TITLE

INDUSTRY CALENDAR

PUB. DATE
August 2008
SOURCE
Security: Solutions for Enterprise Security Leaders;Aug2008, Vol. 45 Issue 8, p93
SOURCE TYPE
Trade Publication
DOC. TYPE
Calendar
ABSTRACT
A calendar of events from September-October 2008 is presented, including the Future of Secure Documents seminar to be held at the Crowne Plaza in Chicago, Illinois from September 8-10, the 54th Annual American Society for Industrial Security (ASIS) International 2008 meeting to be held at the Georgia World Congress Center in Atlanta from September 15-18, and the Security Essen 2008 trade show to be held at the Essen Trade Fair Ground in Germany from October 7-10.
ACCESSION #
34001533

 

Related Articles

  • ASSET, INFORMATION AND COMPUTER SECURITY.  // Security: Solutions for Enterprise Security Leaders;May2003, Vol. 40 Issue 5, p16 

    Presents a list of companies providing computer security equipment in the U.S.

  • As Internet booms, so do hacker-proofing measures. Halverson, Guy // Christian Science Monitor;6/20/96, Vol. 88 Issue 144, p9 

    Reports on the growth of the computer security tool business in the United States. Protection against illegal penetration of computer networks by hackers; Expansion of industry into the high-technology sector; Security breach suffered by some Internet sites.

  • IT security.  // Third Sector;2010 Suppliers Guide, p53 

    A directory of information technology (IT) security services suppliers in Great Britain is presented, which includes AccessIT, APOJ and Azzurri Communications (High Wycombe).

  • Selling Fear.  // Forbes Asia;7/3/2006, Vol. 2 Issue 12, p8 

    A letter to the editor is presented in response to the article "Fraidy Cat Marketing," in the June 5, 2006 issue.

  • Clipper flaw foils government `master keys'. Patch, Kimberly // PC Week;6/6/94, Vol. 11 Issue 22, p3 

    Reports on the discovery of a flaw in the Clipper chip's encryption mechanism by AT&T Bell Labs scientist Matthew Blaze. Corruption of the Law-Enforcement Access Field to make it unreadable by government keys; Intact condition of encryption facilities.

  • Is PKI ready for takeoff? Many say yes. Kerstetter, Jim // PC Week;12/20/99-12/27/99, Vol. 16 Issue 51, p1 

    Focuses on major security vendors' vow to make their public-key infrastructure (PKI) products compatible. Goal of balancing information technology's security needs and vendors' ability to deliver solutions; Factors that plagued the deployment of the PKI technology; Goal of providing encrypted...

  • Enterprises bet on PLI. Takama, Gohsuke // Computing Japan;Oct99, Vol. 6 Issue 10, p36 

    Discusses the impact of Public Key Infrastracture (PKI) on the computer security industry. Problems encountered by Internet subscribers on the authenticity of their electronic mail messages; How PKI could be used by subscribers; PKI at an early stage.

  • Buyer's Guide.  // Communications News;Apr2007, Vol. 44 Issue 4, p26 

    A chart is presented listing computer network security service providers and their contact information.

  • Two faces for the firewall. Nelson, Matthew // InfoWorld;10/12/98, Vol. 20 Issue 41, p1 

    Focuses on Network Associates Inc.'s scheduled release of the firewall security technology called Adaptive Proxy. Features of the technology; Comment by James Ishikawa, director of the company's Total Network Security line; Advantages of the system.

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics