Finding Answers

Neither print nor online gives readers enough options to answer their ain specific questions, but In Depth, past integrating both tightly, is designed to requite readers the best from each medium.

Much as I beloved the Web, it has its weaknesses. It'south difficult to take on airplanes, for example, and reading anything actually long can brand your eyes cross.

Print, on the other hand, is portable and easy on the eyes merely isn't so great if you need to dig for more than detail or find answers to specific questions a story raises in your mind.

That's why we're combining the two, in this first edition of our monthly In Depth special report. Each In Depth will focus on a specialty area readers have identified as important to them.

In impress, yous'll detect stories probing various aspects of the topic, all tied to exclusive online stories that go into fifty-fifty greater depth, sidebars on related topics, enquiry, and customs activities designed to enhance the value of the information you lot become from Computerworld in print and online.

All of that, plus other related Computerworld content, volition live at our enhanced In Depth sites at Computerworld.com, continually updated with news, opinions and new research links to help you continue up to date and focus your enquiry on topics of interest to you.

And then you go the portability of print, the resources of the Web and input from your peers in Computerworld communities, served up in ways designed to be convenient. Let united states know how information technology works for you.

Kevin Fogarty is Computerworld's features editor. Contact him at kevin_fogarty@computerworld. com.

Security Risk and Reward

Stories in this report:

  • Want to Save Some Money? Automate Countersign Resets
  • Knowldge Quest
  • Companies Need Security Pros With More than Varied Skills
  • Finding Answers
  • The Enemy Within
  • The Threat of XML
  • Lather, Other Protocols Specify Security for XML
  • The Trouble With Power
  • Top 10 Security Mistakes
  • Playing By Europe'southward Rules
  • Imitation Alert?
  • An Ounce of Intrusion Prevention
  • Deadly Pursuit
  • IDS Products and Prices
  • Should Y'all Outsource IDS?
  • Who He Is
  • Manager Offers Primer On Computer Forensics
  • Unlocking Secure Online Commerce
  • Too Belatedly For Digital Certificates?
  • Giving Users Back Their Privacy
  • Feeling Safe With IT Security Deals
  • Finjan's Software Bolcks Agile Content Threat
  • Security Statistics
  • The Guardian
  • Congress Considers Slew of Bills That Will Affect IT, E-Commerce
  • U.S. Legislators Ponder Masses of Bills; Outlook Remains Murky
  • Rule Changes May Further Protect Company Security Data
  • Getting Started in Estimator Forensics
  • PKI Carries the Mail for U.Due south. Postal Service
  • Security by Syntax

Copyright © 2001 IDG Communications, Inc.