Search

Your search keyword '"Data security -- Equipment and supplies"' showing total 60 results

Search Constraints

Start Over You searched for: Descriptor "Data security -- Equipment and supplies" Remove constraint Descriptor: "Data security -- Equipment and supplies" Journal government computer news Remove constraint Journal: government computer news
60 results on '"Data security -- Equipment and supplies"'

Search Results

1. About to buy a firewall? Read this first

2. NetHawk VPN hardware gets FIPS approval

3. New security products get up close and very personal

4. Feds come out from hiding at hacker show

5. SECURTIY: THE NEXT FRONTIER

6. Navy buys DMS crypto cards

7. PC BodyGuard quarantines infecting viruses

8. Digital security: fingerprint recognition devices gain in popularity for authenticating users. (Buyers Guide)

9. Fortezza foiled by smart cards

10. NSA will test ATM encryptors

11. Bay Networks uses 'stateful' firewall in its router OS

12. DOD plans to install 750,000 Fortezza cards

13. Once you can take your token, leave your computer behind

14. Feds take a wait-and-see stance on GSA's X.25 encryption tools

15. Unix micros used for C2 in Gulf War

16. 3Com produces hardware firewall for notebook PCs. (New Products)

17. Sonic security appliances do job with little management

18. CellCase 2 increases Secant's range of ATM encryption speeds

19. SentryModem does encryption

20. StorageTek's new ATLAS system keeps data on the move

21. Firewalls vary in form, not function - net security

22. NCipher device takes the encryption load off host CPU

23. Encryptor for frame relay

24. Frame relay encryptor uses DES

25. Lock down a case without glue

26. Lid Lock can keep valuable SIMMs from disappearing

27. Fear and loathing at NSA

28. First ATM cell encryptor created by GTE, Cylink

29. Stoplocked laptop won't blab secrets, event at gunpoint

30. HSSI encryptor for T1, T3 rates

31. Agencies testing secure TCP IP bridge

32. Security device is 007 in your pocket

33. Mail no one can steam open

34. Act of signing becomes security key

35. With this firewall, users of classified networks can receive all their e-mail

36. Mail top-secret data? Now you can

37. Secrets safe with CardSecrets

38. NSA and NIST move ahead with Clipper chip initiative

39. NSA plays trump PC Card

40. Paige mandates 2 PCMCIA slots for security

41. Spies and eavesdroppers, beware: desktop videoconferencing product works with STU-IIIs over phone lines

42. More capable things come in small, low-cost packages

43. Closed book? Tessera card may secure agency secrets

44. The Internet gives you unlimited access to the world. Unfortunately, it also gives the world unlimited access to you

45. WAN security system helps foil illicit remote users

46. Cipher link encryptor secures digital phone network

47. Clipper key escrow agents get set for their added responsibilities

48. Verdix unveils end-to-end encryption systems for LANs

49. Guard secret data on CD-ROM: new standard, products for secure publishing

50. CD-ROM evangelist asks, are you saved?; feds are warned to move tape archives onto CDs or risk losing valuable data

Catalog

Books, media, physical & digital resources