Information Protection - Management & Rules
By Sanford Sherizen,
It would be very easy to write yet another article about technical computer and communications security issues, such as a discussion of PKI, TCP/IP, SSL, RSA, firewalls, mobile code, etc. Yet, there is another perspective on these security issues that has become increasingly important to stress. That is why this article will be concerned with the ways by which senior executives can and must assist in the protection of information in the Information Age.
Click here for full article
|
|

|
Stealing Intellectual Property
By Simon Janes,
International Operations Manager, Computer Forensics, Ibas Group
Information Communication Technology is a term that not many people would have been familiar with 20 years ago.
Click here for full article
|
|

|