Information Security Bank of Montreal / Addison-Wesley Pub Comp. / Motorola / Bank of Montreal / Motorola Internet / Security Association Management / /
Country
France / / /
Event
Product Issues / /
Facility
University of Belgrade / /
IndustryTerm
adequate security solution / software development process / local area network / application server / software security methodologies / software development processes / architectural solution / security solution / typical solution / enterprise applications / software developers / e - business / biometrics authentication systems / software development / software development methodologies / everyday software development practice / speech recognition algorithm / typical security solution / internet applications / perimeter solution / enterprise software application / software architects / software applications / internet era / secure computer systems / Internet Workstation Firewall Server / e - commerce / software development theory / speech recognition device / data / pre-internet time / intranet infrastructure / cases technology / software architectures / antipattern solution / software architecture / encryption algorithm / security product / secure software / security solutions / /
NaturalFeature
Strait of Messina / /
Organization
U. S. Air Force Electronic Systems Division / University of Belgrade / IEEE Computer Society / /
Person
Eamonn Guiney / Vivek Khindria / Marla Nystrom-Smith / Michael Jackson / John Wordsworth / Milena Jelich / Martin Green / Alejandra Garrido / Addison Wesley / Dieter Gollmann / Carl von Clausewitz / Daryl Kulak / Daniel Jones / Erin Lavkulich / Miroslav Kis / Charles P. Pfleeger / John Wiley / /
Position
architect / text editor / Acknowledgements The author / software architect / Private Network protocol / guard network connections The solution / manager of the Strategy and Technology group / engineer / senior advisor / /
Product
beliefs While technology / belief / perimeter protection model / beliefs / beliefs In essence / /