Printer Friendly

Browse Digital computers topic

Safety and security measures subtopic

Articles

1-80 out of 80 article(s)
Title Author Type Date Words
Tackling cyber criminals. Brayman, Matthew Brief Article Aug 1, 2003 301
Lines of defense: guarding against electronic privacy. Ling, Ben Aug 1, 2003 1125
In case of emergency: entrepreneurs should be prepared when disaster strikes. (Management Advice). McCrea, Bridget Jun 1, 2003 657
Reflecting on Chemputing's past. (Chemputing). Silbert, Marvin D. Apr 1, 2003 1323
The global threat to information technology security. (Software Intelligence: Security). Love, David Mar 1, 2003 1636
Information watchdogs. (Input Output). Thilmany, Jean Feb 1, 2003 769
NIST publishes computer security guidelines. (General Development). Brief Article Jan 1, 2003 315
Saving your college's data from unnatural disaster. (technology today). Richardson, Aaron Sep 30, 2002 868
Security lessons learned the hard way. (Operations). Brief Article Sep 1, 2002 516
Cybercrime: finding security in Cyberspace; steps for pour business to take to avoid being a target for high-tech criminals. Campbell, Melissa Statistical Data Included Jun 1, 2002 1750
Suspicious activity reveals compromised server. (Technique). Cameron, Dan May 1, 2002 387
Watching you secrets windows tells. Sanders, James A. May 1, 2002 1349
Close the loop on PC theft. (Products & Processes). Brief Article Apr 1, 2002 462
Code wars: Virus attack trends; The worms of 2001 are the building blocks of the next generation of threats to the Internet, which are likely to be faster, harder to fight, and deadlier. (Computer Security). Piazza, Peter Mar 1, 2002 4118
Commerce department announces new Encryption Standard. (News Briefs). Brief Article Feb 1, 2002 106
Keeping Hackers away with personal firewalls. (Personal computing). Goldsborough, Reid Brief Article Dec 1, 2001 812
Point, click and steal. Bisard, Mark Brief Article Sep 1, 2001 513
Computer security system. Brief Article Sep 1, 2001 107
Code Red. GRUPER, SHIMON; ELZAM, OFER Aug 1, 2001 3245
NOTEWORTHY. Brief Article Apr 1, 2001 565
Password Management Software. TIDD, RONALD R. Mar 22, 2001 1350
letters. Brief Article Mar 1, 2001 815
Not Just Your CIO'S PROBLEM. Brief Article Jan 1, 2001 148
The Threats THAT MATTER. Brief Article Jan 1, 2001 92
Computer controls. Brief Article Oct 1, 2000 130
Greater cooperation sought in protecting critical infrastructure. Brief Article Sep 22, 2000 780
Access control system. Brief Article Sep 1, 2000 109
iMac Security. Brief Article Mar 1, 2000 90
Selecting a Site for the Software Sentry. WOOD, MARK Dec 1, 1999 1864
Learn to Curb Laptop Loss. NEELEY, DEQUENDRE Nov 1, 1999 366
Share and Share Alike. NEELEY, DEQUENDRE Nov 1, 1999 176
Averting disaster with redundant hardware. Brown, Steven D. Oct 1, 1999 1477
Safeguarding computer data. Oct 1, 1999 249
Using the hacker's toolbox. Middleton, Bruce Jun 1, 1999 4099
Special Report: Computer Security. Haines, John Meade Brief Article May 1, 1999 136
Detecting computer fraud. Corbitt, Terry Dec 1, 1998 867
An electronic Pearl Harbor? Not likely. Smith, George Sep 22, 1998 4014
Personal privacy. Van Horn, Royal Sep 1, 1998 2174
Insecurity on the Net. Brandt, D. Scott Mar 1, 1998 2045
A way out. Neeley, DeQuendre Mar 1, 1998 517
Viruses hit home. Feb 1, 1998 516
PCs at peace. Gips, Michael A. Dec 1, 1997 788
Winning the battle for computer security. Muckley, David Nov 1, 1997 1651
Computer immunology. Forrest, Stephanie; Hofmeyr, Steven A.; Somayaji, Anil Oct 1, 1997 4612
Guarding computer data. McFadden, Patrick James Jul 1, 1997 2105
The accountant and computer security. Qureshi, Anique A.; Siegel, Joel G. Cover Story May 1, 1997 5547
Taking a reading on e-mail policy. Thompson, Amy; Harowitz, Sherry Nov 1, 1996 1315
Virus defenses for the future. Whalley, Ian Nov 1, 1996 2533
A manual security solution. Boyce, Brian Nov 1, 1996 4051
The C4I Y2K time bomb. Herskovitz, Don Sep 1, 1996 815
Security alert. Schuyler, Michael Column Jun 1, 1996 3136
Hunting for holes. Anderson, Teresa Apr 1, 1996 610
"If you think your system hasn't been compromised, think again". Delaney, Tom Cover Story Feb 1, 1996 1766
Security management strategies for protecting you library's network. Ives, David J. Cover Story Feb 1, 1996 3893
Timing attack beats cryptographic keys. Peterson, Ivars Brief Article Dec 16, 1995 372
Stop computer theft! Nov 1, 1995 265
Computer data protection checklist. Oct 1, 1995 599
Electronic Frontier Foundation sues to overturn cryptography restrictions. Apr 1, 1995 567
Computers under the hack attack. Christine, Brian Mar 1, 1995 771
Inadequate security encourages the thief. Mills, Alan Feb 1, 1995 1448
Five easy steps to computer security. Howie, Joseph Jan 1, 1995 2915
Cataloging computers. Arbetter, Lisa Sep 1, 1994 430
Defending against computer viruses. Smith, L. Murphy; McDuffie, R. Steve Aug 1, 1994 1643
The enemy within. Nov 1, 1992 250
Bolstering your computer's immune system. Forcht, Karen Sep 1, 1992 4406
Data files and test devices need better power line protection. Cassidy, Robert Sep 1, 1992 358
Keeping computers safe and healthy. Aug 1, 1992 377
Locking up open systems. Crawford, Paul Feb 1, 1992 2839
Defining the mission. Schweitzer, James A. Feb 1, 1992 1149
Risky business: tackling computer security. Peterson, Ivars Dec 15, 1990 537
Layer your LAN. Hertzoff, Ira S. Sep 1, 1989 4263
The pivotal role in computer security. El-Baghdadi, Mahdi; Singh, Mahendra P. Jul 1, 1989 2230
How to improve client's access control over programs and files. Doost, Roger K. Mar 1, 1989 1835
Computer crime: detection and prevention. Gilbert, Jerome Mar 1, 1989 1703
Computer viruses - is there a vaccine? Murray, William Hugh Mar 1, 1989 1842
Here today, here tomorrow. Gassaway, Paul M. Mar 1, 1989 1117
Hardening the hardware. DuGuay, Lawrence F. Mar 1, 1989 1610
A computer and information security directory. buyers guide Mar 1, 1989 125
Effective information networks combine flexibility with security. Bailey, James M. Jan 1, 1989 1933
A backup plan for computer failure. Marud, Marjorie column Feb 1, 1985 970

Terms of use | Privacy policy | Copyright © 2021 Farlex, Inc. | Feedback | For webmasters