Geometry.Net - the online learning center
Home  - Book_Author - Schwartau Winn
e99.com Bookstore
  
Images 
Newsgroups
Page 5     81-100 of 101    Back | 1  | 2  | 3  | 4  | 5  | 6  | Next 20
A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z  

         Schwartau Winn:     more books (19)
  1. Information Warfare: Second Edition by Winn Schwartau, 1996-11-01
  2. Cybershock: Surviving Hackers, Phreakers, Identity Thieves, Internet Terrorists and Weapons of Mass Disruption by Winn Schwartau, 2001-03-30
  3. Time Based Security by Winn Schwartau, 1999-02-01
  4. Information Warfare by Winn Schwartau, 2010-09-07
  5. Pearl Harbor Dot Com by Winn Schwartau, 2002-01-01
  6. Complete Internet Business Toolkit by Winn Schwartau, Chris Goggans, 1996-06
  7. Internet & Computer Ethics for Kids: (and Parents & Teachers Who Haven't Got a Clue.) by Winn Schwartau, 2001-04-01
  8. Terminal Compromise: Computer Terrorism in a Networked Society by Winn Schwartau, 1991-06
  9. Winn Schwartau - Terminal Compromise by Winn Schwartau, 2009-07-12
  10. Cybershock: Surviving Hackers, Phreakers, Identity Thieves, Internet Terrorists by Winn Schwartau, 2000-01-01
  11. Low cost computer security.: An article from: Security Management by Winn Schwartau, 1994-06-01
  12. Cybershock by Winn Schwartau, 2000-01-01
  13. Pearl Harbor Dot Com by Winn Schwartau, 2002
  14. A Shitload of Practical Uses for the Most Flexible Word in the English Language: by Winn Schwartau, 2005-10-01

81. Radcliff Joins Schwartau’s Security Awareness Team
the awardWinning Information Security and Computer Industry writer, has joined Winn Schwartau’s InterPact Inc., The Security Awareness Company,
http://www.prweb.com/releases/2004/7/prweb140346.htm
PR Web (English)
AmbosMedios (Español

WunZhang (Traditional Chinese

Home
... Search Archives September 11, 2005 CUSTOM PRESS RELEASE FEED FOR JOURNALISTS MEMBER LOGIN (SUBMIT YOUR PRESS RELEASE) Customize your free daily PRWEB news feed. Register Here to Send Your Press Release ...
All Press Releases for July 15, 2004
Radcliff Joins Schwartau’s Security Awareness Team
Deborah Radcliff, the award-winning Information Security and Computer Industry writer, has joined Winn Schwartau’s InterPact Inc., The Security Awareness Company, as a subject matter expert for the company’s newly expanded security awareness programs. SEMINOLE, FL (PRWEB) July 15, 2004 -– Deborah Radcliff, the award-winning Information Security and Computer Industry writer, has joined Winn Schwartau’s InterPact Inc., The Security Awareness Company, as a subject matter expert for the company’s newly expanded security awareness programs.
Radcliff’s experience and technical writing skills will be used for developing online training courses on hundreds of topics related to The Security Awareness Company's products and services.

82. Understanding September 11
Schwartau, Winn. CyberShock surviving hackers, phreakers, identity thieves, Internet terrorists, and weapons of mass disruption. New York Thunder s Mouth
http://library.gallaudet.edu/lr/sept11-laj.html
Library
Resources
Understanding September 11:
A Selected Bibliography
This bibliography includes both books about the events of September 11, 2001, and books for background reading. The list is divided into four sections: books on September 11 itself, books on terrorism, books on Middle Eastern politics and U.S. foreign policy, and books on Islam. It includes only books published since 1990. All these books are available at Gallaudet University Library. In addition, the Library has thousands of newspaper and journal articles about the attacks and their aftermath. More books are also available from other Consortium libraries. For help, contact the Library:
Phone: X5212 (tty), x 5217 (v)
Email: library.reference@gallaudet.edu September 11
  • Chomsky, Noam. . New York: Seven Stories Press, 2001.
    General Stacks 363.320973 C45n 2001
  • Fink, Mitchell, and Mathias, Lois. Never forget: an oral history of September 11, 2001 . New York: ReganBooks/HarperCollins Publishers, 2002.
    General Stacks 974.71044 F56n 2002

