Williams, John R.; Campus, Julio C.; Bolden, Greg; Appelbaum, Rick; Lydie, Phil; LaVoy, Sharron
November 2006
Security: Solutions for Enterprise Security Leaders;Nov2006, Vol. 43 Issue 11, p14
Trade Publication
Several letters to the article are presented in response to the article "Security 500 Ranking Survey," in the September 2006 issue.


Related Articles

  • LETTERS. Haab, Greg; Burton, Kelly; Kleinman, Kayza // InfoWorld;7/24/2006, Vol. 28 Issue 30, p4 

    Several letters to the editor are presented in response to the article "Unauthorized Applications (Still) a Bad Idea," in the July 14, 2006 issue.

  • Got something to say? Fisher, Matt; Hargreaves, Roger; Hardy, David // SC Magazine: For IT Security Professionals (UK Edition);Feb2007, p24 

    Several letters to the editor are presented in response to articles published in previous issues, including the security threat posed by the iPhone and the articles "Brave New World" and "Private Matters" which both appeared in the January 2006 issue.

  • Enterprise Security Audits. Ali Pabrai, Uday O. // Certification Magazine;Sep2005, Vol. 7 Issue 9, p30 

    This article focuses on the importance of auditing to computer security in business enterprises. Security audits provide a methodical examination and review of the enterprises defenses, resulting in an audit report that summarizes findings and provides details about problems or concerns....

  • CLASSIC, MODERN, AND POST-MODERN APPROACHES TO MAKING SECURITY STRATEGY. Tagarev, Todor; Ivanova, Petya // Proceedings of the International Conference on Information Techn;2009, Vol. 1, Special section p7 

    The article describes classic, modern and post-modern approaches to making security strategy. Security strategy is defined in the article as the art and science of developing, applying, and coordinating the instruments of national power to achieve national security objectives. The challenges of...

  • How to secure your small business. Kidman, Angus // Australian PC User;Jun2007, Vol. 19 Issue 6, p41 

    The article presents advice on how to protect one's business information technology (IT) without spending too much. One option is to farm out IT security management to managed services, which monitors incoming electronic mail to eliminate spam and malware before it arrives, or cover the entire...

  • Solid Plan for Scans.  // Information Security;Feb2006, Vol. 9 Issue 2, p41 

    Provides information on the Foundstone Enterprise vulnerability management product from McAfee. Performance capabilities; Key features; Functional standards.

  • Emerging Intelligent Information Security Systems. Ahlm, Eric // Scientific Computing;Jan2006, Vol. 23 Issue 2, p26 

    The article considers the emergence of intelligent computer security systems. It reveals the challenges that keep computer security dynamic. It stresses the importance of testing security technologies. It cites a number of technologies used to test security tools. It addresses the problem with...

  • Is your computer function really secure? Wilder, Gillian // Accountancy;May78, Vol. 89 Issue 1017, p66 

    The article investigates the security risks associated with computer installations, particularly the physical aspects of the problem, in Great Britain. An effective security program for a computer installation demands the identification of risk, the assessment of probabilities, and the planning...

  • Decision-Making by Effective Information Security Managers. Pettigrew, James; Ryan, Julie; Salous, Kyle; Mazzuchi, Thomas // Proceedings of the International Conference on Information Warfa;2010, p465 

    A pilot study was conducted in the last half of 2009 exploring how responsible managers make decisions with regards to information security in the enterprise. This pilot study is part of a larger research effort focused on exploring this topic. This is an interesting problem to study because...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics