TITLE

The "Parallel" World with IT

AUTHOR(S)
Engebretson, Dave
PUB. DATE
March 2005
SOURCE
Security: Solutions for Enterprise Security Leaders;Mar2005, Vol. 42 Issue 3, p48
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
Provides information regarding developments in electronic security systems in the U.S. Importance of understanding the benefits of networked security systems and the ability to use network infrastructure and equipment; Responsibilities of information technology managers in ensuring the safety of operations; Concept of networking electronic security. INSETS: On the Same Page;Hot for Networking.
ACCESSION #
16338849

 

Related Articles

  • NETREO INTRODUCES NETWORK INTRUSION DETECTION SYSTEM.  // Networks Update;Apr2004, pN.PAG 

    The article reports on the introduction of Securitas line of Network Intrusion Detection Systems (NIDS) by Netreo to complement and integrate with the Omniscient family of information technology (IT) and security management products. Securitas is implemented as an appliance-based,...

  • Higher ed fears wiretapping law. Duffy, Jim // Network World;5/1/2006, Vol. 23 Issue 17, p1 

    The article reports on the opposition of the District of Columbia higher education to a U.S. Court of Appeals ruling on wiretapping. This opposition is stipulated in the petition of the American Council on Education against the FCC. The FCC ruling states that it could determine whether higher...

  • Security Uses for Wireless Networks. Engebretson, David // SDM: Security Distributing & Marketing;Jan2005, Vol. 35 Issue 1, p66 

    The article reports on several electronic security systems. Many of today's electronic security systems are designed to operate on a communications or computer network. The common wireless network systems in use today fall under the general description of Wi-Fi, which stands for wireless...

  • ASK THE EXPERT.  // SDM: Security Distributing & Marketing;Nov2006 Supplement, Vol. 36, p18 

    The article presents question-and-answer advisory related to security system installation. A technician asks if the entire Internet Protocol-based video surveillance system should be set up before the actual installation. Another technician asks why customers sometimes seem disappointed when...

  • Nebulas Joins Sourcefire's UK Partner Programme.  // Database & Network Journal;Oct2004, Vol. 34 Issue 5, p22 

    This article reports that Nebulas Security Ltd. has joined Sourcefire Inc.'s Business Partner Programme in order to bring its revolutionary realtime network defense solutions to Great Britain security market. All Sourcefire solutions are plug-n-protect appliances to ensure an easy installation,...

  • 'We're All Witch Doctors'. Hunt, Steve // Security: Solutions for Enterprise Security Leaders;Jun2008, Vol. 45 Issue 6, p24 

    The author reflects on how security industry personnel could manage risk which threatens clients. The author states that it is the task of the security personnel to keep unrelenting risk away from clients, by continuing to secure networks and the rest of the security apparatus to protect...

  • BCS DIARY: MARCH.  // Computer Weekly;3/15/2005, p44 

    The article presents information on some of the special events to be organized by the British Computer Society in March 2005. The list of events includes, last of four sessions on estimating of Bristol Branch, Project Management Specialist Group; Personal development program on effective...

  • Red Hat's New Security Certification. Russell, Randy // Certification Magazine;Nov2005, Vol. 7 Issue 11, p24 

    The article focuses on the Certified Security Specialist performance-based security certification of Red Hat. Networked systems provide a gateway to useful information and applications, but also invite an unfriendly world through that gateway. In 2004, Red Hat introduced a new training and...

  • The Road Less Traveled: How to Become an IT Security Professional. Rogers, Bobby // Certification Magazine;Oct2006, Vol. 8 Issue 10, p30 

    This article offers advice on how to become a successful information technology (IT) professional. Once IT professionals decide to become a network security engineer, they have made a choice that will drive everything they learn and do from that moment forward. Some of the new hobbies a network...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics