Printer Friendly

Browse Data security topic

Evaluation subtopic



1-49 out of 49 article(s)
Title Author Type Date Words
Performance evaluation of AODV routing protocol under black hole attack. Selvakumar, K.; Malarvizhi, N.; Murugan, V. Senthil Report Jun 1, 2015 2555
What's your fraud IQ? Capers, Zach; McNeal, Andi Feb 1, 2015 2532
Technology trends to prepare for in 2015: 2015 is expected to be an exciting year for technology, including cybersecurity, wearable technology, social media, 3D printing, cloud computing, and predictive analysis. Roque, Rob Feb 1, 2015 2240
Policy for US cybersecurity. Roesener, August G.; Bottolfson, Carl; Fernandez, Gerry Nov 1, 2014 5231
Welcome to the metropticon: protecting privacy in a hyperconnected town. Finch, Kelsey; Tene, Omer Oct 1, 2014 13841
Iowa's Hyperstream immerses kids in programming. Brief article Oct 1, 2014 143
Managing data protection in higher education. Coffman, Deena Sep 1, 2014 1987
Security analysis and evaluation of random linear network coding under wiretapping attack. Xiaoxing, L.V.; Baihai, Zhang Report Dec 1, 2013 3319
Privacy versus security. Bambauer, Derek E. Jun 22, 2013 7559
CPAs discuss advantages, challenges. Drew, Jeff Mar 1, 2012 2163
Best practices for leak-free communication: highly publicized leaks of sensitive documents have brought attention to the importance of an issue that can lead to business and reputational loss as well as government penalties. Protecting sensitive organizational data--whether internal or shared--is a serious concern. But there are solution. Rafalin, Moti Sep 1, 2011 1600
Cloud computing: is it safe and secure? Wessels, Tim Jul 29, 2011 618
Has anyone seen my keys? MacLeod, Calum Column Mar 1, 2011 1065
The path of least resistance: in this article Cyber-Ark sympathises with workers and encourages organisations to help them get on and do their jobs mark fullbrook, UK & Ireland director, Cyber-Ark. Jan 1, 2010 1020
Changing times, changing data management. Read, Brendan Nov 1, 2009 2150
The hidden costs of neglecting IT maintenance. Aronson, Mark L. Mar 27, 2009 587
Cloud-based security services: will 2009 be the year this much hyped sector come of age: Pravin Mirchandani, CEO of network security specialists Syphan Technologies, argues that the emergence of new high-speed security technologies as we head into a recession is likely to be the catalyst for more widely available cloud-based security services. Mar 1, 2009 1475
Is the Internet broken? Anderberg, Ken Mar 1, 2009 1229
I.T.'s dirty little secret--privileged passwords. Fullbrook, Mark Feb 1, 2009 990
How to avoid becoming the next data loss headline. Midgley, Stephen Feb 1, 2009 756
Most data breaches involve paper. Jan 1, 2009 574
Insuring and securing your data. Gold, Joshua Nov 1, 2008 626
Intertec Systems offers training programme on Information Security for IT managers. Jun 8, 2008 373
Antek HealthWare's evolving software solutions. Dixon, Gary Editorial Apr 1, 2008 702
Security still not a priority. Brief article Mar 1, 2008 282
A multi layered approach to prevent data leakage. Mattsson, Ulf Feb 1, 2008 4946
Data security to heat up at federal, state levels in 2007. Conference news Jan 1, 2007 522
Fat or thin? Anderberg, Ken Viewpoint essay Dec 1, 2006 468
Manage e-mail archive risk. Chen, Paul Dec 1, 2006 570
The key to secure remote computing: ultra-portable technology allows users to access their enterprise applications. White, Andrew Dec 1, 2006 1088
Security paranoia. Anderberg, Ken Viewpoint essay Aug 1, 2006 477
Data storage and disaster recovery: be prepared. And be prepared now. Colby, Kent L. Aug 1, 2006 1693
Companies still risk information theft. Green, Meg Brief article Apr 1, 2006 263
Regain visibility and control: managed services can help with application optimization and acceleration. Grinder, Stephen Mar 1, 2006 1091
Arming the road warrior. Piazza, Peter Jan 1, 2006 4288
Computer security: networks face new email-related threats. Heffes, Ellen M. Jun 1, 2005 321
Secure I.T.: everyone is responsible for security, and a few simple measures can make all the difference. A report from QinetiQ explains. Nov 1, 2004 1542
The five pillars of information security. Ameri, Amir Jul 1, 2004 712
Assessing your storage and backup for regulatory compliance. Barth, Ken May 1, 2004 1762
NSF scores well on security. Mar 1, 2004 569
Infinite patience. Castelluccio, Michael Sep 1, 2003 884
Cyber security: key to homeland security. (Up front: news, trends & analysis). Brief Article Jul 1, 2002 370
Scenario 2a: a woman contacts her therapist about a friend of her son's "martyrdom mission.". Feb 28, 2002 1257
Security Heads AICPA's Top 10 Technologies. Brief Article May 1, 2001 115
There is a Lack of Privacy on the Web. Lederer, Naomi Sep 22, 2000 1041
Who's Watching? Castelluccio, Michael Jul 1, 2000 1030
E-mail Content Poses Serious Risks. Brief Article Feb 1, 2000 316
LAN and E-mail exposure: the bottom line. Arbetter, Lisa Mar 1, 1994 355
Notebook security in a Nutshell. Patterson, Tom Sep 1, 1993 1583

Terms of use | Copyright © 2015 Farlex, Inc. | Feedback | For webmasters