Computer Security in the United States
Computer Software Security Resources
See Also
Computer Hardware Security
Computer Virus
Cyber Security
Computer hackers; Computer hardware security; Computer forensics; Computer security and computer crime investigation; Computer virus; Document destruction.
Further Reading (Articles)
Computer Software Security, The Gale Encyclopedia of Science; January 1, 2008
Stanford Business School Study Finds Strategies for Getting Users to Adopt Computer Software Security Patches., AScribe Business & Economics News Service; December 13, 2005
USPTO Issues Trademark AUTHENTINET to First Ondemand for Computer Software, Security Services, US Fed News Service, Including US State News; January 9, 2010
COMPUTER SOFTWARE SECURITY FLAWS COULD AFFECT MILLIONS, The Columbian (Vancouver, WA); August 1, 1999; TIM KLASS, Associated Press
Early Computer/Software-Based Security.(Feature), Security Dealer & Integrator; June 1, 2008
California Inventor Develops Computer Software Application Security System, US Fed News Service, Including US State News; September 7, 2007
USPTO Issues Trademark COLLABORATION FRAMEWORK to PlaSec for Computer Software, Hardware for Security Information Management, Instructional Manuals, US Fed News Service, Including US State News; August 18, 2009
Battening the patches; Shavlik Technologies of Roseville has built a niche as one of the nation’s leading testers and managers of computer security software for corporate clients.(BUSINESS INSIDER), Star Tribune (Minneapolis, MN); February 16, 2009; Alexander, Steve
Microsoft Releases Free Computer Security Software, Manila Bulletin; September 30, 2009
A Columbo for Your Computer; Security Software Uses Internet, E-Mail to Track Down a Vanished Laptop, The Washington Post; June 5, 2002
USPTO Issues Trademark STOPSIGN to eAcceleration for Computer Security Software & Computer Services, US Fed News Service, Including US State News; October 6, 2009
Computer security software. (Marketplace)., Security Management; February 1, 2002
Computer security: software patches more vulnerable to hackers.(businessBRIEFS), Financial Executive; March 1, 2005; Marshall, Jeffrey Heffes, Ellen M.
US Patent Issued to Trend Micro on June 24 for “Methods and System for Determining Licensing/billing Fees for Computer Security Software” (Canadian Inventor), US Fed News Service, Including US State News; June 24, 2014
Contract Notice: Air Force Materiel Command Seeks Computer Security Software (California), US Fed News Service, Including US State News; August 4, 2010
Contract Notice: Virginia Local Government and Public Bodies Issues Request for Proposals for Computer Security Software Upgrade, US Fed News Service, Including US State News; October 8, 2011
US Patent Issued to First Trust Portfolios on Jan. 1 for “Methods and Computer Software Applications for Selecting Securities for an Investment Portfolio” (Illinois Inventors), US Fed News Service, Including US State News; January 7, 2013
US Patent Issued to First Trust Portfolios on July 26 for “Methods and Computer Software Applications for Selecting Securities for an Investment Portfolio” (Illinois Inventors), US Fed News Service, Including US State News; July 27, 2011
United Kingdom Intellectual Property Office Publishes Application for Series of Two Trademark AssetMonitorAIS, AssetMonitorAIS to Infoterra for Computer Software, Technological Services, Security Services, US Fed News Service, Including US State News; January 23, 2010
California Computer Security Software Maker Symantec Reports Soaring Profit., Knight Ridder/Tribune Business News; April 29, 2004
Computer Hardware Security Resources
See Also
Computer Keystroke Recorder
Cyber Security
Computer hackers; Computer keystroke recorder; Computer software security.
Further Reading (Articles)
Computer Hardware Security, The Gale Encyclopedia of Science; January 1, 2008
Patent Issued for Laptop Computer with Hardware Security Protection, Computer Weekly News; August 30, 2012
USPTO Issues Trademark COLLABORATION FRAMEWORK to PlaSec for Computer Software, Hardware for Security Information Management, Instructional Manuals, US Fed News Service, Including US State News; August 18, 2009
US Patent Issued to Microsoft on Sept. 27 for “Systems and Methods for Updating a Secure Boot Process on a Computer with a Hardware Security Module” (Washington Inventors), US Fed News Service, Including US State News; October 3, 2011
CSIS Calls For End Of Outdated Export Controls For Computer Hardware.(Center for Security and International Studies)(Brief Article), Defense Daily; June 12, 2001
CSIS Calls For End Of Outdated Export Controls For Computer Hardware.(Center for Security and International Studies (CSIS)(Brief Article), Defense Daily International; June 15, 2001
Computer security hardware. (Marketplace).(SpearHead Security Technologies)(Brief Article)(Product Announcement), Security Management; November 1, 2001
Hardware-based computer security techniques to defeat hackers; from biometrics to quantum cryptography.(Brief article)(Book review), SciTech Book News; March 1, 2009
Integrity of hardware-based computer security is challenged; Withdrawn Black Hat paper hints at flaws in TPM security architecture.(Black Hat USA 2007, trusted platform module), Network World; June 27, 2007; Greene, Tim
Enova unveils new hardware-based computer storage security solutions., Worldwide Computer Products News; April 23, 2009
USPTO Issues Trademark SATEON to Newmark Security for Computer Hardware, Software for Use in Recording, Managing Employee Time, Attendance Data, US Fed News Service, Including US State News; October 28, 2009
Washington University in St. Louis Science and Technology Tips: Dinosaurs, Credit Card Security, Computer Hardware, Vitamin-Packed Plants., Ascribe Higher Education News Service; October 3, 2002
Security First.(military computer hardware and software management), NextGov.com; June 8, 2009; Paller, Alan
Olympic Games security provided by sophisticated computer hardware, software., Software Industry Report; February 21, 1994
United Kingdom Intellectual Property Office Publishes Application for Series of Two Trademarks “SSG Sunwin Services Group, SSG Sunwin Services Group” to Co-operative Group for Computer Hardware Installation, Maintenance, Repair, Transport, Security Services, US Fed News Service, Including US State News; April 20, 2010
USPTO Issues Trademark CE RISK, SAFETY & SECURITY to Cleanevent Technology for Computer Hardware, Security Services, US Fed News Service, Including US State News; December 11, 2009
USPTO Issues Trademark GATEMASTER to U.S. Security Associates Holdings for Computer Hardware, Software, US Fed News Service, Including US State News; December 14, 2009
Security Vulnerability Analysis.(Computer Hardware & Software)(SVA-Pro software)(Brief Article), Plastics Engineering; February 1, 2004; Molinaro, Hope
Contract Notice: Department of Homeland Security (District Of Columbia) Issues Solicitation for Computer Hardware, US Fed News Service, Including US State News; September 27, 2011
Patent Issued for Method, Hardware Product, and Computer Program Product for Optimizing Security in the Context of Credential Transformation Services, Journal of Engineering; October 31, 2012
Computer Keystroke Recorder Resources
See Also
Computer hackers; Computer hardware security; Computer software security.
Classified Information
Computer Hardware Security
Further Reading (Articles)
Computer Keystroke Recorder, The Gale Encyclopedia of Science; January 1, 2008
Locate lost text with Last Resort. (Working Software Inc.’s keystroke recorder utility program) (S
oftware Review) (Reviews: PC) (Evaluation), Computer Shopper; August 1, 1992; Cohen, Andrew
Dad deciphers son’s secret with keystroke recording, Deseret News (Salt Lake City); July 23, 2009; Jeanne Phillips
Let Keyboard Express drive your keystroke shortcuts. (Insight Software Solutions) (Software Review)(Brief Article)(Evaluation), Computer Shopper; December 1, 1996; Scott, Jeffrey
Spies in your computer, International Herald Tribune; February 19, 2004
Computer Software Security, The Gale Encyclopedia of Science; January 1, 2008
Try before you buy; great software on the honor system. (evaluation of eight shareware programs)(Computer Shopper Buying Guide) (Software Review)(Evaluation), Computer Shopper; November 1, 1995; Gralla, Preston
ASK THE COMPUTER GUY, The Washington Post; September 22, 2002
Dear Abby: ; Dad learns distressing news by spying on son’s computer, Charleston Daily Mail; July 23, 2009; Jeanne Phillips
Robo-recorder?(tips about computer automation)(Brief Article), Computer Shopper; September 1, 2005; Poor, Alfred
Computer Column., Knight Ridder/Tribune Business News; May 7, 2003
Recorder’s office limits public access to online data., The Blade (Toledo, OH); April 14, 2006
Worker or shirker?, The Record (Bergen County, NJ); August 31, 2006; MARTHA McKAY, STAFF WRITER
The Sun, Port Charlotte, Fla., Robert Bowden Column., Knight Ridder/Tribune Business News; July 23, 2003
The big question.(Verve), The Star (South Africa); May 9, 2007
Who watches you at work?(CAREER), New Zealand Herald (Auckland, New Zealand); February 28, 2007
IS IT HEALTHY TO BE STEALTHY? USING SOFTWARE TO SPY, The Boston Globe (Boston, MA); April 9, 2001; Joyce Crane, Globe Correspondent
Swiss Cast Votes Online in Referendum, AP Online; September 28, 2004; JONATHAN FOWLER, Associated Press Writer
In more perilous online world, simple passwords no longer suffice, AP Worldstream; June 1, 2004; ANICK JESDANUN, AP Internet Writer
P^ssw0rds+: Perilous online world requires new breed of user identification, The Columbian (Vancouver, WA); June 7, 2004; ANICK JESDANUN, Associated Press writer
Leave a Reply