`Rogue' users rile IT professionals

McNamara, Paul
June 1999
Network World;06/14/99, Vol. 16 Issue 24, p40
Trade Publication
Focuses on rogue application users. Information technology (IT) professionals' views on rogue users; Implications of maintaining unauthorized applications for IT departments; Zero tolerance of unauthorized applications.


Related Articles

  • TRENDS. Kelly, Sean; Peckham, Ray // Communications News;Sep2001, Vol. 38 Issue 9, p8 

    Focuses on the growth of virtual private network (VPN). Creation of encrypted data communication sessions on public Internet; Benefits of private networks on the creation of tunnels; Factors influencing the growth of VPN in the market; Migration of enterprises on the Internet for communication.

  • One-price merchant buys an all-in-one solution.  // Communications News;Sep2001, Vol. 38 Issue 9, p20 

    Focuses on the network selection of information system company, Only Stores in California. Improvement on communications and service operations; Migration on wide area network based infrastructure; Replacement of the credit-card processing system; Selection of networks.

  • To be or NAT to be? Liebmann, Lenny // Communications News;Sep2001, Vol. 38 Issue 9, p100 

    Provides relevant information on network address translation (NAT) technology. Capability to implement problems; Translation of information by NAT firewall; Techniques on network address translation.

  • Further Reading.  // MarketWatch: Telecoms;May2008, Vol. 7 Issue 5, p38 

    A list of reports that explore the information technology industry is presented.

  • Intrusion detection systems are overhyped and underdelivered. Bennett, Martha // Computer Weekly;6/27/2002, p40 

    Focuses on the vulnerabilities of intrusion detection systems in information technology in Great Britain. Reasons for the failure of intrusion detection implementation; Components of a successful intrusion detection; Management of security incidents by media training and media relations.

  • Staffing for convergence. Hochmuth, Phil // Network World;9/2/2002, Vol. 19 Issue 35, p48 

    Focuses on the task of converging voice and data into one network. Information technology professionals' handling of voice and data duties; Skills and experience of workers in the voice and data departments. INSET: Avoid convergence clash.

  • Vision talk. Jacobs, April // Network World;12/24/2001, Vol. 18 Issue 52, p59 

    Focuses on the characteristics of network vision for information technology in the United States. Role of vision to prevent companies from focusing heavily on near-term objectives; Need for employees to understand the intention of operational guidance; Suggestion on testing technologies before...

  • Two reports released from the NIIAC. Frazier, Deneen // Multimedia Schools;Sep/Oct96, Vol. 3 Issue 4, p10 

    Cites the National Information Infrastructure Advisory Council's reports related to connecting the United States to global networks.

  • Chasing rainbows. Heldman, Peter K.; Heldman, Robert K. // America's Network;03/01/98, Vol. 102 Issue 5, p30 

    Details the status of computer networking in United States. Evolution of the information technology; How to take advantage of the information technology; Changes occurring in some computer companies in the country; Author's forecast about computer networking.


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics