Business of Information Technology  >   Business Management  >   Human Resources Management  >  

Computer Science Education

RSS Feed    Add to Google    Add to My Yahoo!
Computer Science Education Reports
 
BYOD Security Policy Considerations and Best Practices
sponsored by SearchSecurity.com
EGUIDE: This E-Guide from SearchConsumerization.com unveils best practices for creating your enterprise's bring your own device (BYOD) policy and steps you should take to ensure access and freedom for your employees without sacrificing corporate security and control.
Posted: 26 Nov 2012 | Published: 26 Nov 2012

SearchSecurity.com

Common Misconceptions and the Truth Behind Storage Costs and Information Governance Training
sponsored by Symantec Corporation
EGUIDE: In this e-guide, read as Jeffrey Ritter demystifies the myths behind data management and debunks misconceptions about storage costs and information governance training.
Posted: 17 Jun 2015 | Published: 17 Jun 2015

Symantec Corporation

SANS - 2015 State of Application Security: Closing the Gap
sponsored by Hewlett-Packard Company
WHITE PAPER: This SANS report pinpoints where the vulnerability gaps lie in today's application security programs. Click through for key recommendations on how to address these issues.
Posted: 01 Feb 2015 | Published: 28 Feb 2014

Hewlett-Packard Company

The Deloitte CIO Survey 2013
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This ground breaking study from Deloitte, based on a survey of 700 CIOs world wide, gives you the latest trends in IT spending, technology and business priorities and CIO's career aspirations.
Posted: 08 Nov 2013 | Published: 08 Nov 2013

ComputerWeekly.com

Integrated Talent Management
sponsored by ComputerWeekly.com
ANALYST REPORT: This Independent analyst perspective into the integrated talent management systems market from Elearnity assesses the leading talent management suppliers.
Posted: 22 Jul 2014 | Published: 22 Jul 2014

ComputerWeekly.com

Learning Computing: Why object orientated programming works.
sponsored by ComputerWeekly.com
JOURNAL ARTICLE: Programming is a journey between the real world and a computer. This article explains why object orientation is currently the best way we have of making the journey.
Posted: 05 Jan 2012 | Published: 05 Jan 2012

ComputerWeekly.com

High-tech, low-tech, no-tech
sponsored by ComputerWeekly.com
PRESENTATION: David Matthewman CIO of The Open University gives his take on the value of no-and low-tech innovation in this PowerPoint presentation.
Posted: 10 Dec 2013 | Published: 10 Dec 2013

ComputerWeekly.com

The 5 Most Overlooked Elements when Managing HR in the Cloud
sponsored by NGA Human Resources
WHITE PAPER: Read this white paper for the five most overlooked elements when managing HR in the cloud.
Posted: 06 May 2015 | Published: 06 May 2015

NGA Human Resources

How to Keep Your Talent on Top Form
sponsored by Skillsoft
WHITE PAPER: This resource discusses how to keep your talent in top form and create future leaders for your company.
Posted: 19 Apr 2012 | Published: 19 Apr 2012

Skillsoft

Measuring End User Susceptibility and Defenses Against Phishing Attacks with CORE Insight
sponsored by Core Security Technologies
WHITE PAPER: This white paper contains critical information about spear phishing and how to prepare your users and systems from falling for these targeted attacks being masked as trustworthy content.
Posted: 11 Oct 2013 | Published: 11 Oct 2013

Core Security Technologies
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement