E-mail this definition to a colleague
Secure IM Management
Experience comprehensive IM management and security. Prevent IM worms and viruses. InfoWorld 2005 Technology of the Year Award Winner. Free trial.
All ID Systems: Key Cards
Low price guarantee on top brands. Free shipping. Find the right ID system at the right price. Emergency service and product training.
Symantec: Virus Security and Removal
Stop Zotob Virus now. Visit Symantec for updated information and resources.
Cryptography for encryption, digital signatures and authentication
Contains links to information on cryptography, a tutorial on public key encryption for secrecy and a discussion of the debate regarding government control of cryptography.
NIST computer security resource clearinghouse
National Institute of Standards and Technology's computer security resource clearinghouse. It contains information on numerous security topics, as well as alerts about viruses and other security threats.
This site explains how PGP software works through the use of a public and private key pairs.
Public-key cryptology FAQ
USENET FAQ that focuses on public-key cryptology.
VeriSign: SSL Certificates
Protect your site with the strongest security possible and it will help increase customers' trust in your e-business. Learn more about VeriSign SSL.
Digi-Key: Digi-Key Enclosures
Broad-line distributor web site features real-time stock status and pricing, online ordering, RFQ, technical support, product datasheets and photos.
Zebra Printers: Key Card Printing
Secure your business with Zebra's innovative and reliable card printers. Access control and ID card printing solutions.
Maglocks: Access Control System
Offers access control systems with digital keypads and electronic locks. Includes integrated key card systems.
KnowledgeStorm: Public Key Infrastructure (PKI) Services
Business technology search site offering software, service, reseller and hardware information on thousands of IT solutions.