Business of Information Technology  >   Business Management  >   Human Resources Management  >  

Employee Training

RSS Feed    Add to Google    Add to My Yahoo!
Employee Training Reports
Windows Server 2012 Security from End to Edge and Beyond
sponsored by
BOOK: This extract from the book Windows Server 2012 Security from End to Edge and Beyond shows you how to plan your platform security requirements and gives you the critical questions to ask.
Posted: 02 Sep 2013 | Published: 02 Sep 2013

Tactics to combat insider threat
sponsored by
ESSENTIAL GUIDE: This article in our Royal Holloway Security Series argues that the threat to an organisation’s data security from within its workforce requires a considered and objective approach.
Posted: 22 Jul 2014 | Published: 22 Jul 2014

Executing your strategy 4: Synthesis
sponsored by
ESSENTIAL GUIDE: This is the fourth of six part guide which explains the key steps of the Strategic Execution Framework, developed by the Stanford Advanced Management Programme.
Posted: 17 Jan 2014 | Published: 17 Jan 2014

Collaborative Learning in a Project Environment
sponsored by
ESSENTIAL GUIDE: This guide from ESI International explains how organisations can harness collaborative learning to drive better project management.
Posted: 05 Apr 2013 | Published: 05 Apr 2013

Benefits Management: How to increase the business value of your IT projects
sponsored by
BOOK: This book extract explains how organisation can uses benefits management techniques to increase the value of IT projects to the business.
Posted: 15 Feb 2013 | Published: 15 Feb 2013

Learning Computing: Why object orientated programming works.
sponsored by
JOURNAL ARTICLE: Programming is a journey between the real world and a computer. This article explains why object orientation is currently the best way we have of making the journey.
Posted: 05 Jan 2012 | Published: 05 Jan 2012

Data Protection Masterclass: Global Privacy
sponsored by
ESSENTIAL GUIDE: This presentation from international law firm, Morrison and Foerster offers guidance to companies attempting to navigate privacy regulations in multiple jurisdictions.
Posted: 12 Jun 2012 | Published: 24 May 2012

BYOD Security Policy Considerations and Best Practices
sponsored by
EGUIDE: This E-Guide from unveils best practices for creating your enterprise's bring your own device (BYOD) policy and steps you should take to ensure access and freedom for your employees without sacrificing corporate security and control.
Posted: 26 Nov 2012 | Published: 26 Nov 2012

Red Hat JBoss Middleware and Fuse Training and Certification
sponsored by Red Hat
DATA SHEET: In this brief data sheet, learn about a training and certification program from Red Hat that can help your IT staff get more out of JBoss and Fuse technology.
Posted: 15 May 2014 | Published: 15 May 2014

Red Hat

Adoption Readiness Tool (ART) Training and Services
sponsored by Hewlett-Packard Limited
WHITE PAPER: Well-trained users are more productive and more successful in carrying out their roles. This whitepaper looks at what companies can do to build custom training and documentation.
Posted: 12 Nov 2013 | Published: 01 Jan 2013

Hewlett-Packard Limited
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement