Search

Your search keyword '"Peter Ray"' showing total 57 results

Search Constraints

Start Over You searched for: Author "Peter Ray" Remove constraint Author: "Peter Ray" Database Complementary Index Remove constraint Database: Complementary Index
Sorry, I don't understand your search. ×
57 results on '"Peter Ray"'

Search Results

1. CAN AI HELP WITH HMRC'S HUMAN RESOURCES PROBLEM?

2. HOW TO TAKE ADVANTAGE OF OPEN SOURCE BENEFITS: Open source software may provide a cost-effective approach to building business applications, as well as ensuring transparency, but there are challenges to keep in mind.

3. A drone with a ‘rotating detonation rocket engine’ approached the speed of sound.

4. WILL COMPUTATIONAL STORAGE MEET DATA PROCESSING DEMANDS? Computational storage promises performance for workloads that can benefit from dedicated oomph, but don't mistake it for a cure-all.

5. Electronic Paper Displays in Hospital Operations: Proposal for Deployment and Implementation.

6. HOW GAMIFYING CYBER TRAINING CAN IMPROVE YOUR DEFENCES.

7. Cyberpion founder's Russian lesson on the need to protect abandoned digital assets: The war in Ukraine and subsequent boycott of Russia resulted in a swathe of digital infrastructure being abandoned, becoming a potential vulnerability for many organisations

8. THE CYBER SECURITY IMPACT OF OPERATION RUSSIA BY ANONYMOUS: The campaign against the Russian government by Anonymous surprised many with the depth and scale of the cyber attacks. What can we learn from this online war?

9. WHAT THE EU'S CONTENT-FILTERING RULES COULD MEAN FOR UK TECH.

10. ATTACK OF THE CLONES.

11. RECRUITMENT RISKS: AVOIDING THE DANGERS OF FRAUDULENT CANDIDATES: How can organisations protect themselves from fraudulent applicants while ensuring they recruit the best talent?

12. IT TAKES A VILLAGE: PROTECTING KIDS ONLINE IS EVERYONE'S RESPONSIBILITY: The rapid uptake of smartphones among children has contributed to an increase in cyber bullying and online grooming. Can modern enterprise help to fix the problem?

13. IS THE IT SECTOR BESET BY FEAR-MONGERING?

14. ONLINE PLATFORMS TASKED WITH PROTECTING USERS.

18. PATCHING: A BALANCE OF TECH AND BUSINESS NEEDS.

20. Picking the right IAM tools.

21. SOCIAL DISTANCING WITH CROWD SIMULATION MODELLING.

22. BLACK LIVES MATTER, BUT DO BOTS KNOW THAT? Automated moderation to block offensive and objectionable online material only works if systems are configured and reviewed adequately.

23. CONTACT TRACING: PRIVACY VS PROTECTION.

24. WHAT THE EU'S DECISION ON FACEBOOK MEANS FOR SOCIAL MEDIA: A ruling by the European Court of Justice will have global implications for social media companies and any organisations that host online content.

25. Hot Topic.

27. INTEGRATED APPROACH TO DATA RISK MANAGEMENT.

28. HOW DATA PRIVACY CAN BE A BENEFIT, NOT A BURDEN: Organisations can take advantage of increased consumer concern around how their data is used by treating data protection and user privacy as product features.

30. DEBUGGING BUG BOUNTY PROGRAMMES: Bug bounty programmes have become popular, but poor programme management can lead to development teams becoming overwhelmed and bugs being missed.

31. WHAT 802.11AX MEANS FOR YOUR NETWORK.

32. BREXIT IMPLICATIONS FOR DATA PROTECTION.

33. ARE TRUSTED NODES THE KEY TO QUANTUM SECURITY?

34. QUANTUM LEAP AND THE ENCRYPTION CHALLENGE.

35. DOES COLLABORATION SOFTWARE MEAN COMMUNICATION OVERLOAD?

36. APPLICATION AND DEVICE SECURITY UNDER THE SPOTLIGHT.

37. BUSINESS NEEDS TO KEEP UP WITH INVESTIGATORY POWERS ACT.

38. HOW SECURE ARE SMART ENERGY GRIDS?

39. HOW TO PROTECT EMAIL AGAINST ATTACK.

40. HOW TO RIDE WAVE 2 FOR FASTER NETWORK SPEEDS.

41. CRIMINALS IN THE MACHINE: European law enforcement is collaborating with industry around cyber crime as study shows that organised crime groups increasingly exploit new technologies.

42. CHALLENGES OF THE INVESTIGATORY POWERS ACT.

43. WHAT BREXIT MEANS FOR DATA PROTECTION.

44. SOLVING THE HIDDEN THREATS LURKING IN EVERY COMPANY.

45. HOW SIMULATED DISASTER MANAGEMENT CAN HELP TACKLE SECURITY SKILLS GAP.

46. CUTTING THE CABLE.

47. TACKLING INTRUDERS IN SME NETWORKS.

48. WHO GOES THERE?

49. WHAT EU DATA PROTECTION RULES MEAN FOR BUSINESS.

50. HONE BUSINESS PROCESSES WITH DATA MINING AND SIMULATION BLEND.

Catalog

Books, media, physical & digital resources