Project Management Network Diagram: A Tool for Understanding the PM Life Cycle
sponsored by Global Knowledge
WHITE PAPER:
The Project Management Network Diagram (PM Network Diagram) provides a visual illustration of the project management life cycle (in terms of the chain of events that take place in a project).
Posted: 06 Jul 2006 | Published: 01 Jan 2005
|
|
|
Security by design: How Verizon approaches 5G security.
sponsored by Verizon
WHITE PAPER:
As 5G enables new capabilities, security is a key design feature. This white paper examines Verizon's approach to 5G security, including enhancements over 4G, private 5G networks, and alignment with CISA guidelines. Read the full white paper to learn how Verizon is securing 5G for public and private sector organizations.
Posted: 19 Nov 2024 | Published: 20 Nov 2024
|
|
|
Unified Communication: “It should work as easily as a telephone call!”
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE:
This article in our Royal Holloway Information Security series explains the security implications of unified communication.
Posted: 08 Feb 2021 | Published: 15 May 2017
|
|
|
Essential Guide to Software Defined Networks
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
Software defined networking (SDN) allows network engineers to support a switching fabric across multi-vendor hardware and application-specific integrated circuits. A network administrator can shape traffic from a centralised control console without having to touch individual switches.
Posted: 08 Feb 2021 | Published: 12 Feb 2018
|
|
|
The exploitation of flaws in the HTTPS protocol
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT:
For both technical and non-technical users, the presence of "HTTPS" in a website URL will provide confidence to consider entering sensitive information such as bank or credit card details. However, even websites owned by the most reputable organisations may be exposed to attack if HTTPS is not properly implemented.
Posted: 08 Feb 2021 | Published: 16 Apr 2019
|
|
|
Threat Intelligence Report 2024
sponsored by NOKIA
ANALYST REPORT:
The latest Threat Intelligence Report from Nokia explores emerging cybersecurity trends and technologies impacting the telecom industry. Gain insights into global attack patterns, DDoS threat evolution, and the role of AI and quantum computing. Download the full report to stay ahead of evolving cyber threats.
Posted: 23 Nov 2024 | Published: 03 Oct 2024
|
|
|
Threat Intelligence Report 2024
sponsored by NOKIA
ANALYST REPORT:
The latest Threat Intelligence Report from Nokia explores emerging cybersecurity trends and technologies impacting the telecom industry. Gain insights into global attack patterns, DDoS threat evolution, and the role of AI and quantum computing. Download the full report to stay ahead of evolving cyber threats.
Posted: 02 Oct 2024 | Published: 03 Oct 2024
|
|
|
The myth of email as proof of communication
sponsored by TechTarget ComputerWeekly.com
ANALYST REPORT:
Increasingly, there is a need for organisations to be able to prove the content of communications between themselves and other parties. Analyst group Quocirca looks at the options.
Posted: 08 Feb 2021 | Published: 02 Dec 2016
|
|
|
Next generation network security
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
In this e-guide, we explore how network security, while remaining relevant, needs to change in its approach to meet the needs of new technologies and threats. We also look at why it should now be seen as one of several key elements of a modern cyber security strategy.
Posted: 08 Feb 2021 | Published: 21 Mar 2018
|
|
|
Kubernetes Networking and Cilium
sponsored by Cisco
EBOOK:
Kubernetes networking can be daunting, even for seasoned network engineers. This e-book provides a detailed instruction manual on Kubernetes networking fundamentals, Cilium, and advanced features like load balancing, security, and observability. Download the e-book to master Kubernetes networking.
Posted: 07 Dec 2024 | Published: 07 Dec 2024
|
|
|
DDoS Mitigation: Types of DDoS Attacks and Security Considerations
sponsored by Arbor Networks
EGUIDE:
Our experts discuss various DDoS mitigation services and what your organization should consider before implementing cloud DDoS protection. Then, uncover the various types of DDoS attacks and the steps to take towards a more secure and reliable future.
Posted: 08 Feb 2021 | Published: 27 Oct 2017
|
|
|
Jargon Buster Guide to Voice over IP (VoIP)
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
In this Jargon Buster, we'll explore some key definitions around Voice over IP, and look at how VoIP fits into the wider unified communications landscape.
Posted: 08 Feb 2021 | Published: 03 Sep 2018
|
|
|
Computer Weekly – 5 September 2023: Met Police data platform goes £64m over budget
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, we reveal a £64m cost over-run for the Metropolitan Police's new record management system. Our latest buyer's guide looks at the issues around integrating SaaS applications. And a leading flash storage firm says the age of spinning disk drives is almost over – are they right? Read the issue now.
Posted: 01 Sep 2023 | Published: 05 Sep 2023
|
|
|
Email security: Never more important
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
In this e-guide, we look at why businesses need to address email security with a combination of awareness training and automated tools to reduce the likelihood of infection and speed up the detection of and response to email-borne threats.
Posted: 08 Feb 2021 | Published: 30 Jul 2019
|
|
|
Chapter 1: Security and Risk Management
sponsored by McGraw Hill
WHITE PAPER:
In this 174-page chapter download from McGraw Hill, learn everything you need to know about the first domain, security and risk management, to help you excel at your CISSP exam.
Posted: 15 Mar 2021 | Published: 31 Dec 2020
|
|