Skip to Main Content
Information Security: Contemporary Cases
book

Information Security: Contemporary Cases

by Marie A. Wright, John S. Kakalik
August 2010
Intermediate to advanced content levelIntermediate to advanced
214 pages
9h 49m
English
Jones & Bartlett Learning
Content preview from Information Security: Contemporary Cases
and Personal Systems.
9
When the team was first formed, their focus was on
offensive hacking and they became known as IBM’s “ethical hackers.”
8
Their
efforts now are geared more toward testing and defending against network
threats that exploit system vulnerabilities. (Appendix A summarizes these
network threats.) Described next are the results of the Watson GSAL’s col-
laborative efforts and groundbreaking research in the application of hard-
ware support to enable trust.
Embedded Security Subsystem Version 1.0
When the Watson GSAL and the Personal Systems business segment
began working together on a hardware-based means of user authentica-
tion, they initially ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Executive Guide to Information Security, The: Threats, Challenges, and Solutions

Executive Guide to Information Security, The: Threats, Challenges, and Solutions

Mark Egan
Breaking into Information Security

Breaking into Information Security

Josh More, Anthony J. Stieber, Chris Liu

Publisher Resources

ISBN: 9780763738198