TITLE

Verisign ID for on-line software update service

PUB. DATE
October 1997
SOURCE
American Banker;10/16/1997, Vol. 162 Issue 200, p18
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
Focuses on Verisign Inc.'s introduction of a security method for Marimba Inc.'s Castanet system.
ACCESSION #
9710252423

 

Related Articles

  • U.S. to ease security regulations.  // InfoWorld;8/21/95, Vol. 17 Issue 34, p3 

    Reports that the American government will allow companies to export data security software that use 64-bit data encryption schemes, as long as encryption keys remain in their hands.

  • Dongles foil pirates--but drive users crazy. Seymour, Jim // PC Week;11/21/94, Vol. 11 Issue 45, p44 

    Focuses on the dongle, a software copy protection device. Description and function; Disadvantages; Anecdotes; Suggestion.

  • Feds warming to idea of regulating security. Fisher, Dennis // eWeek;10/21/2002, Vol. 19 Issue 42, p14 

    Reports on the recommendations for government regulations on the software industry in the U.S. Information on the National Strategy to Secure Cyberspace program; Details on provisions holding software vendors accountable for the security of their products; Impact of market pressures on...

  • Hardware and Software Design Security: It's All in the Mix. Lokeshwar, Vandana // ECN: Electronic Component News;May2010, Vol. 54 Issue 6, p21 

    The article reports on the continuous innovative ideas and features of high-tech businesses in designing software and hardware security which aims to provide customers the protection in their intellectual property against threats such as reverse engineering, cloning, and tampering.

  • The answer to security riddle. Moad, Jeff // eWeek;5/20/2002, Vol. 19 Issue 20, p64 

    Reports the number of companies victimized by expensive computer software security breaches. Use of anti-virus software; Impact of security breaches on the financial status of companies; Advantages of using security measures on networks.

  • 4 WAYS to prevent breaches. Arevalo, Christine // SC Magazine: For IT Security Professionals (15476693);Dec2011, Vol. 22 Issue 12, p29 

    The article offers information on four ways for computer software companies to prevent data breaches which include trying garage sale bargains, leaving personally identifiable information (PII) in a car , and separating a flash drive from keychains.

  • Keeping ahead of advancing threats requires an intelligent team effort. Ashford, Warwick // Computer Weekly;3/13/2012, p4 

    The article presents information on the software corporation Microsoft's discussion of information technology (IT) security and security strategies against malware. Topics include the relevancy of the Microsoft Trustworthy Computing program, the evolution of security strategies, and...

  • MIND THE GAP - Making the Link from Requirements to Verification. Hooper, Brian; StClair, Bill // Electronics World;Feb2010, Vol. 116 Issue 1886, p38 

    The article focuses on the requirements traceability of the software development and the use of gap analysis to achieve product improvement and business evolution. It states that gap analysis is the most efficient way for planning the development of the business. It mentions that gap analysis...

  • Preventive and Deterrent Controls for Software Piracy. Gopal, Ram D.; Sanders, G. Lawrence // Journal of Management Information Systems;Spring97, Vol. 13 Issue 4, p29 

    In an attempt to protect their intellectual property and compete effectively in an increasingly dynamic marketplace, software publishers have employed a number of preventive and deterrent controls to counter software piracy. Conventional wisdom suggests that reducing piracy will force consumers...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics