Computer Science Education Reports

Business email compromise prevention tips
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: It's easy to see why Business Email Compromise attacks work. Preventing them, however, is not so simple -- especially when attackers rely on cognitive biases. Distinguishing between genuine and fraudulent email communications is challenging enough -- and it's also only part of reducing BEC risk. Here are 8 BEC prevention tips for security leaders.
Posted: 15 Mar 2023 | Published: 16 Mar 2023

TechTarget ComputerWeekly.com

CW Middle East ezine July 2018
sponsored by TechTarget ComputerWeekly.com
EZINE: What more does a region need to be recognised as a technology leader than its very own valley, of the silicon variety? Where once only oil flowed down Saudi Arabia's economic valleys, tech has now taken a grip. Read in this issue about the country's ambitions in the tech sector.
Posted: 08 Feb 2021 | Published: 12 Jul 2018

TechTarget ComputerWeekly.com

Computer Weekly – 9 May 2017: Casting the IT skills net wider
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, as research reveals that three-quarters of non-tech workers would be interested in a job in IT, we examine what's stopping them. We analyse the key storage elements of building a private cloud. And Bloomberg's head of data science talks about the benefits of machine learning. Read the issue now.
Posted: 08 Feb 2021 | Published: 09 May 2017

TechTarget ComputerWeekly.com

Best Practices in Performance Management: Monitor, Measure and Manage the End User Experience
sponsored by Knoa Software
WHITE PAPER: This report is the result of a study taken by 87% of IT executives on the best way to manage the service of business critical applications to measure performance at the end-user level. Read this to learn the best practices in performance management.
Posted: 09 Sep 2008 | Published: 09 Sep 2008

Knoa Software

BI: The Inconvenient Truth
sponsored by Kalido
WHITE PAPER: What’s the truth behind the failure of many BI projects? Read this paper to learn the main factors leading to disappointment. These pitfalls are not those of new entrants to BI but have been repeated by smart and well managed companies worldwide.
Posted: 04 Jun 2008 | Published: 01 Jan 2008

Kalido

Informal Learning: Extending the Impact of Enterprise Ideas and Information
sponsored by Adobe
WHITE PAPER: Forward-thinking organizations are turning to enterprise learning in their quest to be better informed, better skilled, better supported at the point of need, and more competitive in their respective marketplaces.
Posted: 10 Apr 2008 | Published: 01 Apr 2007

Adobe

Seven Steps for Effective Leadership Development
sponsored by Oracle Corporation
WHITE PAPER: This white paper discusses the technology that can be deployed to extend talent management practices across the enterprise with a focus on leadership positions.
Posted: 03 Jan 2014 | Published: 03 Jan 2014

Oracle Corporation

Planning a Career Path in Cybersecurity
sponsored by Global Knowledge
WHITE PAPER: The need for personnel knowledgeable and experienced in security implementation and management has never been greater, and the need is growing.
Posted: 01 Nov 2013 | Published: 01 Nov 2013

Global Knowledge

Agile Transformation Strategy
sponsored by CollabNet
WHITE PAPER: The CollabNet Agile Coaches have observed patterns and key milestones in the way organizations adopt and scale Agile. "Agile Transformation Strategy," by Angela Druckman, CollabNet Certified Scrum Trainer and Agile Transformational Coach, outlines a sound strategy and transformational "blueprint" to help guide organizations on the path to Agility.
Posted: 08 Apr 2011 | Published: 08 Apr 2011

CollabNet

Information Security Asean July 2015
sponsored by TechTarget
EZINE: Cyber-crime is a global phenomenon. No business is safe if they fail to implement the right security products and policies.
Posted: 07 Jul 2015 | Published: 07 Jul 2015

TechTarget