Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Criminal Law  >   Crime  >  

Internet Piracy

RSS Feed   
Internet Piracy Reports
 
7 Key Factors to Software Protection
sponsored by Arxan
WHITE PAPER: This white paper explores the magnitude and types of software piracy threats and details the seven key application security factors that must be considered during the development process.
Posted: 08 Jun 2007 | Published: 01 Jun 2007

Arxan

Europe's controversial digital vision for the next decade
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we examine the European Parliament's digital vision for the next decade, including controversial plans for a regional internet. GDPR is two years old – we find out how well the law is working. And we look at how the coronavirus crisis is affecting digital skills recruitment and training.
Posted: 15 Jun 2020 | Published: 16 Jun 2020

ComputerWeekly.com

CW ANZ - December 2018: Rise to cloud and data management challenges
sponsored by ComputerWeekly.com
EZINE: In this edition of CW ANZ, we look at how enterprises in ANZ are approaching data management in the cloud, and some of the best practices that they can adopt to address cloud related challenges.
Posted: 14 Dec 2018 | Published: 14 Dec 2018

ComputerWeekly.com

CW500: Key trends for IT leaders in 2017 – technology trends
sponsored by ComputerWeekly.com
PRESENTATION: A look forward to the 12 months ahead for IT leaders and the key trends of the coming year - this presentation came from Spencer Izard, chief analyst in the enterprise advisory team at Ovum, discussing the major technology trends for this year.
Posted: 07 Feb 2017 | Published: 07 Feb 2017

ComputerWeekly.com

The gender pay gap
sponsored by ComputerWeekly.com
RESEARCH CONTENT: This survey of 1,000 UK workers by CV-Library found that the pay gap is still a concern for professionals working in the UK.
Posted: 26 Apr 2017 | Published: 26 Apr 2017

ComputerWeekly.com

Metropolitan Police Freedom of Information disclosure on investigations into WikiLeaks
sponsored by ComputerWeekly.com
RESOURCE: Letter from the Met Police to Stefania Maurizi, an investigative journalist with Italy's La Repubblica newspaper, confirming that the police service shared correspondence about one or more of three named WikiLeaks British editorial staff with the US Department of Justice. The letter is a response to a freedom of information request by Maurizi.
Posted: 14 Mar 2019 | Published: 14 Mar 2019

ComputerWeekly.com

Top-10 Guide for Protecting Sensitive Data from Malicious Insiders
sponsored by Imperva
WHITE PAPER: Insider threats, both careless and malicious, abound. This fact is amplified during difficult economic times. With a plethora of digitized information, and vehicles for turning credit card data, personally identifiable information and intellectual property into cash, goods, and other services, risks have increased.
Posted: 04 Feb 2011 | Published: 04 Feb 2011

Imperva

Web Threats 2010: The Risks Ramp Up
sponsored by CSC
WHITE PAPER: In the face of unprecedented web threat level growth, CSC CloudProtection for Mail and Web delivers protection of the very highest quality for thousands of businesses worldwide. Read this white paper to learn more about today's web threats and how your business can protect itself against them comprehensively and cost-effectively.
Posted: 17 Nov 2010 | Published: 17 Nov 2010

CSC

Transforming Healthcare Delivery with Analytics
sponsored by IBM
WHITE PAPER: In this white paper, learn how data mining and statistical analysis can dramatically improve patient care and satisfaction without stretching your budget.
Posted: 13 Aug 2012 | Published: 13 Aug 2012

IBM

Information Security Asean July 2015
sponsored by TechTarget ANZ
EZINE: Cyber-crime is a global phenomenon. No business is safe if they fail to implement the right security products and policies.
Posted: 07 Jul 2015 | Published: 07 Jul 2015

 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info