The Business Forum

"It is impossible for ideas to compete in the marketplace if no forum for
  their presentation is provided or available."         Thomas Mann, 1896


The Business Forum Library

401(k) Plans - Update
A Multi-Layer Approach to Security 
A Primer on Electronic Document Security
A Security Blueprint for Enterprise Networks
Accelerating Web Applications with ZXTM 
Achieving Business Intelligence thru Project Intelligence 
Addressing the Key Implications of Sarbanes-Oxley 
Addressing Regulatory Compliance Issues
Antivirus Solutions are one step behind Viruses 
Architecture for Federated Portals
Attack Trees: It's a Jungle out there.   
Back to the Future  A Balanced Approach to Long-Tern Incentives
Becoming a Zero Waste to Landfill Facility 
Best Practices for Better WebSphere Performance  
Better Management for Network Security
Bitkoo’s SecureWithin™ - How does it work?  
Bringing the Balanced Scorecard to Life
Build Good Leaders and Diversity Will Follow 
Building a Self-Defending Network
Business Continuity Management
Business Intelligence Within Reach 
Business Resumption Planning
Cisco Threat Defense System Guide
Cognitix Reflective & Collection Methods 
Complying to the Gramm-Leach-Bliley Act

Connectivity & Integration for Corporate Benefits Department
Conflict Resolution Management
Contemporary Logistics  
WebSphere - Creating a Framework

Dedicated Perimeter Protection Strategy  
Disaster Recovery Begins With Having a Plan
Doing Business in International Markets A Human Resources Perspective
Due Care in Security Management  

e-Business System Requirements
e-Commerce 101
e-Commerce Components for the Internet
Easing the IT Audit
Easing the IT Audit - Part II
Electronic Commerce Explained
Enabling your enterprise to deliver IT service excellence
Encrypting ATM Firewall
Encryption Technology
End Point Security 
Enhanced Partnerships for Global Humanitarian Relief and Diplomacy 
Enterprise Policy Management for Security & Compliance
Enterprise Project Management 
Enterprise Portals
Enterprise Security  
Enterprise Security Management: Managing Complexity  
Examining the Sarbanes-Oxley Act

Exercising the Disaster Management Team 
Federated Identity Management
Fighting High Technology Theft with High Technology 
For C.E.O.'s Only  Creating a New Company for a New Economy
Forensics Data Handling
From Disappearing Boundaries to Security Governance
Getting more from Server Virtualization 
Getting the Most from Manufacturing Cells 
Guarding the Information Infrastructure
HIPAA - Final Security Rule 
How to Take Your Inbox Back 
How to use Collaborative Commerce to Manage the Extended Enterprise.  
HR Information Services, PeopleSoft and all that . . .
IBM Tivoli Security Compliance Manager
Identity, Identifiers and Identity Fraud
Implementing an Enterprise Wide Background Screening Solution 
Increasing Network Productivity
Information Services Amid Change and Uncertainty
Internal Computer Investigations under Sarbanes-Oxley
Internet Protocol Security 
Insider Attack Detection Using Cyber Sensor Fusion    
Integrating Systems, Customers & Suppliers 
International Human Resource Management
Intrusion Protection for Remote Corporate Users 
Investment Due Diligence - 401(k) Plans
Is Web Service Technology a Good Fit for My Organization?
IT Regulatory Compliance & Risk Management 

Making Sense of eCRM  Electronic Customer Relationship Management
Manage Users and Devices to Maximize Security.
Manageable Identities
Managing Risk Without Precedent  Terror Attacks at Chemical Facilities
Marketing on the Internet
Maximizing HR Contributions To Company Success
Metric of Network Integrity
Modeling the Business Environment
Money Across Generations Study  
National Security Concerns
Network Access Control Technologies

New Incident Response Best Practices    
New Strategies in Risk Management
NSM Technical Overview White Paper
Off-shoring and Outsourcing 

Outsourcing Internal Control Methodology for Information Systems
Paperless Benefits Administration
People Issues that Cause eCommerce Projects to Fail
Perfect Exit Strategy for Owners of Closely Held Businesses
Personal Health Information   
Personal Wireless Devices
Pre-Admission Network Access Control
Preparing and Fine-Tuning Your Crisis Plan
Process Before Technology    
Process Control
Protecting Access to Web-based Applications 
Protecting Enterprise Messaging Systems 
From Spam, Viruses, & Other Threats
Physical Level Systems Design  The ignored component of Systems Analysis & Design Training  
Remote Access for Business Continuity 
Remote Access for Healthcare  
HIPAA and Beyond   
Responding to IT Security Incidents
Resourceful Revenue Recovery 
Reverse Logistics  
ROI as it applies to eCommerce or IT Projects
Sales and Operations Planning 
Scaling your services with ZXTM Global Load Balancer  
Secure Authentication & Access to Critical Resources

Secure Connectivity - at a Glance  
Secure Identity Management 
Secure Remote Access 
Securing & Managing Access to Web Applications 
Security in a World of Electronic Commerce
Security in Information Technology
Security Management Solutions
Security Monitoring
Security Solutions - Executive Brief 
Selecting & Monitoring 401(k) Plans
Seven Keys to Internet Selling Success
SIM Based WLAN Authentication for Open Platforms
Sophisticated Tools or Afterburners on a Mule? 
Software-Aided Performance Management
Software Quality Management from IBM: 
Software Testing as a Strategic Business Advantage
Technology Best Practices for Endpoint Security
Testing SOA Applications  
The Antivirus Defense-in-Depth Guide

The Case for the Full-Function Project Office
The Extended EAI Solution
The Joy of Sarbanes-Oxley
The Marriage of Physical & Logical Access   
The New Pay
The User Interface 
Control Panel Design & Manufacture
The SAHANA Disaster Management System  
Total Cost of Ownership in the Open Source Database Community
TPBroker for C++ & TPBroker for Java Architecture
Trends in US Corporations 
How are they affecting Cyberattacks?
TruPrevent Technologies: Technical Overview
Understanding Network Access Control
Understanding Web Application Security Challenges 
Unorthodox Moves for Talented Women
Viruses, Worms, And Hoaxes...! 
Web Content Filtering in the Corporate Network Perimeter
Weblication Technology
WebSphere Application Server & Database Performance Tuning 
WebSphere -
Creating a Framework 
Wireless LAN (WLAN) 
Wireless Security  
Extending Access to the Road Warrior 
When am I done testing? 
Where to in the New Economy?
Women in the Corporate World    
Workers’ Compensation Reform
(The Garamendi Plan)
Workers’ Compensation System Overview
Workers' Compensation White Paper - July 2003
Workers’ Compensation - 04-15-2004  Conference Report Committee Analysis 
Who Goes There?  Authentication in the On-Line World
XML Trends and eCommerce

The Business Forum Library

Search Our Site

Search the ENTIRE Business Forum site. Search includes the Business
Forum Library, The Business Forum Journal and the Calendar Pages.


The Business Forum, its Officers, partners, and all other
parties with which it deals, or is associated with, accept
absolutely no responsibility whatsoever, nor any liability,
for what is published on this web site.    Please refer to:

legal description

Home    Calendar    The Business Forum Journal    Features
Concept    History    Library    Formats   Guest Testimonials
Client Testimonials     Experts    Search    News Wire    Join
Why Sponsor   Tell-A-Friend   
Contact The Business Forum

The Business Forum

Beverly Hills, California United States of America

Email:  [email protected]

Graphics by DawsonDesign


Copyright The Business Forum Institute 1982 - 2009  All rights reserved.