By Topic

IT Professional

Issue 3 • Date May-June 2002

Filter Results

Displaying Results 1 - 14 of 14
  • Programming on the linux side [Book Review]

    Publication Year: 2002, Page(s): 56
    Request permission for commercial reuse | PDF file iconPDF (280 KB) | HTML iconHTML
    Freely Available from IEEE
  • Comprehensive take on linux [Book Review]

    Publication Year: 2002, Page(s): 56
    Request permission for commercial reuse | PDF file iconPDF (280 KB) | HTML iconHTML
    Freely Available from IEEE
  • Secure linux [Book Review]

    Publication Year: 2002, Page(s): 57
    Request permission for commercial reuse | PDF file iconPDF (259 KB) | HTML iconHTML
    Freely Available from IEEE
  • Buying into beep [Book Review]

    Publication Year: 2002, Page(s): 58
    Request permission for commercial reuse | PDF file iconPDF (315 KB) | HTML iconHTML
    Freely Available from IEEE
  • Managing systems the unix way [Book Review]

    Publication Year: 2002, Page(s): 58
    Request permission for commercial reuse | PDF file iconPDF (315 KB) | HTML iconHTML
    Freely Available from IEEE
  • Bill Kelvie: Making technology work for the mortgage business

    Publication Year: 2002, Page(s):64 - 63
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (517 KB) | HTML iconHTML

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Extreme programming, it's worth a look

    Publication Year: 2002, Page(s):48 - 50
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (544 KB) | HTML iconHTML

    Extreme programming (XP) has been making waves among application developers for good reason. Its 12 core processes emphasize the small and simple, which translates to fast, efficient code generation. XP is deliberately lightweight, dispensing with lengthy use-case specifications, requirements definitions, and extensive documentation. As such, it is not, nor was it designed to be, a full life cycle... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Java distributed object models: an alternative to Corba?

    Publication Year: 2002, Page(s):41 - 47
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (540 KB) | HTML iconHTML

    Remote method invocation and RMI over IIOP relieve developers of many Corba complexities. Companies looking for a simpler way to achieve interoperability should strongly consider these models View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Challenges to automated attack traceback

    Publication Year: 2002, Page(s):12 - 18
    Cited by:  Papers (3)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (587 KB) | HTML iconHTML

    Ideally, a traceback system would identify the human responsible for the attack. In this discussion, however, we limit traceback to determining the computer host that is the source of an attack. Once a traceback system identifies an attacker host, investigators can apply traditional methods of crime investigation or intelligence gathering to assign responsibility to an individual. To analyze the t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • What companies are(n't) doing about Web site assurance

    Publication Year: 2002, Page(s):33 - 40
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (415 KB) | HTML iconHTML

    Research has linked consumers' willingness to buy from e-commerce Web sites with assurance seals, but so far companies seem lukewarm about having third parties provide them View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Opening eyes: building company-wide IT security awareness

    Publication Year: 2002, Page(s):52 - 54
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (300 KB) | HTML iconHTML

    Managing IT system security is a never-ending effort. Regardless of how well you secure a system today, new threats and issues will appear tomorrow. User support, IT staff enthusiasm, and management buy-in are critical assets for overcoming the constant barrage of threats. Unfortunately, there is no standard playbook that tells IT managers how to manage these relationships and focus them on securi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Ensuring business continuity

    Publication Year: 2002, Page(s):19 - 25
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (321 KB) | HTML iconHTML

    Last year's terrorist attacks in the US have forced many organizations to critically reevaluate the adequacy of their existing business continuity plans and disaster recovery arrangements. The tragedy highlighted how important it is for organizations to remain commercially operational under even the most exceptional circumstances. E-business, which relies heavily on IT, is particularly vulnerable,... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Addressing new security and privacy challenges

    Publication Year: 2002, Page(s):10 - 11
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (373 KB)

    Now that Y2K is behind us, IT professionals have been tempted to rest on their laurels particularly because the economic recession has significantly slowed spending on IT equipment and services. However, the tragic events of 11 September and a series of serious worms and denial-of-service attacks should serve as an urgent wake-up call that society is indeed vulnerable to threats against critical i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Technology in the mortgage industry: the Fannie Mae experience

    Publication Year: 2002, Page(s):27 - 32
    Cited by:  Patents (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (654 KB) | HTML iconHTML

    Just over a decade ago, the mortgage industry found itself at a crossroads. The power of information technology was clearly visible; however, the industry still found itself burdened with a tremendously inefficient, paper-intensive workflow that added time and cost to the entire mortgage process. This fact, coupled with declining US home ownership rates, was a call to arms for Fannie Mae, an indus... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

IT has emerged as an exciting, robust field unto itself, drawing on applications, data engineering, algorithms, system software, computer systems organization, and other contemporary computer technologies as applied to business problems.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
San Murugesan
BRITE Professional Services