Abstracts - faqs.org

Abstracts

Electronics and electrical industries

Search abstracts:
Abstracts » Electronics and electrical industries

The "big six" elements of good security software

Article Abstract:

Purchasing the right computer security software can be relatively easy. Purchasers must simply choose software that has six key attributes: real security, ease of use, necessary features, reliability, compatibility and responsive customer service. Purchases should select software that offers an adequate level of protection but minimizes the burden placed on system users.

Author: Born, Richard
Publisher: Penton Business Media, Inc.
Publication Name: Defense & Security Electronics
Subject: Electronics and electrical industries
ISSN: 1084-2829
Year: 1995
Prepackaged software, Software Publishers, Systems Utilities Software Pkgs, Purchasing, Software, Computers, Safety and security measures, Digital computers, Desktop utilities

User Contributions:

Comment about this article or add new information about this topic:

CAPTCHA


View screen on Mr. Spock

Article Abstract:

Some video imaging and display technologies have matched or even surpassed those imagined by science fiction writers. For example, large imaging screens such as those portrayed in 'Star Trek' now exist. Videoconferencing is expected to gain extensive use by 2000. Thermal imaging and night vision technologies have surpassed those envisioned by many writers.

Author: Lesser, Roger
Publisher: Penton Business Media, Inc.
Publication Name: Defense & Security Electronics
Subject: Electronics and electrical industries
ISSN: 1084-2829
Year: 1996
Computer peripheral equipment, not elsewhere classified, Other Computer Peripheral Equipment Manufacturing, Image Processing Equip, Electronic components, not elsewhere classified, Other Electronic Component Manufacturing, Display Devices, Editorial, Innovations, Display devices (Electronics), Image processing equipment, Information display systems, Imaging systems

User Contributions:

Comment about this article or add new information about this topic:

CAPTCHA


Similar abstracts:
  • Abstracts: Sony arms security sets with network functions, digital recorders. part 2 JVC builds security business on broadcasting technologies
  • Abstracts: Reading the NOPR's tea leaves for signs of revenue and risk. The lure of Latin America
  • Abstracts: The Internet: a threat to national security? Many options for implementing Fortezza is in the MISSI framework
  • Abstracts: Direct satellite TV takes off like a rocket. BI Technologies makes the most of a new name
This website is not affiliated with document authors or copyright owners. This page is provided for informational purposes only. Unintentional errors are possible.
Some parts © 2025 Advameg, Inc.