep 2014 | Published: 04 Sep 2014


New Reality of Stealth Crimeware Video
sponsored by Intel
WEBCAST: An overwhelming amount of new malware is created everyday and it puts your sensitive data at risk. View this informative webcast to learn more about the implications of stealth crimeware and the possible repercussions they could have on your business.
Posted: 03 Oct 2012 | Premiered: Oct 3, 2012


Architecting an Agile Enterprise
sponsored by
EBOOK: This white paper takes an in-depth look at the relationship between Agile business practices and mobile computing. Inside, learn more about the balancing act many modern businesses face when trying to provide a quick turnaround for mobile applications on a limited budget.
Posted: 22 Jan 2013 | Published: 22 Jan 2013

Better Healthcare Starts with Better Information
sponsored by Dell, Inc.
WHITE PAPER: This white paper examines Dell's holistic solutions, bringing together implementation services, process improvement consulting and customized IT technology so caregivers have better information for better patient care.
Posted: 20 Jun 2012 | Published: 20 Jun 2012

Dell, Inc.

Best Practices for Managing the Increasing Depth of Compliance Regulation
sponsored by IBM
EGUIDE: According to Gartner Research, 41% of corporations have employed a chief compliance officer to keep up with today’s increasingly complex compliance regulations.  Learn what actions your organization can take to ensure compliance with evolving regulations.
Posted: 18 May 2011 | Published: 18 May 2011

Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement