Celebrating 30 Years of Microscope

Total Page:16

File Type:pdf, Size:1020Kb

Celebrating 30 Years of Microscope December 2012 MicroScope Indispensable channel analysis microscope.co.uk CELEBRATING 30 YEARS OF MICROSCOPE TO KICK OFF OUR ANNIVERSARY YEAR, WE INVITE INDUSTRY FIGURES TO SHARE THEIR THOUGHTS ON WHAT THEY CONSIDER TO BE THE MOST SIGNIFICANT DEVELOPMENTS IN THE CHANNEL OVER THE PAST THREE DECADES AND TAKE A LOOK AT THE MOST IMPORTANT TECHNOLOGICAL ADVANCES DURING THAT TIME IAN NIXON/ISTOCKPHOTO ◆ THE MONTH IN IT ◆ OPINION ◆ LEttERS ◆ FIVE-MINUTE INTERVIEW ◆ the month in the channel Cisco merges cloud and managed SMEs reluctant to boost staff services reseller programmes More Comet stores face closure numbers, research finds Cisco has merged its Cloud Provider SME budgets might be recovering, and Cloud Services Reseller roles as potential buyers weigh in but small and medium-sized busi- with its Managed Services Channel nesses remain cautious when it Programme to form a single Cloud Comet's administrators are preparing to close a further 125 shops over the comes to investing in fresh staff to and Managed Services Programme next few weeks unless a buyer emerges quickly. help drive the business forward. An (CMSP) in a nod to the extensive Deloitte, which was appointed administrator last month, has already cut insight from Spiceworks into the sec- synergies that exist between the two more than 1,000 jobs and closed 41 stores in a bid to reduce costs. tor, described by many as the engine areas. Richard Roberts, Cisco UK But no firm offers have emerged, despite reports of several potential room of the economy, shows that and Ireland partner organisation buyers, including business turnaround expert Clive Coombes and e-tail caution remains despite signs that lead, said the move was an acknowl- specialist DRL. things are improving. edgement of widespread industry The 125 shops would close in the next few weeks, leaving just 70 outlets acceptance that there is “no differ- trading, if the administrators are forced to take further cost-cutting action. HP lashes out at Autonomy ‘lies’ ence” between cloud services and Around 5,000 staff are left at Comet, 3,000 of whom could be out of work Hewlett-Packard has accused Au- managed services. before Christmas if the stores closures go ahead. tonomy – the UK software house The IT and electricals retailer fell into administration in early November after it bought in 2011 – of “serious ac- AVG exceeds reseller cloud its previous backers were unable to pull off a turnaround. counting improprieties, disclosure ambitions with 1,000+ partners failures and outright misrepresenta- AVG has signed up more resellers tions” after taking a multi-billion IRBY to its CloudCare service than it set K dollar write-down in its fiscal fourth out to as the channel looks for better IKE quarter. In a statement, HP claimed M ways to deliver security services. The Autonomy’s top brass were guilty of vendor launched its cloud platform a “wilful effort to mislead investors in June on an invitation-only basis and potential buyers, and severely before opening it up to more partners. impacted HP management’s ability to AVG had planned to finish the year fairly value Autonomy”. Autonomy with 300 partners selling CloudCare, founder Mike Lynch was quick to but it has already hit the 1,000 mark. reject the accusations. Europe is third quarter star for Cloud strategy paying off for C2000 parent Tech Data distributor ComputerLinks Computer 2000 parent Tech Data For the first time in several years reported a drop in sales and net ComputerLinks has chosen to share profit during its third quarter, but financial information about the state performed well in the troubled of its business. The distributor has European market. The distributor been in private hands for the past unveiled its latest set of results on 20 four years, with no obligation to November, booking sales of $6.04bn reveal numbers, but has opted to (£3.79bn), down 8% year-on-year, provide an update to indicate to the and net profit of $45.9m, down 14%. market and resellers how its transfor- Sales in Europe, which accounted for mation strategy is working. 61% of Tech Data’s worldwide busi- ness, were down 4%, but excluding SCC claims first healthcare reporting changes declined just 1%, cloud in Merseyside and on a Euro basis, grew by 5%. Integrator SCC has signed the UK’s first healthcare cloud deal to deliver Claranet buys Star to build secure datacentre services to Mersey £120m managed services provider Care NHS Trust through 2017. The Internet service provider turned firm has already ploughed £25m managed services specialist Claranet into developing its cloud services has acquired managed technology £17.3m Servo accounts fiddle offering, which will see Mersey Care services company Star for £55m, move its operational data and ICT with the intent of building a £120m found to date back to 2009 infrastructure to SCC’s Optimise- managed service provider in Europe. Cloud platform by May 2013. This Trading as Claranet, the new firm Integrator Phoenix IT Group has revealed that profits at its mid-market services will include the transfer of 15TB will employ more than 700 staff business Servo were deliberately manipulated over a lengthy period going back of data currently stored on 90 serving 4,500 customers. to 31 March 2009. in-house servers. The fraud, which came to light in early September, resulted in management Fujitsu targets top partners suspensions and a major internal investigation at Servo’s Leeds site. Softcat to add 40 technical with storage education drive Having completed their review of the firm’s books, auditor Pricewater- heads to support 2013 growth Fujitsu has launched a channel houseCoopers and commercial law specialist Nabarro said they found no Integrator Softcat has announced programme and user campaigns to evidence of cash theft, but discovered that the unit had indeed been overstat- plans to double the size of its techni- grow sales for its Eternus storage ing its profits. cal team to support its growth and technology. The promotional drive During the course of the investigation, it emerged that the figures involved development amid plans to meet and is designed to build on the success were substantially larger than the initial figure of £14m, rising to £17.3m after exceed this year’s turnover of £300m- of second quarter storage revenues tax, over a much longer period of time than at first thought. plus in 2013. Particularly in demand that trebled year-on-year in the face As a result of the fraud, Phoenix said it had dealt with Servo’s financial will be skills around storage and of overall declining revenues for the controller and divisional finance director, and announced plans to relocate virtualisation, networking, security sector. The Storage First programme the unit’s financial and accounting activities to a new centralised office and Microsoft, with both technical is designed to educate users about the in Northampton. support and consulting services roles primary importance of storage. up for grabs, the reseller said. Daily channel news at MicroScope.co.uk DECEMBER 2012 | 2 community SIMON QUICKE editor’s comment BILLY MACINNES COMMENT Long live the channel Making the connection t has been a long time since the first issue of between cloud and MicroScope rolled off the presses back in the winter of 1982. Much has changed in that time – IMicroScope has evolved from a fortnightly, then managed services weekly, print publication to a solely digital source of news and analysis about the channel, both through the website and the monthly digital ezine. Scanning can back through past issues highlights that the themes of the day when MicroScope started THINKSTOCK life in this industry were very much hardware-driven. / Back then, some of the companies which have now become household names were just starting out, and although IBM was there from the beginning, it ISTOCKPHOTO did not take long for Compaq and Dell to join it. Microsoft was still selling DOS and the software world seemed to be a fairly limited one. It was cer- tainly nowhere near as exciting as the Micro world, which enjoyed larger-than-life characters – Adam Osborne and Alan Sugar are two that spring to mind. It was also a world that was moving fairly quickly. The big PC shows in the UK served as platforms for product launches, and these launches seemed to dominate the news coverage. That might have changed slightly with the market now evolving into a cloud and services world, but there are plenty of fea- tures of the channel landscape that have remained remarkably similar. Firstly, those early issues covered distributors including Micro-P, Northamber and P&P. That level of the two-tier channel has become slicker, more vital in terms of logistics and credit, and shows no sign of t was interesting to note Cisco has future plans, if they can start to view fading into history. decided there is “no difference” it as a service in much the same way Likewise, the second feature of the market that Ibetween managed services and as any other managed service and remains largely unchanged is the way vendors con- cloud services by opting to merge comprehend that it can be delivered tinue to rely on the channel to get their products out its Managed Services Channel Pro- in the same way. to market and to make their technology successful. gramme and its Cloud Provider and It is not as if people haven’t been Back in the 1980s, when the market was just being Cloud Services Reseller roles. making the comparison between formed, it was key to have your distributors on board Richard Roberts, Cisco UK and Ire- managed services and cloud comput- and resellers lined up.
Recommended publications
  • A the Hacker
    A The Hacker Madame Curie once said “En science, nous devons nous int´eresser aux choses, non aux personnes [In science, we should be interested in things, not in people].” Things, however, have since changed, and today we have to be interested not just in the facts of computer security and crime, but in the people who perpetrate these acts. Hence this discussion of hackers. Over the centuries, the term “hacker” has referred to various activities. We are familiar with usages such as “a carpenter hacking wood with an ax” and “a butcher hacking meat with a cleaver,” but it seems that the modern, computer-related form of this term originated in the many pranks and practi- cal jokes perpetrated by students at MIT in the 1960s. As an example of the many meanings assigned to this term, see [Schneier 04] which, among much other information, explains why Galileo was a hacker but Aristotle wasn’t. A hack is a person lacking talent or ability, as in a “hack writer.” Hack as a verb is used in contexts such as “hack the media,” “hack your brain,” and “hack your reputation.” Recently, it has also come to mean either a kludge, or the opposite of a kludge, as in a clever or elegant solution to a difficult problem. A hack also means a simple but often inelegant solution or technique. The following tentative definitions are quoted from the jargon file ([jargon 04], edited by Eric S. Raymond): 1. A person who enjoys exploring the details of programmable systems and how to stretch their capabilities, as opposed to most users, who prefer to learn only the minimum necessary.
    [Show full text]
  • ADMINISTRATION GUIDE Version 7.2
    GUIDE STORMSHIELD ENDPOINT SECURITY ADMINISTRATION GUIDE Version 7.2 Document last update: June 2, 2021 Reference: ses-en-administration_guide-v7.2 SES - ADMINISTRATION GUIDE - V 7.2 Table of contents Preface 9 Thanks! 9 What is the target audience? 9 Contact 9 1. Use environment 10 1.1 Recommendations on security watch 10 1.2 Recommendations on keys and certificates 10 1.3 Recommendations on algorithms 10 1.4 Recommendations on administrators 10 1.5 Recommendations on workstations 10 1.6 Recommendations on administration workstations 11 1.7 Certification and qualification environment 11 2. Stormshield Endpoint Security Overview 12 2.1 Concepts 12 2.1.1 Concept 1: Integrated security 12 2.1.2 Concept 2: Proactive protection 12 2.1.3 Concept 3: Adaptive control 13 2.1.4 Concept 4: Flexible policy control 13 2.1.5 Concept 5: Application of policies based on the organization's directory 13 2.1.6 Concept 6: Information feedback 13 2.1.7 Concept 7: Data encryption 13 2.2 Protection mechanisms 13 2.2.1 Rule-based protection 14 2.2.2 Automatic protections 14 2.3 Architecture 15 2.3.1 Concepts 15 2.3.2 Stormshield Endpoint Security components 15 2.4 Packages and licenses 18 2.4.1 Packages 18 2.4.2 Licenses 21 3. Stormshield Endpoint Security Installation and Uninstallation 24 3.1 Downloading the Stormshield Endpoint Security software 24 3.1.1 Downloading from the client area 24 3.1.2 Checking software authenticity 24 3.2 System prerequisites for Stormshield Endpoint Security under Windows 25 3.2.1 Active Directory prerequisites 25 3.2.2 Stormshield
    [Show full text]
  • More Banks in Arkansas Form Captive Insurance Companies and Look to Arkansas As the Preferred Domicile
    More Banks in Arkansas Form Captive Insurance Companies and look to Arkansas as the Preferred Domicile by Josh Miller, CEO, KeyState Captive Management & Zach Stedman, Member, Mitchell, Williams, Selig, Gates Woodyard PLLC The Growth of Bank Captives companies” said CEO of Indiana Bankers Identifying and Addressing Your Association, Amber VanTil. “We have been There is no avoiding it. Cyber security and Bank’s Unfunded Risks discussing bank captives with other state reputation protection are among today’s It is important to recognize that the captive banking associations throughout the significant, emerging risks, thus creating structure does not typically replace a bank’s country and there’s been tremendous exposures for banks of all sizes. At the same primary commercial insurance program. interest.” time, commercial insurance carriers are However, it does allow a bank to more pushing banks to higher deductibles, so “Arkansas banks are increasingly looking to formally self-insure risks that are currently there remain significant gaps in coverage captive insurance companies as a tool for unfunded or that the bank has considered and exclusions in commercial insurance identifying and funding for risks that are retaining (i.e., increased deductible layers). policies. This creates unfunded risks, which not covered by their commercial insurance Typically, the captive augments commercial must be evaluated as a part of any bank’s program,” notes Lorrie Trogden, CEO of policies in the following ways: enterprise risk management process. the Arkansas Bankers Association. “We are Covers the bank’s commercial deduct- also very pleased that Arkansas Insurance To address the concerns, banks throughout ible layers, including specific deduct- Department Commissioner Allen Kerr has the country are forming captive insurance ibles for more catastrophic losses like developed a robust and business friendly companies to cover these unfunded risks.
    [Show full text]
  • Remarks at a White House Meeting with the American Retail Federation May 16, 1984
    Remarks at a White House Meeting With the American Retail Federation May 16, 1984 Good afternoon, I'm glad to welcome you -- I know you've probably been welcomed by others already -- you, the merchants of America, back to the White House. It's hard to believe that 2 years have passed since we last met -- 2 short years, but what a difference. As you probably remember, when we met in the Rose Garden, I didn't have very much good news to give you. The American people had paid a steep price for years of good intentions badly misdirected. And as a result, our national economy had nearly reached the breaking point. As a result of that crisis that faced us -- well, we weren't, however, pursuing a program based on the shifting sands of government expediency. Another quick fix certainly would have failed. There was only one way to go, and that was use three simple words as our guide: Trust the people. Lasting economic recovery had to be built on the solid rock of the American free enterprise system. And when I think back to all the critics who cynically said we couldn't possibly get it done, I find myself remembering my previous life in the entertainment world. You know, back in the days of vaudeville, vaudevillians trying to get bookings and even young ones trying to break into the show business would go into an empty theater, and there'd be an agent sitting out there in about the third row, all alone in the theater, cigar in his mouth, wearing a check suit and -- [laughter] -- the vaudevillian would have to show his wares to this cynic.
    [Show full text]
  • Final Version of Thesis
    JAPANESE INNOVATION STRATEGY AND THE ACQUISITION OF UK INFORMATION TECHNOLOGY FIRMS T H W Minshall Christ’s College, Cambridge A dissertation submitted to the University of Cambridge for the Degree of Doctor of Philosophy Cambridge University Engineering Department April 1997 Preface Except for commonly understood and accepted ideas, or where specific reference is made, the work reported in this dissertation is my own and includes nothing which is the outcome of work done in collaboration. No part of the dissertation has been previously submitted to any university for any degree, diploma or other qualification. T H W Minshall Cambridge April 1997 Acknowledgements I am particularly grateful to my supervisor, Elizabeth Garnsey, for her guidance and support throughout the course of this research. In addition, thanks are due to Nick Oliver and Hugh Whittaker, and all my colleagues at the Manufacturing and Management Division of the Engineering Department, and at the Judge Institute of Management Studies for their advice and constructive criticism. On the industry side, my gratitude to the companies in the UK and Japan who agreed to contribute to the contents of this dissertation. Finally, my thanks to my family, for encouraging me, and to Nicola, for all her support and for applying her new-found skills at proof-reading. This programme of research was supported by a Postgraduate Training Award (J00 429 332012) from the ESRC. Table of contents Chapter 1 Introduction ...........................................................................................................
    [Show full text]
  • Hacks, Leaks and Disruptions | Russian Cyber Strategies
    CHAILLOT PAPER Nº 148 — October 2018 Hacks, leaks and disruptions Russian cyber strategies EDITED BY Nicu Popescu and Stanislav Secrieru WITH CONTRIBUTIONS FROM Siim Alatalu, Irina Borogan, Elena Chernenko, Sven Herpig, Oscar Jonsson, Xymena Kurowska, Jarno Limnell, Patryk Pawlak, Piret Pernik, Thomas Reinhold, Anatoly Reshetnikov, Andrei Soldatov and Jean-Baptiste Jeangène Vilmer Chaillot Papers HACKS, LEAKS AND DISRUPTIONS RUSSIAN CYBER STRATEGIES Edited by Nicu Popescu and Stanislav Secrieru CHAILLOT PAPERS October 2018 148 Disclaimer The views expressed in this Chaillot Paper are solely those of the authors and do not necessarily reflect the views of the Institute or of the European Union. European Union Institute for Security Studies Paris Director: Gustav Lindstrom © EU Institute for Security Studies, 2018. Reproduction is authorised, provided prior permission is sought from the Institute and the source is acknowledged, save where otherwise stated. Contents Executive summary 5 Introduction: Russia’s cyber prowess – where, how and what for? 9 Nicu Popescu and Stanislav Secrieru Russia’s cyber posture Russia’s approach to cyber: the best defence is a good offence 15 1 Andrei Soldatov and Irina Borogan Russia’s trolling complex at home and abroad 25 2 Xymena Kurowska and Anatoly Reshetnikov Spotting the bear: credible attribution and Russian 3 operations in cyberspace 33 Sven Herpig and Thomas Reinhold Russia’s cyber diplomacy 43 4 Elena Chernenko Case studies of Russian cyberattacks The early days of cyberattacks: 5 the cases of Estonia,
    [Show full text]
  • Combating Spyware in the Enterprise.Pdf
    www.dbebooks.com - Free Books & magazines Visit us at www.syngress.com Syngress is committed to publishing high-quality books for IT Professionals and delivering those books in media and formats that fit the demands of our cus- tomers. We are also committed to extending the utility of the book you purchase via additional materials available from our Web site. SOLUTIONS WEB SITE To register your book, visit www.syngress.com/solutions. Once registered, you can access our [email protected] Web pages. There you will find an assortment of value-added features such as free e-booklets related to the topic of this book, URLs of related Web site, FAQs from the book, corrections, and any updates from the author(s). ULTIMATE CDs Our Ultimate CD product line offers our readers budget-conscious compilations of some of our best-selling backlist titles in Adobe PDF form. These CDs are the perfect way to extend your reference library on key topics pertaining to your area of exper- tise, including Cisco Engineering, Microsoft Windows System Administration, CyberCrime Investigation, Open Source Security, and Firewall Configuration, to name a few. DOWNLOADABLE EBOOKS For readers who can’t wait for hard copy, we offer most of our titles in download- able Adobe PDF form. These eBooks are often available weeks before hard copies, and are priced affordably. SYNGRESS OUTLET Our outlet store at syngress.com features overstocked, out-of-print, or slightly hurt books at significant savings. SITE LICENSING Syngress has a well-established program for site licensing our ebooks onto servers in corporations, educational institutions, and large organizations.
    [Show full text]
  • Supporting the Creative Industries of Massachusetts Creativenext Listening Tour Summary Report
    Supporting the Creative Industries of Massachusetts CreativeNEXT Listening Tour Summary Report INTRODUCTION This report provides an overview of the CreativeNEXT listening tour, an event series which engaged the creative industries of Massachusetts throughout the summer of 2012. The purpose of these roundtable events was to evaluate the needs and opportunities that exist within the creative industries and to provide insights to guide the development of the Massachusetts Creative Economy Council’s priority focus areas. The Patrick-Murray Administration’s Creative Economy Industry Director Helena Fruscio and the Massachusetts Creative Economy Council reached over 580 businesses, organizations, and individuals during the twenty-one events and discussed the growth and sustainability of the creative industries and their future in Massachusetts. Additionally, the CreativeNEXT tour: Gathered Input: Engaged individuals working in the creative industries in a discussion about needs and provided an opportunity to be “part of the solution”. Collected Data: Polled the industry about the size and scope of their businesses and organizations. Mobilized Support: Provided an opportunity for community leaders and business support organizations to engage with the creative industries. Enhanced Visibility: Increased profile of the creative industries across the Commonwealth. BACKGROUND What are the creative industries? In Massachusetts, the creative industries include the many interlocking industry sectors that provide creative services or create and promote
    [Show full text]
  • Prize-Winning Microscopy Image Lights up Times Square in New York 21 May 2014
    Prize-winning microscopy image lights up Times Square in New York 21 May 2014 on a large, high-resolution screen in New York's iconic Times Square. "The image is of a mouse sperm cell, also known as a spermatocyte, highlighted with three fluorescent labels that show DNA (blue), KASH5 protein (green) and the SCP3 protein (red), which is required for the pairing of chromosomes," explains Wright. "This image was a particularly striking example when we captured it—the orientation of the proteins we were studying and the two sperm cells stained in blue on both sides made it aesthetically pleasing." The image was the result of a collaboration between Wright, head of the IMB Microscopy Unit (IMU), Horn, a senior research fellow, and the research teams of Colin Stewart and Brian Burke, also of the IMB, who discovered that the KASH5 protein is vital for successful chromosomal movements during meiosis—the division of cells necessary for successful sexual reproduction1. The prize-winning image of a developing mouse sperm Sperm and eggs need accurate chromosome cell, captured by A*STAR researchers Graham Wright pairing if they are to mature correctly, so without and Henning Horn. The locations of DNA (blue), KASH5 chromosomal activity guided by the KASH5 protein, protein (green) and SCP3 protein (red) were revealed fertility is adversely affected. using immunofluorescence staining. Credit: A*STAR Institute of Medical Biology The researchers collected the image on a GE DeltaVision OMX microscope, which enables biological samples to be imaged in superresolution in three dimensions. Wright and Horn spent time Science and show business may sound like an perfecting their sample preparation and honing the unusual combination, but advances in technology settings on the microscope to acquire their high- mean that scientists can now capture dramatic resolution prize-winning image.
    [Show full text]
  • Honours Bachelor of Producing for the Creative Industries
    Honours Bachelor of Producing for the Creative Industries Applying for Ministerial Consent Under the Post-secondary Education Choice and Excellence Act, 2000 The Secretariat Postsecondary Education Quality Assessment Board 315 Front Street West 16th Floor Toronto, ON M7A 0B8 Tel.: 416-325-1686 Fax: 416-325-1711 E-mail: [email protected] sheridancollege.ca Section 1: Introduction 1.1 College and Program Information Full Legal Name of Organization: Sheridan College Institute of Technology and Advanced Learning URL for Organization Homepage (if applicable): http://www.sheridancollege.ca/ Proposed Degree Nomenclature: Honours Bachelor of Producing for the Creative Industries Location Trafalgar Campus, 1430 Trafalgar Road, Oakville, Ontario, L6H 2L1 Contact Information: Person Responsible for this submission: Name/Title: Melanie Spence-Ariemma, Provost and Vice President, Academic Full Mailing Address: 1430 Trafalgar Road, Oakville, Ontario, L6H 2L1 Telephone: (905) 845-9430 x4226 E-mail: [email protected] Name/Title: Joan Condie, Dean, Centre for Teaching and Learning Full Mailing Address: 1430 Trafalgar Road, Oakville, Ontario, L6H 2L1 Telephone: (905) 845-9430 x2559 E-mail: [email protected] Site Visit Coordinator (if different from above): Name/Title: Ashley Day, Coordinator, Program Review and Development Services Full Mailing Address: 1430 Trafalgar Road, Oakville, Ontario, L6H 2L1 Telephone: (905) 845-9430 x5561 E-mail: [email protected] Honours Bachelor of Producing for the Creative Industries
    [Show full text]
  • Political Economy of the Culture Industries
    Toward a Political Economy of Digital Culture: From Organized Mass Consumption to Attention Rivalry By Jeffrey A. Hart Department of Political Science Indiana University Bloomington, IN 47405 Prepared originally for a Short Course on Culture Industries, Technologies, and Policies, at the Annual Meeting of the American Political Science Association, Philadelphia, August 30, 2006. Revised January 15, 2009 for publication in J.P. Singh, ed., Cultural Policies and Power (Lexington, Mass.: Lexington Books, forthcoming). Please do not cite or quote without the written permission of the author. Introduction According to the editor of this volume, the term “cultural industries” includes “the arts and creative sectors that encompass, but are not limited to, publishing, film, music, photography, design, and tourism.”1 Because of the development of digital technologies in computers and telecommunications equipment, more and more cultural artifacts are being produced, stored, and delivered digitally. The increased speed of digital devices and innovations in computer networks and digital compression technologies make it both easier and less expensive to deliver words, music, symbols, and images (in fact, anything that can be digitized) to consumers around the world. One of the key consequences is that the cultural industries, which used to depend solely on analog technologies, have had to adjust their business models and strategies to 1 J.P. Singh, “APSA Short Course on Culture Industries, Technologies, and Policies,” August 20, 2006, http://www3.georgetown.edu/grad/cct/10344.html. deal with the new digital technologies. Some firms have done this successfully, others have not. Also, cultural industries catering to mass audiences tended to use one-way distribution systems (e.g.
    [Show full text]
  • Using Deception to Enhance Security: a Taxonomy, Model, and Novel Uses Mohammed H
    Purdue University Purdue e-Pubs Open Access Dissertations Theses and Dissertations January 2015 Using Deception to Enhance Security: A Taxonomy, Model, and Novel Uses Mohammed H. Almeshekah Purdue University Follow this and additional works at: https://docs.lib.purdue.edu/open_access_dissertations Recommended Citation Almeshekah, Mohammed H., "Using Deception to Enhance Security: A Taxonomy, Model, and Novel Uses" (2015). Open Access Dissertations. 1334. https://docs.lib.purdue.edu/open_access_dissertations/1334 This document has been made available through Purdue e-Pubs, a service of the Purdue University Libraries. Please contact [email protected] for additional information. Graduate School Form 30 Updated 1/15/2015 PURDUE UNIVERSITY GRADUATE SCHOOL Thesis/Dissertation Acceptance This is to certify that the thesis/dissertation prepared By Almeshekah, Mohammed Hamoud Entitled Using Deception to Enhance Security: A Taxonomy, Model, and Novel Uses For the degree of Doctor of Philosophy Is approved by the final examining committee: Eugene H. Spafford Co-chair Mikhail J. Atallah Co-chair Samuel S. Wagstaff, Jr Matt Bishop To the best of my knowledge and as understood by the student in the Thesis/Dissertation Agreement, Publication Delay, and Certification Disclaimer (Graduate School Form 32), this thesis/dissertation adheres to the provisions of Purdue University’s “Policy of Integrity in Research” and the use of copyright material. Eugene H. Spafford Approved by Major Professor(s): William Gorman July 20th, 2015 Approved by: Head of the Departmental
    [Show full text]