Business of Information Technology  >   Business Management  >   Human Resources Management  >  

Computer Science Education

RSS Feed    Add to Google    Add to My Yahoo!
Computer Science Education Reports
 
Key trends for IT leaders in 2016 Part I
sponsored by ComputerWeekly.com
EBOOK: Albert Ellis, CEO of recruitment company Harvey Nash Group, considers the key skill, careers and recruitment trends for 2016 in this PowerPoint presentation.
Posted: 08 Feb 2016 | Published: 08 Feb 2016

ComputerWeekly.com

2013 Cost of Data Breach Study: UK
sponsored by ComputerWeekly.com
RESEARCH CONTENT: The cost of data breaches has risen for UK organisations iover the past year, but companies that appoint chief information secruity officers with enterprise-wide responsiblities can reduce their costs, this report from the Ponemon Institute reveals.
Posted: 05 Jun 2013 | Published: 05 Jun 2013

ComputerWeekly.com

CW+: Open Group technical report: IT Specialist Certification (ITSC) accreditation requirements
sponsored by ComputerWeekly.com
WHITE PAPER: The Open Group IT Specialist Certification Program (the Program) is designed to validate the existence of those qualities and skills in a professional that enable the effective development, implementation, and operation of IT solutions.
Posted: 20 Oct 2011 | Published: 22 Oct 2010

ComputerWeekly.com

Women in IT: Rebecca George
sponsored by ComputerWeekly.com
PRESENTATION: Rebecca George partner at Deloitte, offers career tips for women IT professionals in this presentation for Computer Weekly's Most Influential Women in IT awards.
Posted: 17 Jul 2013 | Published: 17 Jul 2013

ComputerWeekly.com

CW500:Future Gazing 2020 (II)
sponsored by ComputerWeekly.com
PRESENTATION: Professor Victor Newman, author, advisory board member and mentor at Social Innovation Lab Kent (Silk), gives his take on the future of the IT department in 2020.
Posted: 25 Nov 2013 | Published: 25 Nov 2013

ComputerWeekly.com

Windows Server 2012 Security from End to Edge and Beyond
sponsored by ComputerWeekly.com
BOOK: This extract from the book Windows Server 2012 Security from End to Edge and Beyond shows you how to plan your platform security requirements and gives you the critical questions to ask.
Posted: 02 Sep 2013 | Published: 02 Sep 2013

ComputerWeekly.com

How to improve your communication with your boss
sponsored by ComputerWeekly.com
TRAINING GUIDE: Learn how to communicate more effectively with your boss in this guide from Dr Brian Sutton and Dr Robina Chatham.
Posted: 08 May 2012 | Published: 08 May 2012

ComputerWeekly.com

Harvey Nash CIO Survey 2014
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Business are increasing their investment in technology more quickly than any time since 2006 as confidence returns in the economy, this global survey of IT leaders reveals.
Posted: 20 May 2014 | Published: 20 May 2014

ComputerWeekly.com

Irish Life and Permanent plc: Using CA’s Next Generation Tools and Utilities to Simplify Mainframe Management
sponsored by CA Technologies.
CASE STUDY: This success story provides insight into the current state of the mainframe and forecasts the future of these critical systems. Get advice on how to recruit the next generation of specialists and hear from one company that implemented a tool designed to simplify mainframe management.
Posted: 25 Jul 2011 | Published: 01 Jan 2010

CA Technologies.

Information Security Asean July 2015
sponsored by TechTarget ANZ
EZINE: Cyber-crime is a global phenomenon. No business is safe if they fail to implement the right security products and policies.
Posted: 07 Jul 2015 | Published: 07 Jul 2015

 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement