⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 apb.htm

📁 Maximum Security (First Edition) 网络安全 英文版
💻 HTM
📖 第 1 页 / 共 4 页
字号:
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2//EN"><HTML><HEAD>		<TITLE>Maximum Security -- Appendix B -- Security Consultants</TITLE></HEAD><BODY TEXT="#000000" BGCOLOR="#FFFFFF"><CENTER><H1><IMG SRC="../button/samsnet.gif" WIDTH="171" HEIGHT="66" ALIGN="BOTTOM" BORDER="0"><BR><FONT COLOR="#000077">Maximum Security: </FONT></H1></CENTER><CENTER><H2><FONT COLOR="#000077">A Hacker's Guide to Protecting Your Internet Site and Network</FONT></H2></CENTER><CENTER><P><A HREF="../apa/apa.htm"><IMG SRC="../button/previous.gif" WIDTH="128" HEIGHT="28"ALIGN="BOTTOM" ALT="Previous chapter" BORDER="0"></A><A HREF="../apc/apc.htm"><IMGSRC="../button/next.gif" WIDTH="128" HEIGHT="28" ALIGN="BOTTOM" ALT="Next chapter"BORDER="0"></A><A HREF="../index.htm"><IMG SRC="../button/contents.gif" WIDTH="128"HEIGHT="28" ALIGN="BOTTOM" ALT="Contents" BORDER="0"></A> <HR></CENTER><CENTER><H1><FONT COLOR="#000077">B</FONT></H1></CENTER><CENTER><H1><FONT COLOR="#000077">Security Consultants</FONT></H1></CENTER><P>This appendix is a bit different from the one that preceded it. It is designedto provide you with contact points for security vendors. However, there are severalthings you should know about this list. First, the manner in which it was generatedwas extremely unorthodox. It differs from other such lists in several ways.</P><P>In March 1997, I posted a message to several security lists and newsgroups. Inthe message, I explained that the book was written anonymously. I stated that anysecurity vendor or consultant who wished to be listed in this appendix should forwardhis or her information to me or to Sams.net. That listing would be printed free ofcharge.</P><P>The idea was basically to allow you to look through the listing and find a securityconsultant or vendor near you. The responses were amazing. The vast majority of thevendors on the list are well known in the security community. For example, you mightremember that I mentioned Gemini Computers earlier in this book. Gemini creates oneof the two most secure products on Earth. That it decided to place a listing in mybook is extraordinary, and an honor for me.</P><P>Unfortunately, the list is short (perhaps 60 entries, give or take a few). Nevertheless,these individuals and corporations are truly in the know. Each day, they supply securityservices to thousands of companies across the globe. Many provide such services toFortune 500 companies.</P><P>Some consultants and companies that also perform many superb security serviceswere reticent to placing a listing; they felt that placing a listing in a book sightunseen was unwise. (What if I was a complete crackpot and my book was terrible? Whybe associated with such a book?) This is unfortunate. So the absence of a vendor'sname on this list means nothing and should not reflect on that vendor's capabilities.There are several hundred companies of equal caliber to those listed here.<BLOCKQUOTE>	<P><HR><FONT COLOR="#000077"><B>NOTE:</B></FONT><B> </B>Sams.net cannot make any representations	or warranties regarding the technical expertise of the companies listed in this appendix.	However, I have conducted concentrated surveillance of security groups and lists	for approximately two years, and nearly all the companies listed are recognized within	the security community. I would urge you to track them by e-mail address and URL.	From this, you can easily verify their reputations on the Internet. <HR></BLOCKQUOTE><H2><FONT COLOR="#000077"><B>The Listings</B></FONT></H2><P>The format of the listings was simple. Vendors were told to provide all theirvitals (name, address, contact person, telephone, fax, and URL). They were also askedto take three lines to explain what services they offer. Except for corrections ofspelling errors, the listings here appear exactly as they were received.<H3><FONT COLOR="#000077"><B>ANS Communications, an America Online Company</B></FONT></H3><P>ANS is a worldwide Internet service provider. Security solutions include the ANSInterLock firewall, which combines access control, management reporting, and intrusiondetection. ANS InterManage offers full outsourcing of Internet/intranet security.</P><P>ANS Communications<BR>1875 Campus Commons Drive, Suite 220<BR>Reston, VA 20191<BR>Phone: 703-758 8700, 800-944 5625<BR>Fax: 703-758 7717</P><P>E-mail: <A HREF="mailto:ilsupport@reston.ans.net"><TT>ilsupport@reston.ans.net</TT></A></P><P>URL: <A HREF="http://www.ans.net/InterLock"><TT>http://www.ans.net/InterLock</TT></A><H3><FONT COLOR="#000077"><B>Armor Security Inc.</B></FONT></H3><P>Armor provides installation of high security physical and electronic devices toprotect life and property. These include CCTV, card access systems, burglar and firealarms, and UL listed locks and safes.</P><P>Armor Security Inc.<BR>2601 Stevens Avenue South<BR>Minneapolis, MN 55408<BR>Contact: Doug Wilson<BR>Phone: 612-870-4142<BR>Fax: 612-870-4789</P><P>E-mail: <A HREF="mailto:service@armorsecurity.com"><TT>service@armorsecurity.com</TT></A></P><P>URL: <A HREF="http://www.armorsecurity.com"><TT>http://www.armorsecurity.com</TT></A><H3><FONT COLOR="#000077"><B>AS Stallion Ltd.</B></FONT></H3><P>Data and network security consulting and services. Firewall and encryption solutions.Security evaluations and auditing.</P><P>AS Stallion Ltd.<BR>Sakala 19<BR>Tallinn EE0001, Estonia<BR>Contact: Mr. Jyri Kaljundi, Managing Director<BR>Phone: 372-630-8994<BR>Fax: 372-630-8901</P><P>E-mail: <A HREF="mailto:stallion@stallion.ee"><TT>stallion@stallion.ee</TT></A></P><P>URL: <A HREF="http://www.stallion.ee/"><TT>http://www.stallion.ee/</TT></A><H3><FONT COLOR="#000077"><B>Atlantic Computing Technology Corporation</B></FONT></H3><P>Started in 1994, specializes in UNIX, NT, firewalls, network security, WAN connectivity.Currently resell seven different firewall brands.</P><P>Atlantic Computing Technology Corporation<BR>1268 Main Street, Suite 201<BR>Newington, CT 06111<BR>Contact: Rick E. Romkey<BR>Phone: 860-667-9596<BR>Fax: 860-666-7825</P><P>E-mail: <A HREF="mailto:info@atlantic.com"><TT>info@atlantic.com</TT></A></P><P>URL: <A HREF="http://www.atlantic.com"><TT>http://www.atlantic.com</TT></A><H3><FONT COLOR="#000077"><B>Bret Watson &amp; Associates</B></FONT></H3><P>Computer facility security design and testing. UNIX, Novell, Microsoft, and Applenet- work and system audits. ISS technical consultant for Western Australia SecurityProject Management.</P><P>Bret Watson &amp; Associates</P><P>6 June Rd<BR>Gooseberry Hill, Western Australia, 6076, Australia<BR>Contact: Bret Watson<BR>Phone: (+61) 041 4411 149<BR>Fax: (+61) 09 454 6042</P><P>E-mail: <A HREF="mailto:consulting@bwa.net"><TT>consulting@bwa.net</TT></A></P><P>URL: <A HREF="http://www.bwa.net"><TT>http://www.bwa.net</TT></A><H3><FONT COLOR="#000077"><B>Cambridge Technology Partners, Inc.</B></FONT></H3><P>Cambridge Technology Partners (NASDAQ: CATP) is one of the fastest growing companiesin the systems integration industry. Cambridge's unique approach to information technology,network, and systems security (IT) consulting and systems integration delivers innovative,quantifiable results to clients in unprecedented time frames. We deliver our serviceswithin a unique fixed time, fixed price model.</P><P>Cambridge Technology Partners, Inc.<BR>1300 South El Camino Real, Suite 600<BR>San Mateo, CA 94402<BR>Contact: Yobie Benjamin<BR>Phone: 415-574-3710</P><P>URL: <A HREF="http://www.ctp.com"><TT>http://www.ctp.com</TT></A><H3><FONT COLOR="#000077"><B>Cobb Associates</B></FONT></H3><P>An information security consultancy since 1987, headed by Stephen Cobb, a CertifiedInformation Systems Security Professional, offering security assessment, policy,training, and testing, specializing in LANs, NT, Internet, firewalls, and the Web.</P><P>Cobb Associates<BR>2825 Garden Street, Suite 7-11<BR>Titusville, FL 32796<BR>Contact: Stephen Cobb, CISSP<BR>Phone: 407-383 0977<BR>Fax: 407-383 0336</P><P>E-mail: <A HREF="mailto:stephen@iu.net"><TT>stephen@iu.net</TT></A></P><P>URL: <A HREF="http://www.2cobbs.com"><TT>http://www.2cobbs.com</TT></A><H3><FONT COLOR="#000077"><B>CobWeb Applications</B></FONT></H3><P>Windows 95, NT, network, and Web-site security specialists. Encryption and compressionsoftware. More than you thought possible for less than you imagined!