𝔖 Bobbio Scriptorium
✦   LIBER   ✦

Is your Web site secure?

✍ Scribed by Helen Meyer


Publisher
Elsevier Science
Year
1997
Tongue
English
Weight
126 KB
Volume
16
Category
Article
ISSN
0167-4048

No coin nor oath required. For personal study only.

✦ Synopsis


pen-based digitizer pad or a mouse.You attach your password-protected signature to a document by clicking in a Word menu option. ApproveIt detects


πŸ“œ SIMILAR VOLUMES


Securing your users' Web browsers
✍ Helen Meyer πŸ“‚ Article πŸ“… 1997 πŸ› Elsevier Science 🌐 English βš– 96 KB

Backdoor closes, for now, on crypt0 plan, John Rendleman. In the United States, the House Energy and Commerce Committee recently defeated a proposal that would have required encryption products to include a 'backdoor' for law enforcement officials. In its place, the Commerce Committee approved a mor

Protecting Your Web Site from Criminal H
✍ Chris Schroeder; Gordon Smith πŸ“‚ Article πŸ“… 2002 πŸ› John Wiley and Sons 🌐 English βš– 60 KB

## Abstract Do you think you're protected from hackers because you have nothing valuable on your Web site? Or do you think company data are safely hidden behind a β€œfirewall”? Better take another look, warn the authors, whose security audits routinely uncover problems. __Β© 2002 Wiley Periodicals, In

DHS needs to fix web site security
πŸ“‚ Article πŸ“… 2009 πŸ› Elsevier Science 🌐 English βš– 144 KB

In addition to stopping both data leaks, and potentially the monitoring of movement within buildings, the paint could also be used to stop mobile phones ringing in theatres by preventing signals from reaching handsets, the researchers said. ## DHS needs to fix web site security The Department of

High profile Web sites warrant high secu
πŸ“‚ Article πŸ“… 1997 πŸ› Elsevier Science 🌐 English βš– 235 KB

## Vulnerabilities in pluggable authentication module According to Sun Microsystems Security Bulletin #00139 vulnerabilities exist in certain versions of SunOS. The vulnernable versions are: 5.5.1, 5.5.1-x86, 5.5, 5.5-x86, 5.4, 5.4-x86 and 5.3; those that are not vulnerable are 4.1.4 and 4.1.3\_Ul

IT SECURITY OUTSOURCING: HOW SAFE IS YOU
✍ Colette Fenn; Robert Shooter; Ken Allan πŸ“‚ Article πŸ“… 2002 πŸ› Elsevier Science 🌐 English βš– 56 KB

The 'Information Security Survey 2001' (published by Ernst & Young) found that 66% of respondent companies were fearful about inadequate IT security and claimed this was the single biggest inhibitor to the expansion of electronic commerce. Their insecurity would appear fully justified when you consi