Back to Results
First PageMeta Content
Crime prevention / National security / Data security / Information security / Security engineering / Vulnerability / Trusted computing base / Common Criteria / Managed security service / Security / Computer security / Public safety


July 2002 By Ed Gerck, Ph.D. IT Security Consultant IT Security: Closing the
Add to Reading List

Document Date: 2002-08-16 21:45:08


Open Document

File Size: 167,57 KB

Share Result on Facebook

Company

Forrester Research / NCR / /

Currency

STD / GBP / /

IndustryTerm

retail store automation / security products / secure systems / security systems / law enforcement / server systems / user device / target systems / configuration management / particular solution / Internet hosts / security solution / insecure operating systems / security solutions / /

Organization

Department of Defense Trusted Computer System Evaluation Criteria / Department of Defense / U.K. Department / /

Person

Ed Gerck / /

Position

administrator and auditor / Consultant IT Security / Governor / /

Technology

Which technologies / operating systems / firewall / Information Technology / PKI / /

URL

www.forrester.com / www.security-survey.gov.uk / /

SocialTag