TITLE

Dave's 2� on... get that string off my finger!

AUTHOR(S)
Freeman, Dave
PUB. DATE
May 2005
SOURCE
Portable Design;May2005, Vol. 11 Issue 5, p8
SOURCE TYPE
Periodical
DOC. TYPE
Article
ABSTRACT
This article features concerns of the author regarding the security of private and data communications. Data can be protected if it does not need to be share or transported. When it needs to be mobile, security problems may arise. But the main enemy of security is inconvenience. The author stressed the significance of a notebook computer with a biometric fingerprint scanner in protecting privacy. Biometrics addresses the issue of improved security with reduced inconvenience.
ACCESSION #
17097319

 

Related Articles

  • HOSTING. Brooks, Greg // New Media Age;1/11/2007, Special section p7 

    This article looks at the changes in data hosting in Great Britain in 2007. Hosting companies turned to advocate a model that will host entire businesses within a secure environment safe from both physical and virtual attacks. The hosting market introduced the changes as security in hosting...

  • IBM Lotus Sametime serves up messaging any way you want it. Nance, Barry // Network World;9/3/2007, Vol. 24 Issue 34, p42 

    The article offers a look on corporate instant-messaging (IM) environment platforms. According to the author, the ideal corporate instant-messaging environment will allow the users communicate anything they choose from simple typed messages to document to video. It reveals that IM environment...

  • Spread Space Spread Spectrum Technique for Secure Multiplexing. Hennelly, Bryan M.; McDonald, John B.; Sheridan, John T.; Gopinathan, Unnikrishnan; Kelly, Damien P.; Javidi, Bahram; Naughton, Thomas J. // AIP Conference Proceedings;10/24/2007, Vol. 949 Issue 1, p138 

    A novel technique of multiplexing complex images is proposed in which each image may be demultiplexed only if a set of random encryption keys is known. The technique utilizes the ability of the double random phase encoding method to spread a signals' energy in both the space and spatial...

  • Data Dangers. Miller, Julie // InsideCounsel;Apr2006, Vol. 16 Issue 173, p46 

    Examines the dangers of electronic mail systems in the U.S. in 2006. Recommendations for dealing with the dangers; Ways to ensure data protection; Role of information technology departments in addressing problems created by electronic mail messages.

  • Trust Level.  // Network Dictionary;2007, p497 

    A definition of the term "Trust Level" is presented. It refers to the standard of security protection to be met by a computer system.

  • Zombie Army.  // Network Dictionary;2007, p541 

    An encyclopedia entry for the computer security term "zombie army" is presented. Also called a botnet, a zombie army is a number of Internet computers that have been set up to forward transmissions to other computers on the Internet without knowledge of their owner. According to the article, any...

  • Inference Attack.  // Network Dictionary;2007, p243 

    A definition of the term "inference attack," which relies on the computer user to make logical connections between unrelated pieces of information, is presented.

  • FACE-OFF: Is anomaly detection the best way to prevent virus and worm attacks? Morville, Paul; Arbel, Gil // Network World;3/13/2006, Vol. 23 Issue 10, p38 

    The article focuses on the effectiveness of a new security technology for the detection of computer network threats. According to the author a recent network behavior analysis has been one of the most robust and scalable security technologies for network threat detection. The network behavior...

  • USB security: A sticky situation. Lundquist, Eric // eWeek;4/24/2006, Vol. 23 Issue 17, p10 

    The article criticizes computer vendors for compromising computer security over speeding up the data transfer rates through universal serial bus (USB), serial, or any other computer port. It observes that computer security still often takes a back seat to ease of use, flashy graphics, and speedy...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics