Search

Your search keyword '"A. Piazza"' showing total 699 results

Search Constraints

Start Over You searched for: Author "A. Piazza" Remove constraint Author: "A. Piazza" Journal security management Remove constraint Journal: security management
699 results on '"A. Piazza"'

Search Results

1. Keys to encryption: encryption technology was once so complicated and expensive to implement that no one used it. That's changing. These examples illustrate how it can be done

2. Gangs, kidnappers, and other threats

3. A chip off the privacy block?

4. Doing business in Asia

5. I, Bot: new computer worms are carrying software agents called bots that can use your network to send spam, launch attacks, and infect other computers. Find out how these bots work and how to keep them out of your network

6. Arming the road warrior

7. Cramming for an IT exam

8. From Bluetooth to RedFang: the boom in Bluetooth wireless devices is a boon for those on the move. But attackers already have their eye on Bluetooth's weaknesses

9. The smart cards are coming ... really: you've heard it before, but this time technological advances and security demands in a post 9-11 world make the move to smart cards more likely

10. Oh what a tangled Web: many Web applications, from complex online banking pages to simple Web forms, are rife with exploitable weaknesses. Is your company at risk?

11. Intelligence is the best defense: a public-private group that provides intelligence to the financial services sector has revamped operations to adapt to new security challenges

12. Suppression progression: an IT room is now safe not only from fire but also from the damage an outdated suppression system might have done

13. Crime fighters cast wide net: the Cybercop Web portal allows authorized crimefighters around the world to access a database of sensitive information

14. Had your fill of spam? Unwanted commercial e-mail--spam--has become more than just a nuisance. Here's how two organizations have solved their spam problems

15. Defenses morph as viruses mutate: as traditional antivirus protection has been outpaced by new types of malicious code, companies are challenged to find more effective solutions

16. From artifact to state of the art: physical and IT security band together to modernization systems at the Smithsonian Institution

17. Hard work in the big easy: New Orleans' motto is 'let the good times roll,' but its homeland security efforts since 9-11 are anything but laissez faire

18. A healthy dose of data security. (Information Protection)

19. On patrol in cyberspace: a look at progress among local, state, and federal efforts to combat cybercrime, including credit card fraud and identity theft. (Computer Security)

20. Maimonides solves storage problems: keeping stored data safe and available is a matter of life or death for a hospital. New storage technology makes the task easier to manage. (Computer Security)

21. Who's winning the cyberwars? Hackers and terrorists are constantly developing new exploits, which government and industry must defend against. (Computer Security)

22. A new way to get the job done. (Management)

23. Code wars: Virus attack trends; The worms of 2001 are the building blocks of the next generation of threats to the Internet, which are likely to be faster, harder to fight, and deadlier. (Computer Security)

24. Scourge of the schoolyard: Technology alone isn't enough. By teaching children--and adults--to fight bullying, schools are making their communities safer. (Special focus: School Security)

25. The growing trend toward convergence

26. A high-tech lobby. (Working Wise)

27. Defending Against Denial of Service Attacks

28. Cybercrime Fighting Video

29. Ashcroft Antes Cybercrime CHIPs

30. Online Database Tracks Criminals

31. Securing Laptop Data Against Losses

32. Grants Aid Information-Sharing

33. European E-Commerce Law Criticized

34. Interpol's IT Security Manual

35. E-Investigations Manual Released

36. An Integrated Cure

37. A Protocol to Protect Privacy

38. Messenger Chokes on New Worm

39. MasterCard Merchants Harden Sites

40. Report Exposes Infrastructure Flaws

41. Cybercrime Treaty Opens Pandora's Box

42. What if the Virtual Walls Fall?

43. Hurdles to Cyberjustice

44. Denial of Service Attacks Add Up to Trouble

45. Stealing from the Bad Guys

46. CASPR Seeks Friends for Best Practices

47. NIPC Comes Under Fire from Auditors

48. CSEAT With a View

49. The Conqueror Worm

50. Can You Trust Online IDs?

Catalog

Books, media, physical & digital resources