ebook img

Security Letter 2012: Vol 42 Index & Table of Contents PDF

2012·0.56 MB·English
by  
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Security Letter 2012: Vol 42 Index & Table of Contents

SECURITY LETTER Name and Organization Index—2012, Vol. XLII A Dauer, Edward Korn/Ferry PSOEAA AACRAO De Waard, Jaap Kozlowski, L. Dennis AccuStaff Dutch Ministry of Security Kroll, Jules B. Q Adelson, Sheldon Kubasik, Christopher QTC ADT E Kuty, Gary H. Quest Diagnostics AE Centurion EEOC Affordable Care Act England L R AIG EPA Lanier Techn. College Regent Security Services Aisin Seiki Last-Pass Rescue Reel Alotaibi, Sara F LifeLock Resilience Amaxx Risk Solutions FAA LIP&L Restrepo, Tanya American Comm. Security Facebook Louis Pepper Hamilton Rickmers Holdings Andrews Inti. FingerID Love, Yeardly Roberts, John Anonymous (hacker group) Firepro Systems Luehmann, Ludolf Apax Partners FJC Security Services LulzSec S Apple Stores Flint, Jeff Solutions Apps FPS M Sandia Natl. Labs. ARAMARK France Maersk Sands Corp. Now” Aramco Freedonia Group Magestro, Brandon Sandusky, Jerry @é — Argenbright, Frank Freeh Sporkin & Sullivan Marino, Thomas Sans Institute Australia Freeh, Louis Martin, Stan NWASAau di Arabia ia) _ AuthenTec Freight Watch Intl. Matlin, Joe Scalia, Antonin Avigilon Friedenberg, Michael McAfee, John Schneider, Charles Fujitsu WOAUOMNU MWcGaUnn, NJefAfreyO NNN _— Securitas B MF Global SentrySafe Bank PBH G Mica, John L. N Seton -—aa Barani, Louis G4S Middle East Shafer, Rebecca _ Barclays GACA Milne, Doug Shanghai B&A Property Mgmt. Barco’s Parking Lot Garcia, Miguel Mitnick, Kevin Sherwood, Darlene BBA Garda World Security Mitsubishi Shuford, Harry Blackstone —OSU>NN F]ON nW NI CGUeiAthDnWeNr, TOim N Morpho Detection NSNO ONm We S IAC Blackwater Worldwide 8 Goldman Sachs oeoe . Soghoian, Christopher Blueinfy 8 GPS Tracking N Sohgo Security Svcs. Boards of Elections 9 Greece Nagoya Univ. Somalia Braun, Paul 12 Gursahaney, Naren —N NWNNAUSWCOI AANA~ Sony OAWNN RMWUONUNAINWNHU! Brent, Josh 12 Natl. Retail Fed. South Korea Brink’s 12 H NCCI South TX Techn. Mgmt. Brockharde, Werner 5 HanitaTek Window Films NetWitness Spanier, Graham B. Buckles, Nick 9 Hitachi Kokusai Electric NIST Specialty Contingency Risks Burges, Don 3 Holland (the Netherlands) Northrop Grumman Spiegel, Henry Holmes, James E. Nosal, David SplashData Cc Home Depot NPPD Splunk Caceres, Joe HTMLS5 NTT CocoMo fDROt KON W NSWquMarNe Inc. Campbell, Timothy D. Huawei Techn. Steibing, Gay Canada Hurricane Sandy O Streff Security Catalogue O’ Hara, Ray Support Services Group CEC Entertainment I Oikos University 123D Imaging Cescolini, Brian 1C3 Olympic Games Symantec CFAA ICS-CERT Chanel IGTC-Chubb P T Chess.net _—ON s)O NTHFI CPorNp. NUA Palo Alto Network T&M Protective Resources China Ingersoll-Rand 1 Panetta, Leon Tianjin Airlines Cho, Seung-Hui ww Integrated Security Surveillance Passwords TSA 2,3,4,12 Cisco Systems IrisScan Paterno, Joe Tyco Comm. Fire Com-Score os ISS Peltz, Nelson Tyco Flow Control Cook, Peter Issa, Darrel YNNO—rSIP AeUnnN USYta te University Tyco Intl. Copyright Alert Sys. Pepper Hamilton 3D Imaging —_ Corizine, John J Per Mar Security Svcs. Costa Concordia Japan — ww Peratech U Crétier, Stéphan JetBlue an Petraeus, David UBS 9 Cyber Storm John Jay College/CUNY 9 Pistole, John S. Universal Prot. Service 5,9 Cyberwarfare — Jones, Lee 3,12 Poland Universal Services of America 2 Czech Airlines WODAOCONKNUNAS~)] PreCheck USSA 2 K Protect D Knox, John Protection 1 Vv DARPA Komogortsev, Oleg Protection Plus Sec. Corp. Visionary Integration Prof. Vivint SUBJECT INDEX I Virus IDs Voting ID Ww A Imaging technology Wal-Mart Airline/Airport Insurance Ww West Nile virus Alarm monitoring Internet security Whistleblower Widdows, Ron Armored carrier Investigative firms WikiLeaks 12 Wilson, James Q. ATM IPhones Window protection 4 World Petroleum Congress IT security Workplace-issues 5,7,11,12 B -violence 3,9 Y,Z Bank/financial 15,9,5 0 K Yelle, Dennis Bee stings 6 Kidnapping Zynga Biometrics Bomb threat L Bullying Legal BOOKS Business spending Liability Design Against Crime—Crime c M Proofing Everyday Products 5 Calendar Cont. Ed. 2,8 Management Eyes Everywhere—The Global Campus/school 4,6,10,11 Marketing Growth of Camera Surveillance 3 Campus security compensation 4 Medical implant Ghosts in the Wires: My Car locks 8 Mobile checkout Adventure as the... Most Wanted Card scamming 1,7 Museum Hacker | Career planning 6 MV incidents Handbook on Securing Cyber- Cargo-security-theft 3 Physical Critical Infrastructure 6 CCTV 2,7 Oo High Tide on Main Street 11 Cellephone protection Ocular biometric Identity Thieves—Motives and Child safety Methods 10 Cloud computing P Liars & Outliers—Enabling the Computer security Passwords Trust that Society Needs to Contingency plans Personal safety Thrive 4 Contracts Physical security Pirates of Somalia—Inside Their Copyright privacy Privacy issues Hidden World 2 Counterfeiting Privatization This Machine Kills Secrets 12 Credit cards fraud Public places safety Too Big to Fall—America’s Criminal background Purchase online Failing Infrastructure: The Way Cyber-security Forward. 8 R Truth Machine, The—A Social D Retail-security History of the Lie Detector 9 Drug Rogue employee We Are Anonymous—Inside the Disaster/shipping Rogue trader Hacker World of LulzSec & Drones Anonymous S E Screening E-mail protection Security-action 2,7,8 FILMS Emergency planning -financing 7,8,9 Employee dishonesty -ind. earnings 3 Compliance Executive-compensation -mergers 2,5,7,9,12 -protection Security breach 8 RESOURCES Extortions Security industry opportunity 8 Security profiling 5 BRB’s Guide to County Court F Security technology 5,8 Records FAA Servant mgmt. Hurricane Sandy Response FBI Sexual assault The Safe Hiring Manual False alarms Sleep disorder Financial losses Smartphone Fingerprints Supermarket techn. RESEARCH REPORT Financial rogues Surveillance Fraud ASIS Intl. 2012 Salary Survey T ASIS Intl. Seminar G Tax breaks Campus Security Survey Gas pipeline TSA 2,4,12 Contract Security Services GPS tracking Text messaging 3 Executive Compensation Guard industry Transport. security 1,4,6,7,12 1C3 Complaints Travel safety 3 Largest Security Guard Cos. H TV monitoring 8 Private Security Services Hackers Security Guard Comp. Healthcare reform Vv US Security Product Market Hiring ex-con Vetting World Disaster Report 2012 Hurricane Virtual asset

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.