Search

Your search keyword '"Vince, A."' showing total 203 results

Search Constraints

Start Over You searched for: Author "Vince, A." Remove constraint Author: "Vince, A." Journal computerworld Remove constraint Journal: computerworld
203 results on '"Vince, A."'

Search Results

1. SNMP Vulnerability Offers 3,200 Reasons to Worry

2. ThisWeek'sGlossary

3. The Strange Case of The Phantom Intruder

4. User Indifference Thwarts Electronic Signature Effort

5. This Week's Glossary

6. Annual Audits Target Security but Miss Mark

7. ThisWeek'sLinks

8. The Case of the Worm Attack That Wasn't

9. SecurityBookshelf

10. Nimda Slips Through Best Corporate Defenses

11. Security Manager Explains How Not to Get a Job

12. Wireless Network Fails Corporate Security Test

13. Legal Insecurities Stymie Web Site Outsourcing Deal

14. Security Manager's Journal

15. xSP Security Requires Client Participation

16. Dot-com Brain Drain Helps Corporate Security

17. SANS Course: Security Manager's Boot Camp

18. Manager Offers Primer On Computer Forensics

19. Glossary

20. Message to Vendors: Drop the Mind Games

21. Security Outsourcing: Don't Bet on It - Yet

22. CIO Demands Security Update: Are You Ready?

23. Who's That Knocking At My Door? Go Away!

24. Human Factor Derails Best-Laid Security Plans

25. Antivirus Safety Net Has Too Many Holes

26. Weekend Wasted as Firewall Upgrade Flames

27. Anatomy of an Attack: A Race Against Time

28. Chinks Begin to Appear in the Antivirus Armor

29. Security bookshelf

30. Wireless hackers leave no tracks: unprotected WLANs give hackers an untraceable way to launch attacks across the internet

31. Security team practices theft by delusion: a key modem disappears from a high-security area. A case of blackberry devices disappears in transit. These tales of apparent theft take an unexpected twist

32. Back door puts vendor on hot seat: notification of a hidden back door in a wireless LAN product leads to some hard questions during a vendor sales call

33. Building a defense against complaints: dealing with complaints from the public can be a stickier situation than any virus attack

35. This is your attacker calling; protecting networks from hackers is easy compared with guarding against social-engineering attacks

36. e-mail gateway works too well; after blocking a flood of Mydoom e-mails, it spams users with alerts that create a general panic

37. Developer tool kit raises backdoor alarms: when antivirus software points to malware in production applications, the source appears to be the tool kit used to create the affected code

38. Priority scheme aids prevention efforts: continuous monitoring and escalation of vulnerability priority levels helps focus IT security efforts as the quantity of issues increases

40. Security bookshelf

47. Faulty rules foul router protection; a misconfigured access-control list leaves a global network open to a denial-of-service attack

50. Security bookshelf. (Security Log)

Catalog

Books, media, physical & digital resources