83. Radcliff Joins Schwartau’s Security Awareness Team
Winn Schwartau, president of InterPact, is known worldwide for his expertise in the Information Security Industry. He has written more than a dozen books,
http://www.emediawire.com/releases/2004/7/prweb140346.php
PR Web (English)
AmbosMedios (Español

WunZhang (Traditional Chinese

Home
... Editors/Journalists September 11, 2005 CUSTOM PRESS RELEASE FEED FOR JOURNALISTS MEMBER LOGIN Customize your free daily PRWEB news feed. Register Here! ...
All Press Releases for July 15, 2004
Radcliff Joins Schwartau’s Security Awareness Team
Deborah Radcliff, the award-winning Information Security and Computer Industry writer, has joined Winn Schwartau’s InterPact Inc., The Security Awareness Company, as a subject matter expert for the company’s newly expanded security awareness programs. SEMINOLE, FL (PRWEB) July 15, 2004 -– Deborah Radcliff, the award-winning Information Security and Computer Industry writer, has joined Winn Schwartau’s InterPact Inc., The Security Awareness Company, as a subject matter expert for the company’s newly expanded security awareness programs.
Radcliff’s experience and technical writing skills will be used for developing online training courses on hundreds of topics related to The Security Awareness Company's products and services.
“We work with our clients to educate their users in an effective, yet entertaining way,” said Schwartau, president of The Security Awareness Company. “Deb fits into our corporate culture and will help us convey our message that information security policies and procedures need to be understood and followed by everyone in an organization.”

84. Computer Underground Digest Wed Jan 16, 1996 Volume 8 : Issue 05 ISSN 1004-042X
DES is also vulnerable to advances in technology, as Winn Schwartau states Schwartau, Winn. Information Warfare Chaos on the Information Superhighway.
http://www.skepticfiles.org/hacker/cud805.htm
Computer underground Digest Wed Jan 16, 1996 Volume 8 : Issue 05 ISSN 1004-042X Editors: J
Subject: File 3FLASH: Phil Zimmermann case dropped! This is FABULOUS news! Please distribute widely! -Declan // declan@eff.org // My opinions are not in any way those of the EFF // SubjectZimmermann case is dropped. DateMon, 8 Jan 1996 03:35:46 -0700 (MST) FromPhilip Zimmermann Subject: File 7News Release >> Child Safe Ratings on the Internet (fwd) Forwarded message DateThu, 11 Jan 1996 20:41:41 -0400 Fromted resnick SubjectNews Release >> Child Safe Ratings on the Internet THE MCKINLEY GROUP SAYS GREEN LIGHT MEANS GO New Green Light Icon to Appear on all Web Sites Not Containing Material Apparently Intended for Mature Audiences SAUSALITO, CA (January 9, 1996) - In response to the increasing concern over the accessibility of Internet sites containing offensive or inappropriate content for the broader audience, The McKinley Group announced today that it has positioned a Green Light icon to appear next to descriptions of all the reviewed Web sites in its Magellan Internet Directory givecookie("BodyThetans", "Skeptic Tank Archives")

85. CyberShock : Surviving Hackers, Phreakers, Identity Thieves, Internet Terrorists
Schwartau, Winn Corporate Author Publisher Thunder s Mouth Press Publish Place New York, NY Subject Computer security Computer hackers Computer crimes
http://www.ncpc.org/ncpc/ncpc/?pg=2088-487

86. Superior Air Warfighter Bibliography (1997)
K46 1997 (ADA311158) Information warfare chaos on the electronic superhighway / by Schwartau, Winn. New York Thunder s Mouth Press, 1994. QA76.9.
http://www.wrs.afrl.af.mil/library/airsup.htm

87. Business: Computer Security's Rock N Roll Pioneer
Winn Schwartau relaxes at home in Seminole. The focus of his books and lectures is that Winn Schwartau was called Chicken Little several years ago,
http://www.sptimes.com/Hackers/monhackercover.html
Home
Weather
Lottery
Classifieds
Sports
Comics
Forums
AP Wire
Web Specials
The bible of phreaking faithful
Computer security's
rock 'n' roll pioneer
Winn Schwartau relaxes at home in Seminole. The focus of his books and lectures is that the country's growing dependence on computers has outgrown our ability to manage and secure them. [Times photo: Andrew Innerarity] Winn Schwartau was called "Chicken Little" several years ago, when he said the United States was vulnerable to electronic attack. Now he makes money taming that threat. By ROBERT TRIGAUX Talking the talk Hackers have their own lingo and style of writing: A plug-and-play is somebody who does not need any training to use a computer. But a Hackers also are big on abbreviations and revised spelling. IMHO IMAO , recently published in its third edition. Want to know what an obi-wan error A newbie ? Someone new to the Internet or to a particular subject. Heard of mouse droppings ? They are the pixels that are not properly restored on a PC screen when a computer mouse is moved.

88. SANS Intrusion Detection FAQ: What Is A Honeypot?
Schwartau, Winn. Lying to hackers is okay by me Part 9 of 9 7 July 1999. URL http//www.nwfusion.com/newsletters/sec/0705sec2.html?nf 21 June 2000
http://www.sans.org/resources/idfaq/honeypot3.php
Training Events Reading Room Internet Storm Center GIAC Certification ... Free Webcast - September 14, 2005: Internet Storm Center: Threat Update The SANS community extends our best wishes to our friends in New Orleans. SANS Network Security 2005 About SANS Contact SANS F.A.Q. ...
Intrusion Detection FAQ

What is a Honeypot? Honey Pot Systems Explained
Loras R. Even
July 12, 2000
Overview
Honey Pot Systems are decoy servers or systems setup to gather information regarding an attacker or intruder into your system. It is important to remember that Honey Pots do not replace other traditional Internet security systems; they are an additional level or system.
Honey Pots can be setup inside, outside or in the DMZ of a firewall design or even in all of the locations although they are most often deployed inside of a firewall for control purposes. In a sense, they are variants of standard Intruder Detection Systems (IDS) but with more of a focus on information gathering and deception.
An example of a Honey Pot systems installed in a traditional Internet security design:
A Honey Pot system is setup to be easier prey for intruders than true production systems but with minor system modifications so that their activity can be logged of traced. The general thought is that once an intruder breaks into a system, they will come back for subsequent visits. During these subsequent visits, additional information can be gathered and additional attempts at file, security and system access on the Honey can be monitored and saved.

89. TalkBack: IM Threats On The Rise | Reader Response On| CNET News.com
by my friend Winn Schwartau. Winn has dedicated his life’s work to teaching parents, children and the “corporate clueless” about the fundamentals of
http://news.com.com/5208-7349-0.html?forumID=1&threadID=8526&messageID=60092&sta

90. TwURLed World Thumbnail Information Warfare An Overview By
Information Warfare An Overview by Winn Schwartau http//www.interpactinc.com/IWseminar.html......twURLed World
http://www.twurled-world.com/Infowar/Update3/URL_Details/URL_176.htm

Domains
Top 10 Keywords
Decisions
... Topic: Information Warfare and U.S. Critical Infrastructure Protection
URLs:
previous next
All
Site ...
Where am I?
twURLed World Description: Information Warfare: An Overview by Winn Schwartau
http://www.interpactinc.com/IWseminar.html
Valuation 94: quintile (low-high) Decision: Keywords *infowar: computer crime crypto cryptography ... training Annotations Interpact's Information Security Awareness Programs and Information Security Services
[excerpted by copernic] ServicesWinn SchwartauInfosecGateHomeSite MapContact INFORMATION WARFARE:From Security to Infrastructure Protection to the Military: An Overview of Security, ElectronicCivil Defense and the Networked SocietyBy Winn SchwartauEver since Assistant Secretary of Defense John lHamre in April 1998 and July, 1999 declared ""We Are At War", the media has stood up and notice...
[excerpted by twURL] SOURCE Links:
  • COPERNIC Infowar.csv - -> DETAILS
  • HTML META
    keywords
    information security services, e-commerce, cybercrime, security awareness, training, hackers, hacking, information security consulting, infowar, information warfare, netspionage, infosec, Information Protection, information security portal, espionage, computer crime, crypto, cryptography
    description Interpact's Information Security Awareness Programs and Information Security Services
  • 91. Free EBooks - Alphabetical List - GLOBUSZ PUBLISHING
    41, no. 1. Schwartau, Winn. Terminal Compromise computer terrorism when privacy and freedom are the victims a novel. Scollard, Clinton, 18601932
    http://www.globusz.com/authors_s.asp
    MORE BOOKS HERE Search eBooks
    Search Paper Books
    MEMBERSHIP As a Globusz member you will be entitled to free passwords, and have full access to our fastest growing online library!
    CATEGORIES Adult
    Ancient

    Biographies

    Business
    ... Z Sabatini, Rafael
    [Download]
    Sade, Donatien Alphonse François de
    [Download]
    [Download] Saki (Munro, Hector Hugh)
    [Download]
    Sand, George
    [Download]
    Schweidler, Mary [Download] Sewell, Anna [Download] Shakespeare, William [Download] Shaw, George Bernard [Download] [Download] Sherman, William Tecumseh [Download] [Download] Silva, Luis [Download] Silvero, Anibal [Download] Slaveykov, Pencho [Download] Slemons, J. Morris [Download] Slocum, Joshua [Download] Smith, Adam [Download] [Download] Spinoza, Baruch [Download] Stapley, Mildred [Download] Steele Richard and Addison, Joseph [Download] Sterne, Laurence [Download] Stevenson, Robert Louis [Download] [Download] St.John, D.W. [Download] Stockton, Francis Richard [Download] [Download] Stoker, Bram [Download] [Download] Strachey, John St. Loe [Download] Strachey, Lytton [Download] Sun, Tzu [Download] Synge, John Millington

    92. Schv-Schz
    Schwartau, Winn. Information Warfare Chaos on the Electronic Highway. New York Thunder s Mouth Press, 1994. Information Warfare; Cyberterrorism
    http://intellit.muskingum.edu/alpha_folder/S_folder/schv-schz.html
    Schv - Schz
    Schwab, Gerald. OSS Agents in Hitler's Heartland: Destination Innsbruck . Westport, CT: Praeger, 1996. This work focuses on an OSS intelligence gathering operation inside Austria in early 1945. It is based on interviews with some of those involved and on declassified OSS documents. Witmer , at http://www.thehistorynet.com/reviews, calls it "a reliable reference work and a highly entertaining read." Anderson Air Chronicles http://www.airpower.maxwell.af.mil ], notes that Schwab "covers the whole spectrum of Operation Greenup, from planning through termination.... The book is both well written and researched." [WWII/OSS/GerOps] Schwartau, Winn. Information Warfare: Chaos on the Electronic Highway . New York: Thunder's Mouth Press, 1994. Information Warfare; Cyberterrorism: Protecting Your Personal Security in the Electronic Age. 2d ed. 1996. [pb] Steele Periscope 19.5: This is the "best available professional reading on the subject of C4I warfare." It "concludes with ... an outline for a recommended national C4I security strategy." This view is concurred in by Miller 11.2, who calls Schwartau's book "a valuable resource in the effort to combat those who seek to penetrate government, corporate, and personal security."

    93. DEF CON II Archives
    Winn Schwartau Overview of Tempest and VanEck shielding and radiation. Winn Schwartau High Energy, Radio Frequency (HERF) and Electro Magnetic Pulse
    http://www.defcon.org/html/defcon-2/defcon-2.html
    Last Updated 07.28.99
    Please email the Dark Tangent with any DEF CON related links, articles, pictures, etc. Thanks! The Official DEF CON 2 Banana was snatched from a Tropicana dancing girl's fruit hat. BEFORE DURING
    • Pictures from the convention. Speakers Friday Night:
    • Mr. Upsetter and Damien Thorn An impromptu cellular workshop covering cloning call tracking, etc.
      Hear it! Real Audio ( 28k-isdn surestream
  • Speakers Saturday:

  • KEYNOTE
    Phil Zimmermann
    Philip R. Zimmermann is a software consultant specializing in cryptography, authentication, and data security, and is a leading advocate for public access to strong cryptography. He is the author of PGP (Pretty Good Privacy), a free public key encryption software package that has become the worldwide de facto standard for the encryption of email. The publication and wide dispersion of this software and its extensive use on the Internet worldwide has led to export control problems and conflict with the National Security Agency's desire to restrict the general use of high quality encryption, and has triggered a US Customs criminal investigation.
    Hear it!

    94. Reading List
    Schwartau, Winn (1996). Information Warfare. New York Thunder Mountain Press. Sessions, William (1991). Computer Crimes An Escalating Trend.
    http://users.aol.com/crimejust/reading_list.html
    Law Enforcement and Computer-Related Crime: A Reading List This is a reading list which I have compiled and now after many requests have made available online. Some of you may notice public administration and organizational theory literature herethis is because these fields offer insight into the dillemma law enforcement currently finds itself: mechanistic organizations attempting to harness an organic variable in a hyper-dynamic environment. The list too is organic.
    • Barnard, Chester (1960). The Functions of the Executive. Cambridge: Harvard University Press. Bennett, Georgette (1987). Crime Warps: The Future of Crime in America. Garden City: Anchor Books/Anchor Press. Bennis, Warren (1967). "Organizations of the Future." Personnel Administration. September- October . Bowling, Craig (1997). "The Internet, Digital Disorder, and Police Agencies: A Survey of Theoretical and Pragmatic Issues in the Cyber-Age." Paper presented at the Annual Meeting of the Academy of Criminal Justice Sciences, Louisville, KY. Bowling, Craig (1997). ""Digital Disorder and Policing in the Next Millennium: Examining Issues of Concern for Law Enforcement in the Information Age and Beyond." Submitted in partial fulfillment for the degree of Master of Arts in Criminal Justice, Washington State University.

    95. The Risks Digest Volume 21: Issue 7
    o REVIEW CyberShock , Winn Schwartau Rob Slade; o Info on RISKS (comp.risks). . California DMV fosters identity theft?
    http://catless.ncl.ac.uk/Risks/21.07.html
    Forum on Risks to the Public in Computers and Related Systems
    ACM Committee on Computers and Public Policy, Peter G. Neumann , moderator Search RISKS using swish-e
    Volume 21: Issue 7
    Sat 30 September 2000
    Contents
    California DMV fosters identity theft?
    PGN
    Single points of failure and backup plans
    William P.N. Smith ...
    Info on RISKS (comp.risks)
    California DMV fosters identity theft?
    Mon, 25 Sep 2000 14:08:03 PDT An AP item (seen by me on the front page of the *Palo Alto Daily News*, 25 Sep 2000) says that the California Department of Motor Vehicles issued over 100,000 fraudulent drivers' licenses in 1999, and typically makes little or no effort to check the validity of the 900,000 duplicate license requests it receives each year. Examples include duplicate licenses issued to people of the wrong race or the wrong gender, and in one case bogus duplicates of a particular individual's license to 18 different people. The driver's license is called a ``breeding document'' for identity thieves, leading to financial fraud, ruined credit, purchases of firearms by felons, and other misuses. DMV officials claim that implementing an on-line photo-retrieval system would cost $3 million over the next two years. This seems like a useful system especially if it were used pervasively.
    Single points of failure and backup plans
    Mon, 25 Sep 2000 17:00:37 -0400

    96. Other Sources Of Security Books And Articles
    Schwartau, Winn. TimeBased Security. Seminole, FL Interpact Press, 1999. Stevens, W. Richard. TCP/IP Illustrated,Volume 1 The Protocols.
    http://www.cert.org/other_sources/books.html
    Options
    Publications by CERT Staff
    Presentations by CERT Staff CERT Statistics Meet CERT
    Related Security books and articles Internet groups and statistics Security related groups U.S. Government resources ... Web security Related Sites
    Other Sources of Security Books and Articles
    Page contents
    General Information about Network Security
    Abrams, Marshall D.; Podell, Harold J.; and Jajodia, Sushil. Information Security: An Integrated Collection of Essays . Los Alamitos, CA: IEEE Computer Society Press, 1995. Ahuja, Vijay. Network and Internet Security . Boston, MA: AP Professional, 1996. Allen, Julia H. The CERT Guide to System and Network Security Practices . Boston, MA: Addison-Wesley, 2001. Anderson, Ross J. Security Engineering: A Guide to Building Dependable Distributed Systems Atkinson, Randall J. "Toward a More Secure Internet." IEEE Computer 30 , 1 (Jan. 1997): 57-61. Bosselaers, Antoon, Preneel, Bart. Integrity Primitives for Secure Information Systems: Final Report of RACE Integrity Primitives Evaluation RIPE-RACE 1040. Lecture Notes in Computer Science: 1007. Berlin and New York: Springer, 1995.

    97. CNN - Cyber-vigilantes Hunt Down Hackers - January 12, 1999
    by Winn Schwartau, From Schwartau is chief operating officer of The Security Experts, a global security consulting firm, and president of infowar.com
    http://www.cnn.com/TECH/computing/9901/12/cybervigilantes.idg/

    MAIN PAGE
    WORLD ASIANOW U.S. ... news quiz
    CNN WEB SITES: TIME INC. SITES: Go To ... Time.com People Money Fortune EW MORE SERVICES: video on demand video archive audio on demand news email services ...
    pagenet

    DISCUSSION: message boards chat feedback
    SITE GUIDES: help contents search
    FASTER ACCESS: europe japan
    WEB SERVICES:
    Cyber-vigilantes hunt down hackers
    January 12, 1999
    Web posted at: 12:19 a.m. EDT (1219 GMT) by Winn Schwartau From...
    (IDG) In September 1998, the Electronic Disturbance Theater, a group of activists that practices politically driven cyber civil-disobedience, launched an attack aimed at disabling a Pentagon Web site by flooding it with requests. The Pentagon responded by redirecting the requests to a Java applet programmed to issue a counteroffensive. The applet flooded the browsers used to launch the attack with graphics and messages, causing them to crash. The incident raises issues all user organizations will soon have to grapple with, if they haven't already. When you detect a break-in, should you launch a counterattack in order to protect your network? Is law enforcement capable of stopping cybercrime and can it be trusted to keep investigations quiet? If not, do corporations have a right to defend themselves?

    98. Recommended Cryptography Books: Information Warfare Section
    Schwartau, Winn. 1996, 2nd edition. 768 pages. Categories Information Warfare. Between the black covers are 768 pages of articles not just on encryption,
    http://www.youdzone.com/cryptobooks_InformationWarfare.html
    Information Warfare Section:
    I am not trying to build a complete listing of information warfare related books. Rather, these are books that (in a least a small way) take a cryptographic perspective on information warfare.
    (If it’s here, I have it. If it’s reviewed, I have, at a minimum, read all of the crypto-relevant parts.) A Short Course on Computer Viruses
    Cohen, Frederick B. 1994, 2nd edition. 288 pages. Categories: Information Warfare Mathematics I occasionally review books here, not because they are predominantly cryptography oriented, but because they say something about cryptography that other books do not. This book briefly discusses how cryptography (in the context of integrity shells) can stop computer viruses.
    Since Fred Cohen was in the business of promoting his integrity shell, he of course demonstrates (with 2 pages of equations no less!) that they are more cost effective than virus scanners, because in comparison, with virus scanners one incurs "the cost of cleanup for attacks that monitors don’t detect." He summaries this argument with "Except under the most contrived circumstances, integrity shells are the most cost effective of the anti-virus techniques currently available for untrusted systems, and this gap will widen with the passage of time." Yeah right.
    Dr. Cohen is best know for "Cohen’s Result" a straightforward restatement of the Turing halting problem, where halting should occur if a sequence belonging to a virus set is generated. This is obviously as impossible as predicting computational halting in the general case. Wish I could have received a PhD for that.

    99. PRIVACY Forum Archive Document - (priv.05.02)
    Abelson) Data Mining and Knowledge Discovery (Phil Agre) InfoWarCon (Winn Schwartau) *** Please include a RELEVANT Subject line on all submissions!
    http://www.vortex.com/privacy/priv.05.02
    VortexScan: Current News and Links Worth Your time FACT SQUAD RADIO Today: "Technology vs. Iraqi Prisoner Abuse" REALITY RESET Today: "The Monster in the Mirror" PRIVACY Forum Archive Document
    PRIVACY Forum Home Page
    PFIR - "People For Internet Responsibility" Home Page Vortex Technology Home Page Radio, Television, and Press Contact Information PRIVACY Forum Digest Sunday, 14 January 1996 Volume 05 : Issue 02 Moderated by Lauren Weinstein ( lauren@vortex.com ) Vortex Technology, Woodland Hills, CA, U.S.A. ===== PRIVACY FORUM ===== - The PRIVACY Forum is supported in part by the ACM Committee on Computers and Public Policy, "internetMCI" (a service of the Data Services Division of MCI Telecommunications Corporation), and Cisco Systems, Inc. - - - These organizations do not operate or control the PRIVACY Forum in any manner, and their support does not imply agreement on their part with nor responsibility for any materials posted on or related to the PRIVACY Forum. - CONTENTS "Privacy: 1996" (Lauren Weinstein; PRIVACY Forum Moderator) Caller ID leakage? (Beth Givens) Videotaping homes for tax purposes (Steve Holzworth) Mutual of Omaha and s.s.n's ( nrota@cris.com

    100. [X4U] Randy Gets Praised By Winn "Mad As Hell" Schwartau
    One of the hottest threads at the moment is Winn Schwartau s Mad as Hell series looking at this security experts selfexpulsion from Wintel, and his entre
    http://listserver.themacintoshguy.com/pipermail/X4U/2005-May/006558.html
    [X4U] Randy gets praised by Winn "Mad as Hell" Schwartau
    Les Posen lesposen at optushome.com.au
    Tue May 31 00:41:01 PDT 2005 One of the hottest threads at the moment is Winn Schwartau's "Mad as Hell" series looking at this security experts self-expulsion from Wintel, and his entre to the Mac world. Randy Singer gets a very nice mention on his page today on Mac security: < http://securityawareness.blogspot.com/2005/05/comments-from-mac- More information about the X4U mailing list

    A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z  

    Page 5     81-100 of 101    Back | 1  | 2  | 3  | 4  | 5  | 6  | Next 20

    free hit counter