30 Results for:IC/E

  • Sort by: 

How security operations centers work to benefit enterprises

By Ernie Hayden 17 May 2018

One key support system for enterprises is security operations centers. Expert Ernie Hayden reviews the basic SOC framework and the purposes they can serve. Read More

How collaboration will feature in the future of digital supermarkets

By Clare McDonald 25 Oct 2016

Morrisons’ new deal with Ocado has helped the supermarket chain expand its online capabilities, but will we see more collaboration between retailers and digital service providers in the future? Read More

Targeted Cyber Attacks

16 Dec 2014

In this excerpt of Targeted Cyber Attacks, authors Aditya Sood and Richard Enbody outline the cyberattack model and different vectors used to attack targets. Read More

How retailers are using technology to remain relevant

By Ben Sillitoe 27 Sep 2017

From the constant innovation at Asos, Amazon and Missguided to the new supply chain prowess flaunted by Diesel and Gap, fashion retailers are investing in tech to stay relevant to their customers Read More

An inside look at IoT gateway vendors, classifications

By Ellen Muraskin 21 Jan 2019

It's easy to get confused when it comes to IoT gateways. Learn about IoT gateway options, IoT gateway vendors and where products fit into the edge gateway spectrum. Read More

Drone kill communications net illustrated

By Mark Ballard 13 Jun 2014

Computer Weekly can illustrate how a UK network connection forms part of a US weapons targeting system that has slaughtered civilians in attacks gone wrong.The illustrations add credibility to a ... Read More

Intercepting JNDI Filters

01 Nov 2008

This article presents a simple filtering framework to "intercept" JNDI operations and objects in a non-intrusive way (without code changes or the overhead of AOP systems). Read More

Five steps to stamp out unsafe Wi-Fi use

By Lisa Phifer 07 Jun 2006

Lisa Phifer helps dispel the top myths of wireless security and explains five steps that network administrators can take to lead their users toward safer Wi-Fi usage. Read More

New virtual machine management using VMM, PowerShell

24 Mar 2010

Use this chapter excerpt to get tips for new virtual machine management, including how to add a managed host to Virtual Machine Manager by using PowerShell scripts. Read More