1,069 results on '"Data security -- Equipment and supplies"'
Search Results
2. Pursuit-evasion on trees by robot teams
3. Free virus and spyware protection: what's right for you? Everyone needs antivirus and antispy ware software, but do you really need to pay for them?
4. Back doors beckon openly
5. Security surges
6. Internet protection
7. An efficient remote use authentication scheme using smart cards
8. VPNs: safety first, but what about speed?
9. In Certificates We Trust -- As digital certificates bring low-cost security to the Internet, E-business takes off
10. Catapults and grappling hooks: the tools and techniques of information warfare
11. The best way to build a VPN
12. Who goes there? Authentication beats passwords for network security
13. Security solidarity
14. Unhook your leased lines
15. VPNs: security with an uncommon touch
16. Security
17. Body language
18. About to buy a firewall? Read this first
19. Firewalls scale to new heights
20. Internet security: how much is enough?
21. Your defensive line
22. Defining dial-in security
23. RAMeX: a prototype expert system for computer security risk analysis and management
24. Token authentication: the safety catch
25. Firewalls for sale
26. Choosing the right firewall to defend your network: a host of products can protect confidential network information from Internet snoopers
27. Data security in X.25 networks
28. Building a high-performance, programmable secure coprocessor
29. Shredders and recycling go hand in hand
30. Shredders for the sake of security
31. Data safety
32. Storage security gains users' attention: SNIA forum proposes best practices
33. Navy secures healthcare network: extranet appliance provides medical information for personnel and their families. (Special focus: E-Business Technologies)
34. Biometrics technology adds innovation to healthcare organization security systems. (Digital Perspectives)
35. Two-hop secure communication using an untrusted relay
36. We do! Nextel Communications marries remote user access with high level data security
37. Physical IT security
38. Security
39. Private links via the Net
40. In net we trust: reliable security is now available on the Internet.
41. Sorting out RAID storage
42. Scrambling frame relay
43. Many options for implementing Fortezza is in the MISSI framework
44. Forgiving network faults
45. Digital Security on the Internet
46. Selling data security: a safe bet for VARs
47. Revisiting computer security in the business world
48. Keeping your computer safe for business
49. Rainbow Technologies Inc
50. SecurID fob: single-chip safety net
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.