Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Criminal Law  >   Crime  >   Computer Crimes  >  

Digital Forensics

RSS Feed    Add to Google    Add to My Yahoo!
Digital Forensics Reports
 
Computer Forensics and its Role in the Risk Management Process
sponsored by IBM
EGUIDE: The possibility of a data breach is very real – no matter how proactive your security measures are. Access this expert FAQ guide for further insight into how computer forensics can help put a well-formed incident response plan that is aligned with your information risk management and compliance strategies.
Posted: 19 May 2011 | Published: 19 May 2011

IBM

Webmail Forensics: Investigating Issues with Email Forwarding Security
sponsored by Kaspersky Lab
EGUIDE: This expert guide will help you learn more about what it takes in order to make sure your organization has an effective forensic readiness plan ready. Read on and learn how to prepare your plan today.
Posted: 22 Apr 2013 | Published: 22 Apr 2013

Kaspersky Lab

Case Study: Top 5 Communications Company Evaluates Leading eDiscovery Solutions
sponsored by AccessData Group
WHITE PAPER: The following case study examines the decision made by a Top 5 Communications Company to implement AccessData (AD)eDiscovery. The company found AccessData Group's product to be the solution that best addressed their internal requirements. The following reviews the findings and the benefits received as a result of implementing AccessData technology.
Posted: 11 Apr 2011 | Published: 06 Apr 2011

AccessData Group

MarketScope for E-Discovery Software Product Vendors
sponsored by Clearwell Systems
WHITE PAPER: Recession has accelerated the move to in-house e-discovery and more companies have brought, or are considering bringing, e-discovery in-house. This report will help enterprises build a business case, create a list of possible vendors and determine which ones best meet their needs.
Posted: 18 Nov 2010 | Published: 21 Dec 2009

Clearwell Systems

Norton Cyber Security Insights Report
sponsored by ComputerWeekly.com
RESEARCH CONTENT: This report examines consumers' online behaviours, attitudes and security habits alongside the dangers and financial cost of cyber crime
Posted: 16 Feb 2016 | Published: 16 Feb 2016

ComputerWeekly.com

Guide to Flexible Working
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This guide from Vodafone explains how to introduce flexible working, what technologies to consider and how to succeed at implementation.
Posted: 07 Apr 2016 | Published: 07 Apr 2016

ComputerWeekly.com

Cybercrime and warfare: All that matters
sponsored by ComputerWeekly.com
BOOK: Peter Warren and Michael Streeter assess  the history, scale and importance of cyber crime this chapter from their book, Cybercrime and warfare: All That Matters.
Posted: 04 Dec 2013 | Published: 04 Dec 2013

ComputerWeekly.com

Storage strategies for the health IT professional
sponsored by EMC Isilon
PRESENTATION TRANSCRIPT: In this presentation transcript, Marc Staimer, president of Dragon Slayer Consulting, describes the basics of tiered storage architecture and demonstrates how health care organizations can set policies to automate the process of moving data to different tiers.
Posted: 31 Aug 2012 | Published: 31 Aug 2012

EMC Isilon

Transforming Healthcare Delivery with Analytics
sponsored by IBM
WHITE PAPER: In this white paper, learn how data mining and statistical analysis can dramatically improve patient care and satisfaction without stretching your budget.
Posted: 13 Aug 2012 | Published: 13 Aug 2012

IBM

About to Buy Guide: Building a Business Case for DR
sponsored by SearchCIO.com
EGUIDE: Are you a CIO looking to justify your DR project to upper management? This Q&A with Paul Kirvan, a consultant with more than 20 years of experience in business continuity management, will give you a perspective on the overall issue of DR and why your organization should implement a documented backup plan.
Posted: 05 Mar 2013 | Published: 05 Mar 2013

SearchCIO.com
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement