699 results on '"A. Piazza"'
Search Results
2. Gangs, kidnappers, and other threats
3. A chip off the privacy block?
4. Doing business in Asia
5. I, Bot: new computer worms are carrying software agents called bots that can use your network to send spam, launch attacks, and infect other computers. Find out how these bots work and how to keep them out of your network
6. Arming the road warrior
7. Cramming for an IT exam
8. From Bluetooth to RedFang: the boom in Bluetooth wireless devices is a boon for those on the move. But attackers already have their eye on Bluetooth's weaknesses
9. The smart cards are coming ... really: you've heard it before, but this time technological advances and security demands in a post 9-11 world make the move to smart cards more likely
10. Oh what a tangled Web: many Web applications, from complex online banking pages to simple Web forms, are rife with exploitable weaknesses. Is your company at risk?
11. Intelligence is the best defense: a public-private group that provides intelligence to the financial services sector has revamped operations to adapt to new security challenges
12. Suppression progression: an IT room is now safe not only from fire but also from the damage an outdated suppression system might have done
13. Crime fighters cast wide net: the Cybercop Web portal allows authorized crimefighters around the world to access a database of sensitive information
14. Had your fill of spam? Unwanted commercial e-mail--spam--has become more than just a nuisance. Here's how two organizations have solved their spam problems
15. Defenses morph as viruses mutate: as traditional antivirus protection has been outpaced by new types of malicious code, companies are challenged to find more effective solutions
16. From artifact to state of the art: physical and IT security band together to modernization systems at the Smithsonian Institution
17. Hard work in the big easy: New Orleans' motto is 'let the good times roll,' but its homeland security efforts since 9-11 are anything but laissez faire
18. A healthy dose of data security. (Information Protection)
19. On patrol in cyberspace: a look at progress among local, state, and federal efforts to combat cybercrime, including credit card fraud and identity theft. (Computer Security)
20. Maimonides solves storage problems: keeping stored data safe and available is a matter of life or death for a hospital. New storage technology makes the task easier to manage. (Computer Security)
21. Who's winning the cyberwars? Hackers and terrorists are constantly developing new exploits, which government and industry must defend against. (Computer Security)
22. A new way to get the job done. (Management)
23. Code wars: Virus attack trends; The worms of 2001 are the building blocks of the next generation of threats to the Internet, which are likely to be faster, harder to fight, and deadlier. (Computer Security)
24. Scourge of the schoolyard: Technology alone isn't enough. By teaching children--and adults--to fight bullying, schools are making their communities safer. (Special focus: School Security)
25. The growing trend toward convergence
26. A high-tech lobby. (Working Wise)
27. Defending Against Denial of Service Attacks
28. Cybercrime Fighting Video
29. Ashcroft Antes Cybercrime CHIPs
30. Online Database Tracks Criminals
31. Securing Laptop Data Against Losses
32. Grants Aid Information-Sharing
33. European E-Commerce Law Criticized
34. Interpol's IT Security Manual
35. E-Investigations Manual Released
36. An Integrated Cure
37. A Protocol to Protect Privacy
38. Messenger Chokes on New Worm
39. MasterCard Merchants Harden Sites
40. Report Exposes Infrastructure Flaws
41. Cybercrime Treaty Opens Pandora's Box
42. What if the Virtual Walls Fall?
43. Hurdles to Cyberjustice
44. Denial of Service Attacks Add Up to Trouble
45. Stealing from the Bad Guys
46. CASPR Seeks Friends for Best Practices
47. NIPC Comes Under Fire from Auditors
48. CSEAT With a View
49. The Conqueror Worm
50. Can You Trust Online IDs?
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.