Call for papers

SecurityFocus ( www.securityfocus.com ) is currently accepting submissions for new Infocus articles. We would like to extend an invitation to security researchers, authors and academics for submissions on topics of interest to the security community. Submissions should include a short summary along with the author's name, email address and contact information. All submissions should be in MS Word format and should be sent to: editor@securityfocus.com

Infocus: Foundations (Page 11 of 11)   < Prev  1 2 3 4 5 6 7 8 9 10 11 
Laptop Security, Part Two: Protecting Information on a Stolen Laptop
This is the second of a two-part series on laptop security. In the first installment of this series on Laptop Security we discussed methods of preventing laptop theft using both hardware and software solutions. This article will cover some good methods of mitigating loss when a laptop has been stolen.
By: Josh Ryder 2001-08-13
http://www.securityfocus.com/infocus/1187

Laptop Security, Part One: Preventing Laptop Theft
Laptops have become a valuable part of the computing arsenal. Unfortunately, the mobility, power and connectivity that make laptops so useful to employees and organizations also makes them valuable prizes for thieves. This article, the first in a two-part series devoted to laptop security, will give a brief overview of how users can prevent laptop theft. The second article in this series will discuss steps that users can take to minimize the loss of valuable information through laptop theft.
By: Josh Ryder 2001-07-30
http://www.securityfocus.com/infocus/1186

Welcome to the SecurityFocus "The Basics" Focus Area
By: Stephen Entwisle 2000-11-06
http://www.securityfocus.com/infocus/1185

An Introduction to Incident Handling

By: Chad Cook 2000-11-29
http://www.securityfocus.com/infocus/1184

Identifying ICMP Hackery Tools Used In The Wild Today
By: Ofir Arkin 2000-12-04
http://www.securityfocus.com/infocus/1183

Firewalls For Beginners
By: Sunil Hazari 2000-11-06
http://www.securityfocus.com/infocus/1182

Introduction to Encryption
By: Chad Cook 2000-11-06
http://www.securityfocus.com/infocus/1181

A Beginner's Guide to the Internet
By: Stephen Entwisle 2000-11-06
http://www.securityfocus.com/infocus/1180

Evaluating Anti-Virus Software for Home Use
By: Paul Schmehl 2001-03-14
http://www.securityfocus.com/infocus/1179

Foundations (Page 11 of 11)   < Prev  1 2 3 4 5 6 7 8 9 10 11 


 

Privacy Statement
Copyright 2010, SecurityFocus