The year 2009 has been a successful one for the Knowledge Network. We have gathered almost 500 tools and resources for our readers to use in the workplace. Here is a look at 10 of the best research documents uploaded to the Knowledge Network this year.
This Information Security Handbook provides a broad overview of information security program elements to assist managers in understanding how to establish and implement an information security program.
This publication describes the characteristics of IDPS technologies and provides recommendations for designing, implementing, configuring, securing, monitoring and maintaining them.
IT plays an integral and ubiquitous role in business operations and represents, on average across industries, 6 percent of revenue. So during times of financial pressure or economic downturn, the IT budget will undergo significant scrutiny in efforts to reduce company expenditures. This research document lists recommendations for preparing and communicating a winning budget.
The following reduction tips are designed to reduce the amount of office waste that otherwise would have to be recycled, burned, or placed in a landfill.
This 12th edition of Greenpeace's "Guide to Greener Electronics" ranking reveals that the world's biggest PC makers-HP, Dell and Lenovo -- have failed to improve their low scores. All three maintain a penalty point for backtracking on their commitments to eliminate polyvinyl chloride (PVC) plastic and brominated flame retardants (BFRs) from their products by the end of 2009.
While there is no silver bullet to ensure employment with the newly merged company, there are several steps you can take to improve the chances of remaining gainfully employed. Info-Tech Research Group has provided these recommendations for avoiding a pink slip.
This PC Security Handbook is designed to help you find ways to protect your Windows XP/Vista/7 PC and ensure your data is safe.
ISO 9000 is a family of standards for quality management systems. This tip sheet, provided by The 9000 Store, gives readers tips and techniques, but also addresses common setbacks that might occur and how to avoid them.
Complete with detailed case studies, this report will help you plan and execute your SharePoint deployment. This report explains each of the six SharePoint functions and how they are used. The report also describes the critical differences between versions of SharePoint; warns of challenges that you might face and how to mitigate them; and supplies case studies on real-world implementations of SharePoint.
As cybercriminals begin to take advantage of the holiday season, McAfee, Inc. revealed the "Twelve Scams of Christmas"-the 12 most dangerous online scams that computer users should be cautious of this holiday season. Here is McAfee's checklist of the top scams and a list of best practices to help users avoid them.