MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
Bank Technology News
July 2008
Rebecca Sausner
Could the U.S. Be the Next Estonia? Gadi Evron, former Israeli Government Internet Security Operations Manager, went to Estonia during the crippling DDOS attacks last May. Here he talks about whether the U.S. is vulnerable to such an attack, and the role banks and home computers play in protecting critical infrastructure. mark for My Articles similar articles
AskMen.com
Branden Peters
How To: Avoid Getting Hacked Thankfully there are several ways to protect your information and identity from malicious attacks. Some are common sense and others require thought and money. mark for My Articles similar articles
Wall Street & Technology
January 5, 2007
Larry Tabb
Preparing for the Inevitable While electronic thefts can be cleaner, less physical and certainly less bloody, the chance of getting money out of a brokerage or bank illegally is usually greater with a gun than a computer. But as the criminals and terrorists get smarter, we too must raise the bar. mark for My Articles similar articles
Knowledge@Wharton
March 26, 2003
An Aging, Fatter Population Drives Demand for New Medical Devices The use of implantable devices to treat heart disease, orthopedic complaints and other conditions is growing strongly because of advancing technology, increasing demand from an ageing and overweight population, and greater acceptance by physicians and patients of implantation. mark for My Articles similar articles
Linux Journal
September 2001
Thomas Osterlie
Review: Hacking Linux Exposed Hacking Linux Exposed deals with security-related threats to Linux systems. It's a book for practitioners by practitioners, with an emphasis on practice rather than theory... mark for My Articles similar articles
InternetNews
August 2, 2010
Google Hacking for Enterprise Security: Black Hat At the Black Hat security conference, researchers describe their work expanding on the technique known as Google hacking to leverage the search engine to improve enterprise security. mark for My Articles similar articles
InternetNews
August 3, 2007
Sean Michael Kerner
Black Hat And The Jedi Force Hackers have a lot of different tools at their disposal, but low-tech hacking may be all they really need. mark for My Articles similar articles
CIO
August 29, 2011
Robert McMillan
Five Things CIOs Need to Know about Anonymous The hacking collective dubbed Anonymous has unleashed its brand of pesky "operations" on companies from Visa to Sony. Here are the top five things you need to know about their antics. mark for My Articles similar articles