Business of Information Technology  >   Business Management  >   Human Resources Management  >  

Information Technology Education

RSS Feed    Add to Google    Add to My Yahoo!
Information Technology Education Reports
 
Earn your CISSP certification here!
sponsored by TechTarget
RESOURCE: Prepare to reap the benefits of CISSP certification with the help of our step-by-step guide to passing the exam. Just take 5 minutes to complete this survey and receive direct access to our comprehensive e-guide.
Posted: 18 Mar 2014 | Published: 18 Mar 2014

TechTarget

The Mindset of the Chief Information Officer
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This study evaluates the leadership role that Chief Information Officers performs in helping their organisations achieve their commercial goals
Posted: 29 Feb 2012 | Published: 29 Feb 2012

ComputerWeekly.com

Executing your strategy 3: Vision
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This is the third of a six part guide explains the key steps of the Strategic Execution Framework, developed to help organisations stay focused on innovation, increase performance, manage change and scale the business.
Posted: 25 Nov 2013 | Published: 25 Nov 2013

ComputerWeekly.com

Planning a Career Path in Cybersecurity
sponsored by Global Knowledge
WHITE PAPER: The need for personnel knowledgeable and experienced in security implementation and management has never been greater, and the need is growing.
Posted: 01 Nov 2013 | Published: 01 Nov 2013

Global Knowledge

How to Maximize the Return on Your Software Investment
sponsored by Cerri.com AG
WHITE PAPER: You need to understand your software's true capacity. You also need to make the most of your most valuable asset, your employees. This white paper explores several simple strategies for maximizing the return on your software investment.
Posted: 04 Nov 2016 | Published: 04 Nov 2016


Jim Norton: The boardroom view of IT
sponsored by ComputerWeekly.com
PRESENTATION: Jim Norton, former BCS president and chartered director, explains the 5 key roles of the CIO and offers tips to CIOs on building credibility with the board.
Posted: 07 Sep 2012 | Published: 05 Sep 2012

ComputerWeekly.com

IBM Cognos Learning Assessment
sponsored by IBM
WHITE PAPER: This white paper introduces a customized learning assessment work package that extends the value of one business intelligence and performance management platform by teaching your business users the skills they need to drive success.
Posted: 15 Jan 2014 | Published: 31 Mar 2009

IBM

Information Security Asean March 2016
sponsored by TechTarget ANZ
EZINE: Organisations in the Association of Southeast Asian Nations are increasingly the targets for cyber criminals
Posted: 03 Mar 2016 | Published: 03 Mar 2016


Information Security ANZ March 2016
sponsored by TechTarget ANZ
EZINE: Australian organisations face a huge skills shortage when it comes to fighting cyber-crime unless they act quickly
Posted: 03 Mar 2016 | Published: 03 Mar 2016


Measuring End User Susceptibility and Defenses Against Phishing Attacks with CORE Insight
sponsored by Core Security Technologies
WHITE PAPER: This white paper contains critical information about spear phishing and how to prepare your users and systems from falling for these targeted attacks being masked as trustworthy content.
Posted: 11 Oct 2013 | Published: 11 Oct 2013

Core Security Technologies
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement