Works matching DE "COMPUTER security equipment industry"
Results: 10
IT firms bank on security awareness.
- Published in:
- ASEANAffairs, 2008, v. 2, n. 3, p. 15
- Publication type:
- Article
MERGERS & ACQUISITIONS.
- Published in:
- Microwave Journal, 2016, v. 59, n. 7, p. 54
- By:
- Publication type:
- Article
Aventail Simplifies Remote Access.
- Published in:
- 2003
- Publication type:
- Product Review
An evaluation of an intelligent home monitoring system.
- Published in:
- 2000
- By:
- Publication type:
- journal article
Discovering and Disciplining Computer Abuse in Organizations: A Field Study.
- Published in:
- MIS Quarterly, 1990, v. 14, n. 1, p. 45, doi. 10.2307/249307
- By:
- Publication type:
- Article
A case study in hardware Trojan design and implementation.
- Published in:
- 2011
- By:
- Publication type:
- Case Study
McAfee: filtering out cybernasties.
- Published in:
- ComputerWorld Hong Kong, 2010, v. 27, n. 5, p. 83
- By:
- Publication type:
- Article
Check Point: awards for security software and hardware.
- Published in:
- ComputerWorld Hong Kong, 2010, v. 27, n. 5, p. 70
- By:
- Publication type:
- Article
A Scalable Information Security Technique: Joint Authentication-Coding Mechanism for Multimedia over Heterogeneous Wireless Networks.
- Published in:
- Wireless Personal Communications, 2009, v. 51, n. 1, p. 5, doi. 10.1007/s11277-008-9595-x
- By:
- Publication type:
- Article
Acceptable Security Controls a Rarity, Says Survey.
- Published in:
- International Journal of Micrographics & Optical Technology, 2009, v. 27, n. 1/2, p. 8
- Publication type:
- Article