8 research outputs found

    Secure use of the Internet by business

    Get PDF
    This study focuses on electronic data security issues and their applicability to SMEs.Prior to this project, no frame of reference had been identified or defined for:• The electronic data and Internet security needs of SMEs• The critical success factors for implementing and using a secureelectronic data and authentication solutionUsing a source of both primary and secondary research data, firstly, a trusted thirdparty infrastructure based on public key encryption and digital certificate technologywas designed and developed. This provided trust, integrity, confidentiality and nonrepudiation,all of which are essential components for secure static storage or Internettransmission of electronic data.The second stage was the implementation of this infrastructure in SMEs. The casestudies revealed a reluctance to implement and use the designed infrastructure bothduring and after the pilot implementation period. Further primary research wasundertaken to identify and explain the reluctance of SMEs to participate in pilotingthis Internet based technology.As a result of this research project, there are four major contributions to knowledge.These are,• A time series survey of SME Internet usage and attitudes in the GreaterManchester region. The initial stage of the research found that at the start ofthis project (1996/7), only one in three SMEs were using the Internet and thestage of usage was extremely basic (chapter 5.2.1). Towards the end of theproject (1998/9), Internet usage by SMEs had doubled and had become moresophisticated (chapter 7.2). Awareness of security needs had also risen, butwas still not a part of the overall network infrastructure of the majority ofsmall and medium sized organisations.• A framework for the analysis of the potential success or failure of theimplementation of a security solution in particular and new technology projectmore generally (chapter 9).• A framework that can act as broad guide for SMEs in the development of theirsecurity network infrastructures.• The use of organic methodology (chapter 3.3) to deal with the fast movingand changing environment of IT related research projects.A "Best Practice" guide has been developed based on these two models to help SMEsin the implementation of a data security solution in their own organisations.As well as raised awareness of the issues, the success factors also include reengineeringexisting business processes, changing traditional business thinking andcreating a level of commitment to the implementation of technology that will enableSMEs to thrive in the new markets of the 21st century

    Junos OS Security Configuration Guide

    Get PDF
    This preface provides the following guidelines for using the Junos OS Security Configuration Guide: • J Series and SRX Series Documentation and Release Notes on page xli • Objectives on page xlii • Audience on page xlii • Supported Routing Platforms on page xlii • Document Conventions on page xlii • Documentation Feedback on page xliv • Requesting Technical Support on page xliv Juniper Networks supports a technical book program to publish books by Juniper Networks engineers and subject matter experts with book publishers around the world. These books go beyond the technical documentation to explore the nuances of network architecture, deployment, and administration using the Junos operating system (Junos OS) and Juniper Networks devices. In addition, the Juniper Networks Technical Library, published in conjunction with O'Reilly Media, explores improving network security, reliability, and availability using Junos OS configuration techniques. All the books are for sale at technical bookstores and book outlets around the world. The current list can be viewed at http://www.juniper.net/books .Junos OS for SRX Series Services Gateways integrates the world-class network security and routing capabilities of Juniper Networks. Junos OS includes a wide range of packet-based filtering, class-of-service (CoS) classifiers, and traffic-shaping features as well as a rich, extensive set of flow-based security features including policies, screens, network address translation (NAT), and other flow-based services. Traffic that enters and exits services gateway is processed according to features you configure, such as packet filters, security policies, and screens. For example, the software can determine: • Whether the packet is allowed into the device • Which firewall screens to apply to the packet • The route the packet takes to reach its destination • Which CoS to apply to the packet, if any • Whether to apply NAT to translate the packet’s IP address • Whether the packet requires an Application Layer Gateway (ALG

    The Invention of I.F. Stone: the early life and career of I.F. Stone 1907-1953.

    Get PDF
    When I.F. Stone died in June 1989 the Daily Telegraph described him as "the most notable radical publicist of his time" the Guardian called I.F. Stone's Weekly "essential reading for two generations of opinion makers" the Independent eulogized "the most famous crusading journalist in the United States." Stone's death made the front page of the New York Times and the Washington Post. It was also on all three U.S. network news broadcasts. Yet today I.F. Stone is practically a forgotten figure, a relic of the 1960s like sit-ins or manual typewriters. Even those who do remember Stone's enormous influence in the Washington Post's words "felt, though not welcomed, at the highest levels of government" know him only through the Weekly, his one-man newspaper whose 70,000 subscribers included Albert Einstein, Bertrand Russell, Marilyn Monroe, and J. Edgar Hoover. The Invention of I.F. Stone is partly, then, a work of historical recovery. But it is also a study in post-Cold War history, and in the historiography of the American Left. By restricting myself to the period before the Weekly my aim is to show the personal, cultural, and historical roots of Stone's achievement. Like Upton Sinclair, Ida Tarbell, or Lincoln Steffens, I.F. Stone was a muckraker who wrote to change the world. Drawing on the work of scholars such as Michael Denning, Maurice Isserman, and Ellen Schrecker as well as my own extensive research on Stone's writings (published and unpublished), and over a hundred interviews with family members, colleagues, friends and opponents, plus the over 6000 pages released to me by the Federal Bureau of Investigation under the Freedom of Information Act I will show that just as Walter Lippmann came to personify the American establishment, so I.F. Stone became not just a symbol but an embodiment of dissent

    A Holmes and Doyle Bibliography, Volume 9: All Formats—Combined Alphabetical Listing

    Get PDF
    This bibliography is a work in progress. It attempts to update Ronald B. De Waal’s comprehensive bibliography, The Universal Sherlock Holmes, but does not claim to be exhaustive in content. New works are continually discovered and added to this bibliography. Readers and researchers are invited to suggest additional content. This volume contains all listings in all formats, arranged alphabetically by author or main entry. In other words, it combines the listings from Volume 1 (Monograph and Serial Titles), Volume 3 (Periodical Articles), and Volume 7 (Audio/Visual Materials) into a comprehensive bibliography. (There may be additional materials included in this list, e.g. duplicate items and items not yet fully edited.) As in the other volumes, coverage of this material begins around 1994, the final year covered by De Waal's bibliography, but may not yet be totally up-to-date (given the ongoing nature of this bibliography). It is hoped that other titles will be added at a later date. At present, this bibliography includes 12,594 items
    corecore