Business of Information Technology  >   Business Management  >   Human Resources Management  >  

Staff Training

RSS Feed    Add to Google    Add to My Yahoo!
Staff TrainingReports
 
Jim Norton: The boardroom view of IT
sponsored by ComputerWeekly.com
PRESENTATION: Jim Norton, former BCS president and chartered director, explains the 5 key roles of the CIO and offers tips to CIOs on building credibility with the board.
Posted: 07 Sep 2012 | Published: 05 Sep 2012

ComputerWeekly.com

Women in IT: Labour shadow minister, Chi Onwura
sponsored by ComputerWeekly.com
PRESENTATION: Labour's shadow cabinet office minister, with responsibility for cyber security, Chi Onwura, gives her views on tackling the gender balance in this PowerPoint presentation.
Posted: 17 Jul 2013 | Published: 17 Jul 2013

ComputerWeekly.com

IT Security Purchasing Intentions 2013
sponsored by ComputerWeekly.com
RESEARCH CONTENT: This in-depth research from Computer Weekly and TechTarget reveals the IT security spending priorities of businesses in the UK and Europe.
Posted: 30 Nov 2012 | Published: 30 Nov 2012

ComputerWeekly.com

Top 10 Project Management Trends for 2013
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: A global panel of experts identify the top 10 trends in project management in 2013
Posted: 05 Jan 2012 | Published: 24 Jan 2013

ComputerWeekly.com

Data Protection Masterclass: Global Privacy
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This presentation from international law firm, Morrison and Foerster offers guidance to companies attempting to navigate privacy regulations in multiple jurisdictions.
Posted: 12 Jun 2012 | Published: 24 May 2012

ComputerWeekly.com

BYOD Security Policy Considerations and Best Practices
sponsored by SearchSecurity.com
EGUIDE: This E-Guide from SearchConsumerization.com unveils best practices for creating your enterprise's bring your own device (BYOD) policy and steps you should take to ensure access and freedom for your employees without sacrificing corporate security and control.
Posted: 26 Nov 2012 | Published: 26 Nov 2012

SearchSecurity.com

CW+: Open Group technical report: IT Specialist Certification (ITSC) accreditation requirements
sponsored by ComputerWeekly.com
WHITE PAPER: The Open Group IT Specialist Certification Program (the Program) is designed to validate the existence of those qualities and skills in a professional that enable the effective development, implementation, and operation of IT solutions.
Posted: 20 Oct 2011 | Published: 22 Oct 2010

ComputerWeekly.com

Social channels changing contact center certification
sponsored by Salesforce.com
EGUIDE: In this expert tip, find out which certification programs are getting overhauled, including those focused on individual call center managers and agents, such as the program from ICMI, and the costs associated with these certifications.
Posted: 20 Mar 2012 | Published: 20 Mar 2012

Salesforce.com

Measuring End User Susceptibility and Defenses Against Phishing Attacks with CORE Insight
sponsored by Core Security Technologies
WHITE PAPER: This white paper contains critical information about spear phishing and how to prepare your users and systems from falling for these targeted attacks being masked as trustworthy content.
Posted: 11 Oct 2013 | Published: 11 Oct 2013

Core Security Technologies

Next-Generation Mainframe Computing
sponsored by CA Technologies.
WHITE PAPER: This white paper provides insight into the current state of the mainframe. Discover three challenges affecting the future of these technologies and learn how to successfully overcome them.
Posted: 15 Jul 2011 | Published: 15 Jul 2011

CA Technologies.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement