Geometry.Net - the online learning center
Home  - Book_Author - Schwartau Winn
e99.com Bookstore
  
Images 
Newsgroups
Page 2     21-40 of 101    Back | 1  | 2  | 3  | 4  | 5  | 6  | Next 20
A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z  

         Schwartau Winn:     more books (19)
  1. Cybershock: Surviving Hackers, Phreakers, Identity Thieves, Internet Terrorists by Winn Schwartau, 2001-01-01
  2. Information Warfare, Cyberterrorism: Protecting Your Personal Security in the Electronic Age by Winn Schwartau, 1994
  3. Cybershock **ISBN: 9781560253075** by Winn Schwartau, 2001-03-01
  4. Information Warfare - Cyberterrorism : Protecting Your Personal Security in the Electronic Age by Winn Schwartau, 1996-01-01
  5. Time Based Security Practical and Provable Methods to Protect Enterprise and Inf by Winn Schwartau, 1999-01-01

21. [Report] Deploying Effective Security Solutions
It s About Time Can We Actually Measure Information Security? by Winn Schwartau Winn Schwartau discusses a Time Based Security approach that creates a new
http://www.gii.co.jp/english/cu7198_deploying_solutuions.html
Home Contact Catalog/Sample about GII ... Consumer Goods [Report]
Deploying Effective Security Solutions
Pub Time: 2001/05 "Attacks against digitally stored information are still very cheap to carry out, hard to detect, and nearly impossible to retaliate against." Jeffrey Voas, Cutter Consortium contributing author and coauthor of Deploying Effective Security Solutions "Digital information is our newest measure of wealth," writes Cutter Consortium contributing author Jeffrey Voas, "and that provides the incentive to engage in information warfare, cyber-terrorism, and other malicious activities against information assets." What can you do to protect your enterprise? Deploying Effective Security Solutions offers a multifaceted approach that draws on the expertise of 13 experts in information security. You'll benefit from both best practices and technical solutions to the problem of doing business effectively and securely. Based on a special issue of the monthly Cutter IT Journal and three Executive Reports by Cutter Consortium, this report includes: Using the system survivability concept for more secure and survivable COTS-based systems
  • When prevention isn't enough: assessing your capability for system recovery
  • Measuring risk and security with the Time Based Security approach
  • Going beyond the username/password identity method
  • Separating security policies from the rest of the code, using aspect-oriented programming
  • 22. Bibliography
    Schwartau Winn, Internet Computer Ethics for Kids (and Parents Teachers who haven t got a clue), Interpact Press, Seminole, 2001
    http://www.connected.org/pandora/bibliography.html
    All texts on "connected" are open for comment. Don't hesitate to send us yours . You can also be kept informed of new articles published on "connected".
    A Bibliography of the Connected World
    Books - Livres
    Les arbres de connaissances
    Banks Karen et aliud, Networking for Change - the APCWNSP's first 8 years , APC Women's Network Support programme, London, 2000
    Botkin James W., Elmandjra Mahdi, Malitza Mircea, No Limits to Learning - A report to the Club of Rome , Pergamon, Oxford, 1979
    , Flammarion, Paris, 1995
    Breton Philippe, L'utopie de la communication
    Breton Thierry, La dimension invisible , Odile Jacob, Paris, 1991
    Brown David, Cybertrends - chaos, power and accountabuility in the Information Age , Penguin, London, 1997
    Castells Manuel, The Power of Identity , Blackwell, Oxford 1997
    Casti John L., Complexification - Explaining a Paradoxical World through the Science of Surprise , Abacus, London, 1994
    Cohen Jack, Ian Stewart, The Collapse of Chaos - Discovering simplicity in a complex world , Penguin, London, 1994 Dreyfus Hubert L.

    23. Infowar.Com Forums - Powered By VBulletin
    Winn Schwartau's (author of Information Warfare ) forums for discussing information warfare, network security and legal hacking. Additional forums include hacking and programming tutorials and challenges.
    http://www.infowar.com/
    Main Menu Home Page
    Chez Winn

    Forums

    Site Features Active Topics News Recommend Us Search Top 10
    Book Review
    September 11th
    S M T W T F S
    Welcome to Infowar.Com Welcome to Infowar.Com! This site is Admin'd by Riff_Raff_50076 (riffraff50076@gmail.com) , Nitewolf (PM me) ,Pr0t0n (pr070n@gmail.com), and MsInfowar (msinfowar@earthlink.net)
    Thanks for stopping by. Infowar.Com has been around since 1996... and many sites cannot boast that fact!
    POST in the FORUMS
    WHAT's NEW, ANNOUNCEMENTS, and TRIBUTE TO FALLEN MILITARY PERSONAL in the WAR On TERROR , are moderated. Please do not post in those areas.
    RULES FOR POSTS: a. Be civil. No Flaming Allowed!! b. Be creative. Be original. c. Argue with forethought and reason. d. Give credit for © as appropriate. e. No “Me too” postings. It’s dumb. f. No threats, really bad language or other stuff that would make your mom blush. New user registrations may take up to 48 hours. For problems with registering please contact Riff_Raff_50076(riffraff50076@gmail.com) . Any issues? Contact Riff_Raff_50076 , Nitewolf, Pr0t0n, or MsInfowar . Please, no whining. Spellcheck before you post!

    24. Browse By Author: S - Project Gutenberg
    Schwartau, Winn. Terminal Compromise computer terrorism when privacy and freedom are the victims a novel (English)
    http://www.gutenberg.org/browse/authors/s
    Project Gutenberg Online Book Catalog Quick Search Author: Title Word(s): EText-No.: Advanced Search Recent Books Top 100 Offline Catalogs ... In Depth Information
    Browse By Author: S
    Authors: A B C D ... other Titles: A B C D ... other Languages with more than 50 books: Chinese Dutch English Finnish ... Spanish Languages with up to 50 books: Afrikaans Aleut Bulgarian Catalan ... Yiddish Categories: Audio Book, computer-generated Audio Book, human-read Data Music, recorded ... Pictures, still Recent: last 24 hours last 7 days last 30 days
    Sabatini, Rafael, 1875-1950

    25. PROJECT GUTENBERG - Catalog By Author - Index - Schwartau, Winn -
    Schwartau, Winn S Index Main Index Terminal Compromise computer terrorism when privacy and freedom are the victims a novel
    http://www.informika.ru/text/books/gutenb/gutind/TEMP/i-_schwartau_winn.html
    Etexts by Author Web Site Designed and Administered by Pietro Di Miceli , webmaster of PROMO.NET
    The Original URL of Project Gutenberg Web site is: http://promo.net/pg/

    26. Security Awareness Training And Materials (Interpact Inc.)
    Founded by Winn Schwartau, one of the leading Information Security professionals in the world, Interpact, Inc. offers a range of security awareness services
    http://www.thesecurityawarenesscompany.com/chez/chez.php
    Awareness Products Online Training Live Training Awareness Art Newsletters ... Partners Resources Trusted Learning Security Awareness Blog Infowar.com News Free Newsletter News Releases
    WINN BIO
    Directions for downloading:
  • Click on the thumbnail A larger image will be displayed Right click on the image Select "Save Picture As" or "Save Image As" Save the image to your hard drive
  • BOOKS BY WINN SCHWARTAU
    By Winn Schwartau, Illustrated by D.L. Busch. Cybershock Surviving Hackers, Phreakers, IdentityThieves, Internet Terrorists and Weapons of Mass Disruption
    By Winn Schwartau Time Based Security
    by Winn Schwartau Information Warfare : Chaos on the Electronic
    Superhighway and Information Warfare: Cyber-terrorism Second Edition Now available: Free .PDF version of Information Warfare, 1st edition. (1,996k). Download here
    Cyberwar: Espionage on the Internet
    by Jean Guisnel and Winn Schwartau The Complete Business Internet Toolkit
    By Winn Schwartau with Chris Goggins MEDIA KIT PHOTOS Home About Us Chez Winn Contact Us

    27. On Security
    Winn Schwartau is the president of Interpact, Inc., a security awareness consulting firm, and the author of many books including Information Warfare,
    http://www.networkworld.com/columnists/schwartau.html
    var outerref = new String("(none)"); var nwchannel = 'cn'; var refresh = 17; bannersrc = "http://ad.doubleclick.net/adi/idg.us.nwf.security/;pos=top;sz=728x90;ptile=1;type=opinion;ord=055413?";
    Opinion
    Columns
    Search / DocFinder
    Advanced search
    Click Here Home Research Centers Applications Convergence / VoIP ... Columns
    Search Schwartau
    Winn Schwartau is the president of Interpact, Inc. , a security awareness consulting firm, and the author of many books including " Information Warfare CyberShock Time Based Security " and " Internet and Computer Ethics for Kids ." His popular speeches entertain government and commercial audiences on three continents. E-mail him
    On Security
    By Winn Schwartau When management sets the wrong security culture
    To see two major remote banking systems designed with such holes suggests that the application development folks are using weak security as a trade-off for a simpler customer experience. Mad as hell, switching to Mac
    In the coming weeks I'm going to keep a diary of an experiment my company began at 6 p.m. April 29, 2005 - an experiment predicated on the hypothesis that the WinTel platform represents the greatest violation of the basic tenets of information ... It's time to redefine identity
    The BBB Identity Fraud Survey shows that only 11.6% of ID theft cases occur online. The rest comes from traditional offline physical means: lost ID, checks, credit cards, stolen mail and dumpster diving. Yet we still rely on static data as ID proof ...

    28. Mad As Hell, Switching To Mac
    Winn Schwartau. This is my first column written on a Mac ever. Winn Schwartau is the president of Interpact, Inc., a security awareness consulting
    http://www.networkworld.com/columnists/2005/052305schwartau.html
    var outerref = new String("(none)"); var nwchannel = 'cn'; var refresh = 17; bannersrc = "http://ad.doubleclick.net/adi/idg.us.nwf.security/;pos=top;sz=728x90;ptile=1;type=opinion;ord=055411?";
    research center:
    Security
    Search / DocFinder
    Advanced search
    Click Here Home Research Centers Applications Convergence / VoIP ... On Security
    Mad as hell, switching to Mac
    By Winn Schwartau , Network World, 05/23/05 This is my first column written on a Mac - ever. Maybe I should have done it a long time ago, but I never said I was smart, just obstinate. I was a PC bigot. But now, I've had it. I'm mad as hell and I'm not going to take it anymore. Is Schwartau right?
    Add your thoughts in the forum.
    Shattered Mac illusions

    Columnist Mark Gibbs: "I have been Macified." In the coming weeks I'm going to keep a diary of an experiment my company began at 6 p.m. April 29, 2005 - an experiment predicated on the hypothesis that the WinTel platform represents the greatest violation of the basic tenets of information security and has become a national economic security risk. I do not say this lightly, and I have never been a Microsoft basher, either. I never criticize a company without a fair bit of explanation, justification and supportive evidence. I have come to the belief that there is a much easier, more secure way to use computers. After having spent several years focusing my security work on

    29. Security Awareness For Ma, Pa And The Corporate Clueless©
    Where s Winn? Winn Schwartau will appear at 1230 pm Monday, August 8, on Your Turn with Mad as Hell Switching to Mac Chronology by Winn Schwartau
    http://securityawareness.blogspot.com/
    @import url("http://www.blogger.com/css/blog_controls.css"); @import url("http://www.blogger.com/dyn-css/authorization.css?blogID=7184105"); @import url(http://www.blogger.com/css/navbar/main.css); @import url(http://www.blogger.com/css/navbar/1.css); Notify Blogger about objectionable content.
    What does this mean?
    BlogThis!
    Security Awareness for Ma, Pa and the Corporate Clueless©
    The Security Awareness Blog gives computer security tips and tricks to government, corporations and home users. Our brand of Security Awareness training and materials is sponsored by Winn Schwartau's Security Awareness Company. We focus on the people - not the technology.
    Friday, September 09, 2005
    How to make clueless users ‘clueful’
    by Winn Schwartau
    [Thu, Jul 21, 2005] Little green men? Aliens from another world? Nope, it's just Winn Schwartau's latest obsession I like to call the art and science of giving clueless people a clue through security awareness training Clufology. Therefore, I must be a Clufologist.
    Read the whole story at SC Magazine posted by Greg W. Hoffman @

    30. Security Awareness For Ma, Pa And The Corporate Clueless©: Scams Of The Day H
    Scams of the Day Hit Winn Schwartau at Home. I have been hit with two telephone scams in Mad as Hell Switching to Mac Chronology by Winn Schwartau
    http://securityawareness.blogspot.com/2005/04/scams-of-day-hit-winn-schwartau-at
    @import url("http://www.blogger.com/css/blog_controls.css"); @import url("http://www.blogger.com/dyn-css/authorization.css?blogID=7184105"); @import url(http://www.blogger.com/css/navbar/main.css); @import url(http://www.blogger.com/css/navbar/1.css); Notify Blogger about objectionable content.
    What does this mean?
    BlogThis!
    Security Awareness for Ma, Pa and the Corporate Clueless©
    The Security Awareness Blog gives computer security tips and tricks to government, corporations and home users. Our brand of Security Awareness training and materials is sponsored by Winn Schwartau's Security Awareness Company. We focus on the people - not the technology.
    Thursday, April 21, 2005
    Scams of the Day Hit Winn Schwartau at Home
    I have been hit with two telephone scams in the last 24 hours… and it’s a damned good thing that I am paranoid and a right-bastard born and bred in New York Bank Scam: Red Flag #1. I got a call from “My Bank”, or that’s what the guy said, but it was . I know my bank, my bankers, my bank’s CISO and so on. I never get calls from my bank unless Mary or John call me personally. This call was urgent and needed my immediate attention.
    Red Flag #2: “We need to identify you sir to make sure you are you. What is your social security number?” FOOLS: Never ever give out your social to anyone, ever, for any reason, ever, ever…

    31. Business Security References
    AUTHOR Schwartau, Winn. TITLE Information warfare chaos on the electronic superhighway / Winn Schwartau. IMPRINT New York Thunder s Mouth
    http://www.neiu.edu/~ncaftori/business-ref.htm
    Business security References
    Bibliography
  • AUTHOR Quarantiello, Laura E., 1968-
  • TITLE Cyber crime : how to protect yourself from computer criminals
  • IMPRINT Lake Geneva, WI : Limelight Books, c1997.
  • AUTHOR McMahon, David.
  • TITLE Cyber threat : Internet security for home and business /
  • IMPRINT Toronto : Warwick Pub. Inc. ; Chicago, Ill. : Distributed in the U.S.A. by LPC Group, c2000.
  • AUTHOR Schwartau, Winn.
  • TITLE Cybershock : surviving hackers, phreakers, identity thieves, internet terrorists and weapons of mass disruption /
  • IMPRINT New York : Thunder's Mouth Press, 2000.
  • AUTHOR Jennings, Charles, 1948-
  • TITLE The hundredth window : protecting your privacy and security > in the age of the Internet / Charles Jennings and Lori Fena ; foreword by Esther Dyson.
  • IMPRINT New York : Free Press, 2000. Forensics-related references. other references. Return Last changed 01/02/03 var site="sm3path"
  • 32. TMO Reports - 'Mad As Hell' Author Winn Schwartau Explains How He Got There, Whe
    When security expert Winn Schwartau first declared he was Mad As Hell, he had no idea what kind of reaction he would elicit.
    http://www.macobserver.com/article/2005/06/24.6.shtml
    @import url("http://altmedia.macobserver.com/tmo_media/css/styles.css");
    You'll get your Mac news here from now on. Skip navigational links Choose text size: Help wanted: Join TMO's Team! We're looking for a Reporter
    TMO Reports - 'Mad as Hell' Author Winn Schwartau Explains How He Got There, Where He's Headed
    by eval(unescape('%64%6f%63%75%6d%65%6e%74%2e%77%72%69%74%65%28%27%3c%61%20%68%72%65%66%3d%6d%61%69%6c%74%6f%3a%62%72%61%64%63%40%6d%61%63%6f%62%73%65%72%76%65%72%2e%63%6f%6d%3e%42%72%61%64%20%43%6f%6f%6b%3c%2f%61%3e%27%29')) Brad Cook , 3:50 PM EDT, June 24th, 2005 When security expert Winn Schwartau first declared he was "Mad As Hell," he had no idea what kind of reaction he would elicit. As someone who built his first computer at the age of nine and has been involved in the industry since the 1960s, he told The Mac Observer that he was simply fed up with what he calls "a series of collapses constant reboots, application memory leaks, the 'blue screen of death' in a short period of time. "I've had it with the amount of downtime," he recalled saying. "Let's go try this [switching to the Mac] experiment. I had a fit and started writing about it. Then

    33. A Network Administrator Responds To Winn Schwartau's 'Mad As Hell' Declaration |
    When computer security expert Winn Schwartau declared he was mad as hell and The Winn Schwartau Effect. Jonathon Ive. Super Computers. Apple Stores.
    http://www.macobserver.com/article/2005/07/21.14.shtml
    @import url("http://altmedia.macobserver.com/tmo_media/css/styles.css");
    You'll get your Mac news here from now on. Skip navigational links Choose text size: Help wanted: Join TMO's Team! We're looking for a Reporter
    A Network Administrator Responds to Winn Schwartau's 'Mad as Hell' Declaration
    by eval(unescape('%64%6f%63%75%6d%65%6e%74%2e%77%72%69%74%65%28%27%3c%61%20%68%72%65%66%3d%6d%61%69%6c%74%6f%3a%62%72%61%64%63%40%6d%61%63%6f%62%73%65%72%76%65%72%2e%63%6f%6d%3e%42%72%61%64%20%43%6f%6f%6b%3c%2f%61%3e%27%29')) Brad Cook , 3:45 PM EDT, July 21st, 2005 When computer security expert Winn Schwartau declared he was "mad as hell" and switching his company to Macs , many in the IT sector sat up and took notice. One of those people was Rich Rumble , a security administrator and network engineer for a large dot-com with over 3,000 employees worldwide and more than 700 servers in use. In an interview with The Mac Observer conducted by e-mail, Mr. Rumble, who has little experience with Macs, said: "I think Winn has his finger on the pulse with most of these topics. Keep it simple, stupid (KISS) is a mantra recited over and over in the security field, especially in IT. I also think that Windows would be better off streamlining the kernel and cutting out the bloat with respect to the tasks you ask it to do, and the amount of code required to do them." Unfortunately, he doesn't see Microsoft's upcoming OS upgrade, which is code-named Longhorn and will ship late in 2006 or early in 2007, changing that situation. "That's to be expected," he explained, "as they need to have interoperability with past Microsoft products, so it stands to reason that they will simply build off the predecessors. Reinventing the wheel would cost much more in every respect.

    34. Speakers Platform Speakers Bureau: Winn Schwartau, Speaker On: Technology, IT Se
    Winn Schwartau s Speakers Platform Speakers Bureau speaking information Web site. Speaker On Technology, IT Security, Internet, Computers, Ecommerce.
    http://www.speaking.com/speakerpages/speakerpages,s/winnschwartauproducts.html
    Winn Schwartau
    TOPICS: Technology
    IT Security
    Internet
    Computers
    Ecommerce
    FEE CATEGORY: 5.0k to 10.0k
    Cybershock Surviving Hackers, Phreakers, Identity Thieves, Internet Terrorists and Weapons of Mass Disruption by Winn Schwartau Description The well-insulated public has not yet had the opportunity to learn what hackers and hacking are really all about: they don't understand the full scope of hacking and how profoundly it's changing all of our lives," says author Winn Schwartau. Written for the layperson, Hacking takes the reader from the basics (What is hacking? Who hacks?); through actual hacking tools and techniques; to corporate, law enforcement, and military hacking policies; to how to become a successful antihacker. It provides balanced viewpoints through words and images from the principal figures in the hacking and antihacking worlds: corporate security experts, lawyers, judges, security-conscious military and government officers, and hackers and phreakers themselves. Your book will be personally autographed by Winn Schwartau. Praise for Winn Schwartau and Cybershock "Cybershock

    35. New Page 1
    Schwartau, Winn. Information Warfare Chaos on the Electronic Superhighway. New York Thunder s Mouth Press, 1994. 30. Littman, Jonathan.
    http://www.lib.iup.edu/comscisec/Macf.htm
    Mac Fiddner's Dissertation Bibliography The National Security Threat of the U.S. Information Infrastructure System and U.S. Information Infrastructure System Security Policy (Draft)
    DISSERTATION BIBLIOGRAPHIES CHAPTER 1 – INTRODUCTION 1. Osgood, Robert E., and Robert W. Tucker. Force, Order, and Justice . Baltimore: The Johns Hopkins Press, 1967. 2. Millis, Water. An End to Arms . New York: Antheneum Press, 1964. 3. Campbell, Neil A. Biology . Redwood City, CA.: The Benjamin/Cummings Publishing Co., Inc., 1993. 4. Campbell, Donald T., and Julian C. Stanley. Experimental and Quasi-experimental Designs for Research Beyond Cold War Thinking: Security Threats and Opportunities (Report of the Twenty-Fifth United Nations of the Next Decade Conference sponsored by the Stanley Foundation), June 24-29, 1990, convened at The Lodge, Vail, Colorado. 6. Armed Forces Staff College. National Defense University. Formulation of National Strategy (Class 83). Volume 1: Student Guidance, Part 1. Norfolk, VA. January 1988.

    36. New Page 1
    Winn Schwartau gives the best definition I have found for Information Warfare Schwartau, Winn, Information warfare cyberterrorism protecting your
    http://www.lib.iup.edu/comscisec/SANSpapers/conrad.htm
    Information Warfare: Are you battlefield ready?
    Phillip A. Conrad
    February 13, 2001 What is Information Warfare and why should I care about it? Information warfare consists of those actions intended to protect, exploit, corrupt, deny, or destroy information or information resources in order to achieve a significant advantage, objective, or victory over an adversary. Winn Schwartau gives the best definition I have found for Information Warfare (IW). Add to this the three different classes of "personal IW", "corporate IW", and "global IW". Let’s take a look at these three classes and see why they are important to all of us. Personal IW can take many forms at the same time or one at a time. Types of "personal IW" can range from a bad credit report to a major phone system outage. What if you went to the store and paid for your items with a credit card, only to find out your card was rejected? No big deal, or is it? You may have just missed a payment, or you may be the victim of identity theft. You could be the target of a "personal IW" attack, someone trying to destroy your credit. Any information about you that is stored or used electronically is vulnerable to attack. Corporate IW also takes many forms. Corporate IW is an attack on what your company uses day to day to maintain its business. Therefore, anything from phones to electronic funds transfer are targets of IW. In January of 1998 there was an outage of a major phone system in Frankfurt. Approximately 54,000 phone lines were affected. Most lines were down for two days, but full restoration took ten days. Now, if your business were affected that way, could you afford to be without phones for ten days? What if this was not an accident or equipment failure, but rather a directed attack by an Information Warrior? What if this happened to more than one switching station at the same time? Would your company be able to withstand this kind of attack? Recent attacks have taken a more subtle form. When was the last your company had to deal with an e-mail virus? "

    37. Winn Schwartau @ STORAGE & SECURITY JOURNAL
    Winn Schwartau is one of the country s leading experts on information security, infrastructure protection and electronic privacy.
    http://issj.sys-con.com/author/5561Schwartau.htm
    Jump to a SYS-CON Magazine .NET Developer's Journal - .NETDJ ColdFusion Developer's Journal - CFDJ Eclipse Developer's Journal - EDJ Enterprise Open Source Magazine - EOS IT Solutions Guide - ITSG Java Developer's Journal - JDJ LinuxWorld Magazine - LW Macromedia MX Developer's Journal - MXDJ PowerBuilder Developer's Journal - PBDJ SEO / SEM (Search) Journal - SJ SOA Web Services Journal - WSJ Symbian Developer's Journal - SDJ WebLogic Developer's Journal - WLDJ WebSphere Journal - WJ XML-Journal - XMLJ Sign-In Register TOPICS All Sections ISSJ Archives From the Co-editors-in-Chief Standards ... Write For Us MOST READ THIS WEEK Condoleeza Rice Spends The Week At Broadway Shows and Shopping On Fifth Avenue By Yeshim Deniz Bloggers Call For Immediate Resignation Of FEMA Director Michael Brown By ISSJ News Desk Did Microsoft "Invent" the iPod? By ISSJ News Desk IBM Launches "Open Standards" Initiative By Enterprise Open Source News Desk By ISSJ News Desk Mytob and Zotob Computer Worm Investigation: Feds Make Two Arrests By ISSJ News Desk ADS BY GOOGLE Winn Schwartau Winn Schwartau is one of the country's leading experts on information security, infrastructure protection and electronic privacy. He balances his time between writing, lecturing, teaching and building corporate and national security-awareness programs and consulting to multinational organizations and governments worldwide. He is president and founder of Interpact, Inc., The Security Awareness Company (www.thesecurityawarenesscompany.com).

    38. FindArticles In Network World: Jan 8, 1996
    by Schwartau, Winn; 1996 Technology Planning Survey Spotting trends in server by Schwartau, Winn; Avoid throwing money into the outsourcing black hole
    http://www.findarticles.com/p/articles/mi_qa3649/is_199601
    @import url(/css/us/style1.css); @import url(/css/us/searchResult1.css); @import url(/css/us/articles.css); @import url(/css/us/artHome1.css); Advanced Search Home Help
    IN free articles only all articles this publication 10,000,000 articles - not found on any other search engine. FindArticles Network World Save a personal copy of any page on the Web and quickly find it again with Furl.net. Get started now. (It's free.) Articles in Jan 8, 1996, issue of Network World

    39. FindArticles In Network World: Jan 6, 1997
    by Schwartau, Winn; PSINet may be facing rough ride by Nerney, Chris; Cisco rivals make IP switching bid by Greene, Tim; Industry group membership has its
    http://www.findarticles.com/p/articles/mi_qa3649/is_199701/pg_2
    @import url(/css/us/style1.css); @import url(/css/us/searchResult1.css); @import url(/css/us/articles.css); @import url(/css/us/artHome1.css); Advanced Search Home Help
    IN free articles only all articles this publication 10,000,000 articles - not found on any other search engine. FindArticles Network World Jan 6, 1997 Save a personal copy of any page on the Web and quickly find it again with Furl.net. Get started now. (It's free.) Articles in Jan 6, 1997, issue of Network World

    40. Network Security From The Pros
    Schwartau, Winn. 1994. Information Warfare. Thunder s Mouth Press New York. Schwartau, Winn and Chris Goggans. 1996. The Complete Internet Business
    http://www.pdaconsulting.com/biblio.htm
    home our services about Peter Davis+Assoc. contact ... Windows NT/2000/XP and .NET Security
    Business
    Bergeron, Bryan. 2002. Dark Ages II: When the Digital Data Die . Prentice Hall: Upper Saddle River, NJ. Berners-Lee, Tim with Mark Fischetti. 1999. Weaving the Web . HarperCollins: New York. Coderre, David G. 1998. CAATTs and other Beasts for Auditors . Global Audit Publications: Vancouver, BC. Comer, Michael J., Patrick M. Ardis and David H. Price. 1988. Bad Lies in Business . McGraw-Hill: London. Davis, Stan and Bill Davidson. 1991. 2020 Vision Davis, Stanley M. 1987. Future Perfect . Addison-Wesley Publishing Company, Inc.: Reading, MA. Gelernter, David. 1991. Mirror Worlds or: The Day Software Puts the Universe in a Shoebox...How It Will Happen and What It Will Mean . Oxford University Press, Inc.: New York.

    A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z  

    Page 2     21-40 of 101    Back | 1  | 2  | 3  | 4  | 5  | 6  | Next 20

    free hit counter