TITLE

Events Seminars

PUB. DATE
December 2006
SOURCE
SC Magazine: For IT Security Professionals (UK Edition);Dec2006, p65
SOURCE TYPE
Periodical
DOC. TYPE
Article
ABSTRACT
The article offers several events and seminars for the information security industry from December 2006 to May 2007. Shavlik Intensive Administrator training courses are provided by Satisnet. The theme of the BSI Business Continuity Management Conference is the Strategic Use of the New Standard on Business Continuity Management to Improve Business Performance and Resilience. The Ethical Hacking: Hands-On Course from 7Safe gives an essential understanding of key hacking concepts and experience of using security auditing tools.
ACCESSION #
23523938

 

Related Articles

  • DefCon: All in good fun. Schwartau, Winn // Network World;8/25/2003, Vol. 20 Issue 34, p47 

    Focuses on the proceedings of the DefCon computer hacker convention at the Alexis-Park Hotel in Las Vegas, Nevada. Issues relating to password theft, telecom interception and system penetration; Improvement of computer security; Wireless security skills.

  • SECURITY EXPERT TO DISCUSS NETWORK SPYING AT DEFCON.  // Networks Update;Aug2006, p6 

    The article reports on the lecture of Andrew Whitaker, director of Enterprise Security for InfoSec Academy, at the DEFCON hacker convention that will be held at the Riviera Hotel & Casino in Las Vegas, Nevada from August 4 to 6, 2006. Whitaker will talk about the methods used by hackers to...

  • How Computer Hackers Impact You. Garritano, Anthony // National Mortgage News;6/20/2005, Vol. 29 Issue 39, p22 

    Discusses the preventive measures against computer hacking in the financial sectors by the Federal Bureau of Investigation Officials at the national Association of Mortgage Brokers' annual convention in Minneapolis, Minnesota. Avoidance of using similar passwords for multiple accounts;...

  • WATCH OUT FOR: Superworms -- the next big threat from hackers.  // Computer Weekly;8/5/2003, p1 

    "Superworms" virus that can spread across the Internet within seconds, is a major threat to computer security. The potential threat of future worms unleashed by hackers was one of the hot topics on the agenda at the Defcon security conference held in Las Vegas, Nevada, last weekend. The new...

  • Cyber-crime: Where Is the Outrage? Trembly, Ara C. // TechDecisions;Nov2004, Vol. 6 Issue 11, p31 

    Deals with the tolerance of computer hacking by the U.S. society. Definition of computer hacking; Information on several conventions which promote computer hacking; Course offered during the Fifth HOPE (Hackers on Planet Earth) convention held in July 2004 in New York.

  • Hacking Amplified.  // Information Security;Nov2005, Vol. 8 Issue 11, p20 

    Deals with a paper concerning a hacker attack where the sound of someone typing on a computer keyboard is recorded, which will be presented at the ACM Conference on Computer and Communications Security. Vulnerability of the English language on the attack; Suggestion of researchers to security...

  • Bosses to blame for computer attacks.  // New Scientist;2/7/2009, Vol. 201 Issue 2694, p19 

    The article offers information on a discussion during a conference in London, England about the role of bosses in computer viruses and attacks. Glenn Zimmerman, a technology expert, said that most senior leaders' computers are often wide open to threats and it is often the chief executive...

  • BUILDING CYBER WARRIORS. BALLENSTEDT, BRITTANY // Government Executive;Aug2011, Vol. 43 Issue 10, p39 

    The article focuses on the increase in training programs in the U.S. that offer specialized skills to operate expertly in cyberspace. According to Alan Paller, research director for the SANS Institute, a new breed of cyber warrior, possessing acute front-line skills is needed to tackle the...

  • Israel showcases its talent for IT security.  // Computer Weekly;10/27/2009, p11 

    The article presents information on IT security firms of Israel. White Cyber Knight (WCK)'s Lancelot software is developed to help businesses manage risk, governance and compliance. Another company, GED-i, specialises in data encryption. The Haifa-based firm, Sentry Com, has designed software...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics