Products & Services

See also: Categories | Featured Products | Technical Articles | More Information
Page: 1

Conduct Research Top

  • Check Point NGX R65 Security Administration
    Check Point NGX R65 Security Administration. Covering Check Point's new, flagship NGX R65 Firewall/VPN, this guide provides all you need to know about this underlying security software platform for all of your company's enterprise firewall, VPN and management solutions.
  • Physical Network Security
    See why it's just as important as software-based security.
  • Selecting an Automation Security Consultant
    Operational Excellence & Lean Six Sigma Plant and Data Security: Are You At Risk? Apotex Automates Weighing to Keep Materials Moving Drug Security Gets (Nano-) Granular Eisai Installs a New BMS Rockwell Automation to Acquire Pavilion Technologies 2009 Rockwell Automation Process Solutions User
  • Black Hat Physical Device Security: Exploiting Hardware and Software
    Black Hat Physical Device Security: Exploiting Hardware and Software. Providing an examination of software programs and hardware devices, this guide shows how to audit security devices and suggests design modifications and code-level fixes that can be applied to applications and devices to mitigate
  • Smart Computing Article - Security
    Security is a precious and rare commodity in today's connected, online world. While we value the convenience of hopping on the Internet to do our banking, shopping, surfing, and communicating, we are alarmed at the ease with which hackers can infiltrate our personal computers. So
  • Cryptographic Security Architecture: Design and Verification
    Cryptographic Security Architecture: Design and Verification. Presenting a design for a portable, flexible high-security cryptographic architecture, this text unveils an alternative means of building a trustworthy system based on concepts from established software engineering principles
  • Plant and Data Security: Are You At Risk?
    . It includes people, hardware and software processes as well as data assets. Security policies define the overall security and risk objectives of an organization. In the old model, the focus was on physical assets and took steps to protect them. This is still true today, but data protection is equally
  • Plant and Data Security: Are You At Risk?
    . If one measure fails, another is ready to serve as backup. It s a team approach with hardware and software, says Rakaczky. How do we stop the wound from bleeding? Invensys looked at security issues several years ago and decided that they were in a unique position of already dealing with companies

More Information Top

Lock Indicates content that may require registration and/or purchase. Powered by IHS Goldfire

  • West accuses Russia of cyber-warfare
    Most notable was research by security software company Trend Micro, which published a blog post in October 2014 using the iSight analysis, detailing evidence of industrial-control systems being compromised by the SandWorm group, leading to the possibility of potentially damaging cyber �
  • Facebook Nation
    In late 2011, security software company Symantec commissioned Scott Wright of Security Perspectives Inc. to conduct an experiment codenamed The Symantec Smartphone Honey Stick Project (4).
  • Windows 7 Made Simple
    Many security software companies offer a discount when you buy several copies at the same time.
  • Getting StartED with Windows 7
    Many security software companies offer a discount when you buy several copies at the same time.
  • Knowledge Management and Acquisition for Smart Systems and Services
    In this study, our case is a security software company .
  • Facebook Nation
    In late 2011, security software company Symantec commissioned Scott Wright of Security Perspectives Inc. to conduct an experiment codenamed The Symantec Smartphone Honey Stick Project [3].
  • Security and the Networked Society
    Representatives of security software com- pany Sophos agreed but Eric Chien, chief researcher at Symantec23 at the time stated .
  • China PC online games 2012: More sedate outlook for PC growth as mobile opportunity looms into focus
    Due to the attractive headline growth and profit margins on offer, a number of other Internet- related companies, such as security software companies and ecommerce retailers, have started to enter the online gaming market.