1,125 results on '"Hulme, George V."'
Search Results
2. Sales letters that sell
3. Security handoff: more large companies are turning to service providers to handle their security. (Feature Story)
4. No development tools vendor does everything right
5. Beware of Hidden Data
6. SLAs: The Ties That Bind -- Service-level agreements protect the customer and provider from unrealistic expectations
7. Servers: Dressing Things Up -- Getting Creative With Data Protection
8. Storage: Sticking With the Basics -- Disk Drives Hold the Throne
9. Defensive Play -- Virtual patching, intrusion prevention come of age
10. Gates: AntiSpyware Remains Free, IE 7.0 Coming This Summer; Contrary to expectations, Microsoft will continue to offer its anti-spyware tool for free and will revamp Internet Explorer sooner rather than later, company chairman Bill Gates said at RSA
11. Q&A: RSA Security's Art Coviello; The CEO of the largest vendor of computer security tokens gives his prognosis for what's going to matter in '05
12. UPDATE: Symantec To Acquire Veritas For $13.5 Billion; Deal will combine Symantec's security products with Veritas' storage software, resulting in reach from PCs to data centers
13. SCO Group Web Site Attacked Again; Pages were defaced with text that erroneously implied that SCO would sue Microsoft for intellectual-property theft
14. Losses From Viruses Reach 5-Year High Swell
15. CA Sees New Chance For Growth, Partnerships; Growth will come from more development, geographic expansion, distribution channels
16. California Toughens Spyware Laws; Many companies already comply by offering customers opt-out alternative
17. Security Companies Plan Merger; The new company, Cybertrust, will sell public key infrastructure technology and services
18. Security Vendors Land $11 Million In Funding; With compliance and security issues high on IT management's priority list, LogLogic and MX Logic attract the attention of venture capitalists
19. Get Ready To Patch; Installing patches to fix application and system flaws is still a major chore for businesses. With Microsoft's XP SP2, they face their biggest challenge
20. Homeless Hacker Sentenced To Home Detention; Adrian Lamo, the 'homeless' hacker is sentenced to six months' home detention and two years' probation by a federal judge
21. Stolen Source Code Site 'Suspended'; Selling corporate secrets is 'tricky,' the site says, so it's 'redesigning' its business model
22. Tiny, Evil Things; Much like spam, spyware is a growing problem that's costing businesses time and money
23. Wells Fargo Offers $100,000 Reward For Stolen Computers; The machines contained confidential customer information
24. Internet Security Woes Boost Symantec's Bottom Line; Consumer antivirus sales drove revenues that are 'probably not sustainable,' the company warned
25. Tick-Tock: Microsoft Counts Down To Blaster DoS Attack; Enterprise networks may or may not notice performance degradation when Blaster awakes at midnight to take aim at windowsupdate.com
26. Alert Level Raised on MSBlast, Some ISPs Report Delays; MSBlast is quickly racing across the Internet and has already infected 57,000 systems running Windows
27. Qualys Aims To Reduce False Alarms From Popular Snort IDS Program; Qualys Inc.'s new product, Quidscor, can reduce false alarms from Snort intrusion-detection systems by up to 70%
28. Oracle Warns Of Serious Software Vulnerabilities; Oracle says hackers could take advantage of flaws in its E-business suite and database server
29. Microsoft Reports More Cracks In Windows OSes, Applications; For the second week in a row, Microsoft announced the discovery of several new vulnerabilities in various Windows versions and applications that could enable denial-of-service attacks, malicious appropriation and system rights escalation
30. Intel Case Could Crimp Anti-Spam Efforts -- Court ruling casts doubt over claims of economic damage from unwanted E-mails
31. Intel Loses E-Mail Case
32. When Security Helps Stem business Losses
33. VeriSign Fights Online Fraud
34. A Passport To Security -- Trusted Network's Identity application controls user access to systems and information by embedding a two-piece passport into each session request
35. California's New Rules Of Disclosure -- State law will force companies nationwide to make security breaches public
36. Download Music, Kill Your PC?
37. The ABCs Of Writing A Worm -- Security experts pan magazine's decision to publish Slammer source code
38. One-Stop Security Shop Doesn't Appeal To All -- Some prefer that Microsoft use its antivirus acquisition to complement other tools
39. Security Utopia Ahead?
40. Who Needs To Know? -- Businesses are looking at digital-rights management software to prevent the costly loss of confidential information
41. BugBear Bites Back
42. Digital-Rights Software Debut
43. Hacker Losses Fall 56%
44. Virus Composition 101
45. Scaling China's Wall
46. University Defends Virus-Writing Class; 'We don't teach sex education by having students have sex in class,' says critic
47. SECURITY HANDOFF -- More large companies are turning to service providers to handle their security
48. Axing Piracy Legislation
49. Outfoxing I.D. Thieves -- Startup aims to stop fraud before it starts
50. A Move Up The Stack
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.