Search

Your search keyword '"Vince, A."' showing total 292 results

Search Constraints

Start Over You searched for: Author "Vince, A." Remove constraint Author: "Vince, A." Publisher idg communications, inc. Remove constraint Publisher: idg communications, inc.
292 results on '"Vince, A."'

Search Results

1. Palmtop PCs Grow Up

2. SNMP Vulnerability Offers 3,200 Reasons to Worry

3. ThisWeek'sGlossary

4. The Strange Case of The Phantom Intruder

5. User Indifference Thwarts Electronic Signature Effort

6. This Week's Glossary

7. The Case of the Worm Attack That Wasn't

8. SecurityBookshelf

9. Wireless Network Fails Corporate Security Test

10. ThisWeek'sGlossary

11. Security Manager's Journal

12. xSP Security Requires Client Participation

13. Dot-com Brain Drain Helps Corporate Security

14. SANS Course: Security Manager's Boot Camp

15. Manager Offers Primer On Computer Forensics

16. Glossary

17. Who's That Knocking At My Door? Go Away!

18. Human Factor Derails Best-Laid Security Plans

19. Antivirus Safety Net Has Too Many Holes

20. Weekend Wasted as Firewall Upgrade Flames

21. Chinks Begin to Appear in the Antivirus Armor

22. AlphaSmart 3000

23. HP's Sub-$2000 Celeron-333 Notebook

24. Va-Va-Va-Vaio! Sony's Sexy Subnote

25. Better backup pipeline fits a plumbing company

26. Larry, Mo, and Moses

27. Security bookshelf

28. Wireless hackers leave no tracks: unprotected WLANs give hackers an untraceable way to launch attacks across the internet

29. Security team practices theft by delusion: a key modem disappears from a high-security area. A case of blackberry devices disappears in transit. These tales of apparent theft take an unexpected twist

30. Building a defense against complaints: dealing with complaints from the public can be a stickier situation than any virus attack

32. This is your attacker calling; protecting networks from hackers is easy compared with guarding against social-engineering attacks

33. e-mail gateway works too well; after blocking a flood of Mydoom e-mails, it spams users with alerts that create a general panic

34. Priority scheme aids prevention efforts: continuous monitoring and escalation of vulnerability priority levels helps focus IT security efforts as the quantity of issues increases

36. Security bookshelf

42. Faulty rules foul router protection; a misconfigured access-control list leaves a global network open to a denial-of-service attack

45. Security bookshelf. (Security Log)

47. Office politics plays role in postmerger security: A committee meeting falls flat as management withdraws support and the vendor rep in attendance takes a snooze. (Security Manager's Journal)

49. Porn policy collars a million-dollar customer: the HR department bends some rules when offensive content comes in from the company's largest client. (Security Manager's Journal)

50. Securing the Network from Malicious Code. (Security Bookshelf)

Catalog

Books, media, physical & digital resources