60 results on '"Data security -- Equipment and supplies"'
Search Results
2. NetHawk VPN hardware gets FIPS approval
3. New security products get up close and very personal
4. Feds come out from hiding at hacker show
5. SECURTIY: THE NEXT FRONTIER
6. Navy buys DMS crypto cards
7. PC BodyGuard quarantines infecting viruses
8. Digital security: fingerprint recognition devices gain in popularity for authenticating users. (Buyers Guide)
9. Fortezza foiled by smart cards
10. NSA will test ATM encryptors
11. Bay Networks uses 'stateful' firewall in its router OS
12. DOD plans to install 750,000 Fortezza cards
13. Once you can take your token, leave your computer behind
14. Feds take a wait-and-see stance on GSA's X.25 encryption tools
15. Unix micros used for C2 in Gulf War
16. 3Com produces hardware firewall for notebook PCs. (New Products)
17. Sonic security appliances do job with little management
18. CellCase 2 increases Secant's range of ATM encryption speeds
19. SentryModem does encryption
20. StorageTek's new ATLAS system keeps data on the move
21. Firewalls vary in form, not function - net security
22. NCipher device takes the encryption load off host CPU
23. Encryptor for frame relay
24. Frame relay encryptor uses DES
25. Lock down a case without glue
26. Lid Lock can keep valuable SIMMs from disappearing
27. Fear and loathing at NSA
28. First ATM cell encryptor created by GTE, Cylink
29. Stoplocked laptop won't blab secrets, event at gunpoint
30. HSSI encryptor for T1, T3 rates
31. Agencies testing secure TCP IP bridge
32. Security device is 007 in your pocket
33. Mail no one can steam open
34. Act of signing becomes security key
35. With this firewall, users of classified networks can receive all their e-mail
36. Mail top-secret data? Now you can
37. Secrets safe with CardSecrets
38. NSA and NIST move ahead with Clipper chip initiative
39. NSA plays trump PC Card
40. Paige mandates 2 PCMCIA slots for security
41. Spies and eavesdroppers, beware: desktop videoconferencing product works with STU-IIIs over phone lines
42. More capable things come in small, low-cost packages
43. Closed book? Tessera card may secure agency secrets
44. The Internet gives you unlimited access to the world. Unfortunately, it also gives the world unlimited access to you
45. WAN security system helps foil illicit remote users
46. Cipher link encryptor secures digital phone network
47. Clipper key escrow agents get set for their added responsibilities
48. Verdix unveils end-to-end encryption systems for LANs
49. Guard secret data on CD-ROM: new standard, products for secure publishing
50. CD-ROM evangelist asks, are you saved?; feds are warned to move tape archives onto CDs or risk losing valuable data
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.