</P><P>CobWeb Applications<BR>Cherry Tree Cottage<BR>Leatherhead Road<BR>Surrey, UK KT23 4SS</P><P>Contact: Mike Cobb<BR>Phone: +44 1372 459040<BR>Fax: +44 1372 459040</P><P>E-mail: <A HREF="mailto:mikec@cobweb.co.uk"><TT>mikec@cobweb.co.uk</TT></A></P><P>URL: <A HREF="http://www.cobweb.co.uk"><TT>http://www.cobweb.co.uk</TT></A><H3><FONT COLOR="#000077"><B>Comet &amp; Company</B></FONT></H3><P>Windows NT and OpenVMS security and general consulting, training, design, configuration,capacity planning, hardware analysis, communications, and management consulting.Experienced and seasoned consultants.</P><P>Comet &amp; Company<BR>165 William Street #9<BR>New York City, NY 10038<BR>Contact: Carl Friedberg<BR>Phone: 212-233-5470</P><P>E-mail: <A HREF="mailto:carl@comets.com"><TT>carl@comets.com</TT></A></P><P>URL: <A HREF="http://www.comets.com"><TT>http://www.comets.com</TT></A><H3><FONT COLOR="#000077"><B>Cryptek Secure Communications LLC</B></FONT></H3><P>Cryptek manufactures and sells NSA-evaluated network-security products for bothgovernment and commercial use. These products include encryption, identificationand authentication, access control, auditing, and integrity mechanisms. The productscan be integrated with most applications and operating systems to provide iron-cladsecurity to protect an organization's most valuable assets.</P><P>Cryptek Secure Communications LLC<BR>14130-C Sullyfield Circle<BR>Chantilly, VA 20151<BR>Contact: Timothy C. Williams<BR>Phone: 703-802-9300<BR>Fax: 703-818-3706</P><P>E-mail: <A HREF="mailto:williams@cryptek.com"><TT>williams@cryptek.com</TT></A><H3><FONT COLOR="#000077"><B>DataLynx, Inc.</B></FONT></H3><P>Multi-level Security System&amp;tm; for UNIX and Windows NT: Features includeaccess control, security response, security alarms, security reporting, user account/passwordmanagement, and much more.</P><P>DataLynx, Inc.<BR>6633 Convoy Court<BR>San Diego, CA 92111<BR>Contact: Tony Macdonald, Marketing Director<BR>Phone: 619-560-8112<BR>Fax: 619-560-8114</P><P>E-mail: <A HREF="mailto:sales@dlxguard.com"><TT>sales@dlxguard.com</TT></A></P><P>URL: <A HREF="http://www.dlxguard.com"><TT>http://www.dlxguard.com</TT></A><H3><FONT COLOR="#000077"><B>EAC Network Integrators</B></FONT></H3><P>EAC provides three levels of security service: intensive network and system audits,incident response (both per-incident and on retainer), and pro-active security designand implementation.</P><P>EAC Network Integrators<BR>12 Cambridge Drive<BR>Trumbull, CT 06644<BR>Contact: Jesse Whyte<BR>Phone: 203-371-4774</P><P>URL: <A HREF="http://www.eac.com"><TT>http://www.eac.com</TT></A><H3><FONT COLOR="#000077"><B>Electronic Communications Consultants Inc.</B></FONT></H3><P>Engineering consulting services for certificate-based applications. Specializingin the SET protocol for Internet credit-card-based payments and certification authorityselection, procurement, and integration. Also, electronic payment protocols, e-checks,and home banking.</P><P>Electronic Communications Consultants Inc.<BR>46 Cranberry Circle<BR>Sudbury, MA 01776<BR>Contact: Douglas D. Beattie<BR>Phone: 508-440-9645</P><P>E-mail: <A HREF="mailto:beattie@ecconsultants.com"><TT>beattie@ecconsultants.com</TT></A></P><P>URL: <A HREF="http://www.ecconsultants.com"><TT>http://www.ecconsultants.com</TT></A><H3><FONT COLOR="#000077"><B>Enterprise Solutions Inc.</B></FONT></H3><P>Enterprise Solutions Inc. is a network and systems integration and consultingcompany specializing in network management and security solutions for Internet andintranet connectivity. We provide security policy and firewall implementation servicesfor UNIX and NT.</P><P>Enterprise Solutions Inc.<BR>5002 South Renn Court<BR>Frederick, MD 21703<BR>Contact: John Clipp<BR>Phone: 301-473-4536<BR>Fax: 301-473-4683</P><P>E-mail: <A HREF="mailto:jclipp@worldnet.att.net"><TT>jclipp@worldnet.att.net</TT></A><H3><FONT COLOR="#000077"><B>Eric Murray, Independent Consultant</B></FONT></H3><P>Network security and cryptography application consulting, mostly security analysisof network software projects that are in the design phase and design/implementationof network security products.<BLOCKQUOTE>	<P><HR>

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -