Business of Information Technology  >   Business Management  >   Human Resources Management  >  

Education

RSS Feed    Add to Google    Add to My Yahoo!
Education Reports
 
Windows Server 2012 Security from End to Edge and Beyond
sponsored by ComputerWeekly.com
BOOK: This extract from the book Windows Server 2012 Security from End to Edge and Beyond shows you how to plan your platform security requirements and gives you the critical questions to ask.
Posted: 02 Sep 2013 | Published: 02 Sep 2013

ComputerWeekly.com

Governance of IT, an executive guide to ISO/IEC 38500
sponsored by ComputerWeekly.com
BOOK: This extract from the book: Governance of IT, an executive guide to ISO/IEC 38500, tells you the key things you need to consider before you start a project implementation.
Posted: 19 Dec 2013 | Published: 19 Dec 2013

ComputerWeekly.com

The global state of the project management office
sponsored by ComputerWeekly.com
IT BRIEFING: This global benchmarking study from ESI international identifies the key challenges and successes experienced by project and programme management offices (PMO) and draws recommendations for the future.
Posted: 05 Jan 2012 | Published: 05 May 2011

ComputerWeekly.com

Leveraging Talent
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Learn how to make the most of your IT workforce and how to nurture talent by following these strategies used by HR professionals.
Posted: 22 Apr 2014 | Published: 22 Apr 2014

ComputerWeekly.com

Coding for Kids
sponsored by ComputerWeekly.com
BOOK: Get started with coding with this extract from Coding for Kids, which includes a 30% discount code for Computer Weekly readers.
Posted: 21 Nov 2014 | Published: 21 Nov 2014

ComputerWeekly.com

Smarter Planet Industry Solutions technical podcast series: Season 1
sponsored by IBM
PODCAST: Welcome to the IBM developerWorks Smarter Planet Industry Solutions technical podcast series, your source for technical discussions regarding IT solutions for your industry. Tune in every few weeks to hear a new expert discussion.
Posted: 21 Dec 2011 | Premiered: Oct 21, 2011

IBM

How to Solve Security Problems Within Your Organization
sponsored by Wisegate
EGUIDE: Access this e-guide for expert insight on the need for risk management, and why data protection alone isn't enough. Click now to explore how proper education will enable a more robust and knowledgeable IT security team.
Posted: 02 Dec 2013 | Published: 02 Dec 2013

Wisegate

Computer Weekly – 19 Aug 2014: Training school leavers could help organisations develop the IT skills they require and fill the growing skills gap
sponsored by ComputerWeekly.com
EZINE: While the latest GCE A-Level results suggest that more people than ever will go on to study science, technology, engineering and maths (Stem) courses at university, the IT industry is failing to attract enough new talent. An ageing workforce means there is a "demographic time bomb in IT".
Posted: 15 Aug 2014 | Published: 15 Aug 2014

ComputerWeekly.com

Information Security Asean July 2015
sponsored by TechTarget ANZ
EZINE: Cyber-crime is a global phenomenon. No business is safe if they fail to implement the right security products and policies.
Posted: 07 Jul 2015 | Published: 07 Jul 2015


Measuring End User Susceptibility and Defenses Against Phishing Attacks with CORE Insight
sponsored by Core Security Technologies
WHITE PAPER: This white paper contains critical information about spear phishing and how to prepare your users and systems from falling for these targeted attacks being masked as trustworthy content.
Posted: 11 Oct 2013 | Published: 11 Oct 2013

Core Security Technologies
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement