Search

Your search keyword '"*COMPUTER industry"' showing total 138 results

Search Constraints

Start Over You searched for: Descriptor "*COMPUTER industry" Remove constraint Descriptor: "*COMPUTER industry" Topic computer security Remove constraint Topic: computer security Topic computer software Remove constraint Topic: computer software
138 results on '"*COMPUTER industry"'

Search Results

1. Security Kernel Validation in Practice.

2. A Brief History of Software Technology.

3. On Optimal Deadlock Detection Scheduling.

4. Frame-Based Proportional Round-Robin.

5. Combining Crypto with Biometrics Effectively.

6. A Fault Attack on Pairing-Based Cryptography.

7. Composing Adaptive Software.

8. AVG LAUNCHES INTERNET SECURITY 8.0.

9. The Absolute Worst (So Far).

10. ZONE LABS CRACKS SPYWARE WITH NEW OSFIREWALL.

11. The Future of Software Infrastructure Protection.

12. SECURITYREPORTER DELIVERS CENTRAL MONITORING/REPORTING.

13. SECUREMYCOMPANY PROVIDES MACAFEE PROTECTION FOR MONTHLY FEE.

14. TREND MICRO UNVEILS INTERSCAN GATEWAY SECURITY APPLIANCE.

15. Editorial Pointers.

16. Hotter Events.

17. CLASH OF THE TITANS.

18. Disarming Worms of MASS DESTRUCTION.

19. Secure Content Collaboration with Information Rights Management.

20. Detection vs. Prevention: Evolution or Revolution?

21. A Developmental View of System Security.

22. ICSA CERTIFIES PANDA FOR DESKTOP/SERVER ANTI-VIRUS DETECTION.

23. To protect and preserve.

24. KERIO UNVEILS MAILSERVER 6.1 WITH SPF/SPAM REPELLENT.

25. Reader mail.

26. Unmasking Spyware.

27. IRS blasts worm with autonomic software.

28. New Chips Stop Buffer Overflow Attacks.

29. Systems Uses Existing Attacks to Predict Future Threats.

30. Fingerprint competition announced

31. Cutting the 'Apple Tax'.

32. LINKSYS/TREND MICRO UNVEIL ADVANCED INTERNET SECURITY.

33. Ryan Naraine: Security Watch.

34. Will the Web 2.0 bubble burst?

35. Oracle rolls out compliance software.

36. Multiple Bugzilla bugs squashed.

37. Widgets Phone Home.

38. THIS eWEEK.

39. Intel to take PCs virtual.

40. EMC offers virtual tape shredding.

41. Microsoft's silence isn't golden.

42. PODCASTS.

43. BACKUP SOFTWARE PROBLEMS.

44. WEBLOG.

45. Stop leaks before they start.

46. ABC of ICT.

47. BUGS & FIXES.

48. Vulnerabilities are everywhere.

49. Rule One: They're Our Machines.

50. Q1 Labs to announce QRadar 5.0.

Catalog

Books, media, physical & digital resources