TITLE

Biz Backs Biometrics

AUTHOR(S)
Zalud, Bill
PUB. DATE
October 2006
SOURCE
Security: Solutions for Enterprise Security Leaders;Oct2006, Vol. 43 Issue 10, p30
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article focuses on the interests of the experts in the security industry in the silicon chip fingerprint sensor market in the U.S. It is believed that silicon chip sensors have finally come of age. Silicon fingerprint participants have carved their niche in wireless applications and are making considerable in-roads in the network security application.
ACCESSION #
22710617

 

Related Articles

  • Sub-optimum Analysis and Trusted Network. Zengtang Qu; Ping He // Proceedings of the International Symposium on Information Proces;2009, p290 

    The paper describes sub-optimum method for trusted computing models of network security. trusted computing of network security is performed under both optimum and non-optimum learning. The task of selection is done using a knowledge-based network under sub-optimum degree learning. The...

  • EXECUTIVES RANK CRITICAL SECURITY ISSUES.  // CRN;6/28/2004, Issue 1102, p59 

    Presents the top network security concerns of an organization according to employees who have responsibility for network security.

  • Big Picture Security. Roberts, Paul // InfoWorld;11/1/2004, Vol. 26 Issue 44, p36 

    This article focuses on the evolution of the security event management (SEM) technology into complex system management tools that monitor a wide range of products and processes. The SEM technology is designed to centralize, correlate and prioritize log data from various devices, presenting it...

  • Computer Security Industry.  // U.S. Black Engineer & Information Technology;Summer2010, Vol. 34 Issue 3, p54 

    The article provides information about the computer security industry. It provides the definition of the terms information security, integrity, and availability of information. It also features the scope of the information security policy. It mentions brief information about cyber security...

  • SENSORY NETWORKS UNVEILS NODALCORE-X SECURITY PROCESSOR.  // Computer Security Update;May2005, p3 

    This article reports that Sensory Networks in Palo Alto, California, a developer of hardware acceleration technology for network security applications, has unveiled its next-generation adaptive NodalCore-X Security Processor. NodalCore-X represents the second generation of the high-performance,...

  • European Nations Make Security a High Priority. Filipek, R. // Internal Auditor;Oct2007, Vol. 64 Issue 5, p15 

    The article presents the result of a survey of information security managers in Europe conducted by PricewaterhouseCoopers (PwC) and commissioned by the European Networks and Information Security Agency (ENISA). The survey seeks to discuss the importance of information security efforts and the...

  • SCADA SECURITY IN THE CONTEXT OF CORPORATE NETWORK INTEGRATION. CIPRIAN, BOLDEA // Analele Universitatii Maritime Constanta;2011, Vol. 12 Issue 15, p159 

    The paper presents some considerations regarding security management of Supervisory Control and Data Acquisition (SCADA) networks. Control systems are potential targets of attack from hackers, cyber terrorists, others who want to disrupt the critical infrastructure, disgruntled or former...

  • Endpoint security. Stephenson, Peter // SC Magazine: For IT Security Professionals (15476693);Aug2012, Vol. 23 Issue 8, p32 

    The article presents a comparison between several endpoint security software products including Arkoon Network Security StormShield v6.x, Check Point Endpoint Security vE80.32 and Kaspersky Endpoint Security v8.

  • Boeing Finds Traction With Cyber Service Offerings. Biesecker, Calvin // Defense Daily;2/7/2013, Vol. 257 Issue 26, p3 

    The article reports on the growing popularity of cyber and network security developed by Boeing Co. These products are increasingly gaining acceptance with customers in the U.S. and internationally as service offerings. Boeing for its Cyber Range In a Box (CRIAB) and Enterprise Network Sentinel...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics