Business of Information Technology  >   Business Management  >   Human Resources Management  >  

IT Training

RSS Feed    Add to Google    Add to My Yahoo!
IT TrainingReports
 
2013 Cost of Data Breach Study: UK
sponsored by ComputerWeekly.com
RESEARCH CONTENT: The cost of data breaches has risen for UK organisations iover the past year, but companies that appoint chief information secruity officers with enterprise-wide responsiblities can reduce their costs, this report from the Ponemon Institute reveals.
Posted: 05 Jun 2013 | Published: 05 Jun 2013

ComputerWeekly.com

UK Computer Science Education in the 21st Century
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Management consultant Yva Thakurdas assesses the scale of the UK IT skills gap, analyses its causes and potential solutions in this presentation.
Posted: 03 Apr 2013 | Published: 03 Apr 2013

ComputerWeekly.com

Top 10 Project Management Trends For 2014
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: There is growing unease with the status quo of current project management practices, this report from ESI International reveals
Posted: 07 Jan 2014 | Published: 07 Jan 2014

ComputerWeekly.com

Women in Technology 2012
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Women technology experts find their careers just as rewarding as men, but image problems are deterring new female recruits, this exclusive research from Computer Weekly and Mortimer Spinks reveals.
Posted: 09 Jul 2012 | Published: 12 Jul 2012

ComputerWeekly.com

SANS - Survey on Application Security Programs and Practices
sponsored by Hewlett-Packard Company
WHITE PAPER: This SANS report pinpoints where the vulnerability gaps lie in today's application security programs. Click through for key recommendations on how to address these issues.
Posted: 04 Apr 2014 | Published: 28 Feb 2014

Hewlett-Packard Company

10 Tips to Measure Training ROI
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: How do you measure the value of training to the business ? These tips will help you develop your business case.
Posted: 21 Sep 2012 | Published: 21 Sep 2012

ComputerWeekly.com

Consumerisation and BYOD Purchasing Intentions Europe 2013
sponsored by ComputerWeekly.com
RESEARCH CONTENT: This exclusive Computer Weekly/TechTarget research reveals European organisations plans for BYOD and Consumerisation of IT.
Posted: 19 Dec 2013 | Published: 19 Dec 2013

ComputerWeekly.com

Measuring End User Susceptibility and Defenses Against Phishing Attacks with CORE Insight
sponsored by Core Security Technologies
WHITE PAPER: This white paper contains critical information about spear phishing and how to prepare your users and systems from falling for these targeted attacks being masked as trustworthy content.
Posted: 11 Oct 2013 | Published: 11 Oct 2013

Core Security Technologies

Social channels changing contact center certification
sponsored by Salesforce.com
EGUIDE: In this expert tip, find out which certification programs are getting overhauled, including those focused on individual call center managers and agents, such as the program from ICMI, and the costs associated with these certifications.
Posted: 20 Mar 2012 | Published: 20 Mar 2012

Salesforce.com

Red Hat JBoss Middleware and Fuse Training and Certification
sponsored by Red Hat
DATA SHEET: In this brief data sheet, learn about a training and certification program from Red Hat that can help your IT staff get more out of JBoss and Fuse technology.
Posted: 15 May 2014 | Published: 15 May 2014

Red Hat
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement