📄 apb.htm
字号:
<P>Contact: Kelly Gibbs</P><P>Phone: 415-956-1300</P><P>Fax: 415-956-1301</P><P>E-mail: <A HREF="mailto:k.gibbs@realogic.com"><TT>k.gibbs@realogic.com</TT></A></P><P>URL: <A HREF="http://www.realogic.com/"><TT>http://www.realogic.com/</TT></A><H3><FONT COLOR="#000077"><B>Ritter Software Engineering</B></FONT></H3><P>Advanced patented and patent-pending ciphering technologies with very significantadvantages in particular applications. Also providing custom cipher designs, implementations,and consulting.</P><P>Ritter Software Engineering</P><P>2609 Choctaw Trail</P><P>Austin, Texas 78745</P><P>Contact: Terry Ritter, P.E.</P><P>Phone/Fax: 512-892-0494</P><P>E-mail: <A HREF="mailto:ritter@io.com"><TT>ritter@io.com</TT></A></P><P>URL: <A HREF="http://www.io.com/~ritter/"><TT>http://www.io.com/~ritter/</TT></A><H3><FONT COLOR="#000077"><B>Saffire Systems</B></FONT></H3><P>Saffire Systems specializes in secure software development, consulting, and systemsintegration. Saffire Systems provides engineering services (architecture, design,implementation, and testing), evaluation support services, secure network evaluations,and Windows NT security training.</P><P>Saffire Systems</P><P>P.O. Box 11154</P><P>Champaign, IL 61826-1154</P><P>Contact: Michelle A. Ruppel</P><P>Phone: 217-359-7763</P><P>Fax: 217-356-7050</P><P>E-mail: <A HREF="mailto:maruppel@prairienet.org"><TT>maruppel@prairienet.org</TT></A><H3><FONT COLOR="#000077"><B>SecTek, Inc.</B></FONT></H3><P>SecTek provides services in following areas: INFOSEC, COMPSEC, physical security,access control, risk assessments, penetration tests, firewall design/implementation,intrusion detection, intranets.</P><P>SecTek, Inc.</P><P>208 Elden Street, Suite 201</P><P>Herndon, VA 22070</P><P>Contact: Bruce Moore</P><P>Phone: 703-834-0507</P><P>Fax: 703-834-0214</P><P>E-mail: <A HREF="mailto:wmoore@sectek.com"><TT>wmoore@sectek.com</TT></A></P><P>URL: <A HREF="http://www.sectek.com"><TT>http://www.sectek.com</TT></A><H3><FONT COLOR="#000077"><B>Secure Networks Inc.</B></FONT></H3><P>SNI is a security research house whose primary focus is the development of securityauditing tools. SNI's premier product is Ballista, an advanced network auditing tool.SNI also provides security audits to both commercial and government clients.</P><P>Secure Networks Inc.</P><P>40 703 6th Avenue S.W.</P><P>Calgary, Alberta, t2p-0t9</P><P>Contact: Alfred Huger</P><P>Phone: 403-262-9211</P><P>Fax: 403-262-9221</P><P>E-mail: <A HREF="mailto:ahuger@secnet.com"><TT>ahuger@secnet.com</TT></A></P><P>URL: <A HREF="http://www.securenetworks.com/"><TT>http://www.securenetworks.com/</TT></A>or <A HREF="http://www.secnet.com/"><TT>http://www.secnet.com/</TT></A><H3><FONT COLOR="#000077"><B>SecureNet Engineering, Inc.</B></FONT></H3><P>Providing information technology and security consulting services to government,financial, and technological industries.</P><P>SecureNet Engineering, Inc.</P><P>P.O. Box 520</P><P>Folsom, CA, 95763-0520</P><P>Contact: Thomas H. McCreary</P><P>Phone: 916-987-1800, 800-240-9863</P><P>E-mail: <A HREF="mailto:mccreary@pacbell.net"><TT>mccreary@pacbell.net</TT></A><H3><FONT COLOR="#000077"><B>Security First Technologies, Inc.</B></FONT></H3><P>Developers of secure networks for government and industry for over 10 years, B1security, CMW, trusted operating systems, UNIX, Windows NT, secure network designand implementation, security auditing, penetration studies, authentication and encryptionsoftware products (VirtualVault, HannaH, Troy). Mr. Kalwerisky is the author of "WindowsNT: Guidelines for Audit, Security, and Control," Microsoft Press, 1994.</P><P>Security First Technologies, Inc.</P><P>3390 Peachtree Road, Suite 1600</P><P>Atlanta, Georgia, 30326</P><P>Contact: Jeff Kalwerisky, VP Consulting Services</P><P>Phone: 404-812-6665</P><P>Fax: 404-812-6616</P><P>E-mail: <A HREF="mailto:jeffk@s-1.com"><TT>jeffk@s-1.com</TT></A></P><P>URL: <TT>h</TT><A HREF="ttp://www.s-1.com"><TT>ttp://www.s-1.com</TT></A><H3><FONT COLOR="#000077"><B>Sequent Computer Systems BV</B></FONT></H3><P>UNIX, firewalls, networking, Internet, intranet, auditing, tiger teams, security,cryptology, security policy.</P><P>Sequent Computer Systems BV</P><P>Rijnzathe 7</P><P>De Meern, Utrecht, 3454PV</P><P>The Netherlands</P><P>Contact: Hans Van de Looy</P><P>Phone: +31 30 6666 070</P><P>Fax: +31 30 6666 054</P><P>E-mail: <A HREF="mailto:hvdl@sequent.com"><TT>hvdl@sequent.com</TT></A></P><P>URL: <A HREF="http://www.IAEhv.nl/users/hvdl"><TT>http://www.IAEhv.nl/users/hvdl</TT></A><H3><FONT COLOR="#000077"><B>SmallWorks, Inc.</B></FONT></H3><P>SmallWorks is a software-development and consulting group specializing in standards-basedInternet security packages, including but not limited to firewalls, IPSEC implementations,and high-security Internet connectivity solutions. A partial list of our clientsincludes Tivoli Systems, Sterling Commerce, Cisco Systems (SmallWorks developed theTACACS+, CiscoSecure UNIX Server for Cisco Systems).</P><P>SmallWorks, Inc.</P><P>4501 Spicewood Springs Road Suite #1001</P><P>Austin, TX 78759</P><P>Contact: Steve Bagwell, Director of Sales</P><P>Phone: 512-338-0619</P><P>Fax: 512-338-0625</P><P>E-mail: <A HREF="mailto:steve@smallworks.com"><TT>steve@smallworks.com</TT></A></P><P>URL: <A HREF="http://www.smallworks.com"><TT>http://www.smallworks.com</TT></A><H3><FONT COLOR="#000077"><B>Soundcode, Inc.</B></FONT></H3><P>Soundcode, Inc. provides the latest in data security and electronic (digital)signature software for the Internet, intranets, and personal computers. With Point'n Crypt Professional for one-click file lock-up, sending, and storage, Point 'nSign for the one-click signing of electronic documents, and scCryptoEngine, a powerfulprogramming engine for both encryption and digital signatures, Soundcode makes computerprivacy easy.</P><P>Soundcode, Inc.</P><P>11613 124th Avenue NE, Suite G-317</P><P>Kirkland, WA 98034-8100</P><P>Contact: Pete Adlerberg</P><P>Voice: 206-828-9155</P><P>Fax: 206-329-4351</P><P>Toll-Free: 888-45-SOUND</P><P>E-mail: <A HREF="mailto:pete@soundcode.com"><TT>pete@soundcode.com</TT></A></P><P>URL: <A HREF="http://www.soundcode.com"><TT>http://www.soundcode.com</TT></A><H3><FONT COLOR="#000077"><B>Strategic Data Command Inc.</B></FONT></H3><P>Firewalls, risk analysis, security management, and design.</P><P>Strategic Data Command Inc.</P><P>2505 Parker St.</P><P>Berkeley, CA 94704 USA</P><P>Contact: Lawrence Suto</P><P>Phone: 510-502-9224<H3><FONT COLOR="#000077"><B>Technical Reflections</B></FONT></H3><P>Security design and implementation on systems such as UNIX and Windows NT/95.Securing Web servers for electronic transactions. We also participate in tiger andattach teams to help secure sites via firewalls and other security policies.</P><P>Technical Reflections</P><P>6625 Fox Road</P><P>Marcy, NY 13403</P><P>Contact: Joe Riolo</P><P>Phone: 315-865-5639</P><P>Fax: 315-336-6514<H3><FONT COLOR="#000077"><B>Technologic, Inc.</B></FONT></H3><P>Manufacturers of the Interceptor&tm; firewall, Internet security consulting,virtual private networking, security audits, and penetration testing. "Can yournetwork keep a secret?"<FONT SIZE="1"><SUP>TM</SUP></FONT></P><P>Technologic, Inc.</P><P>1000 Abernathy Road, Suite 1075</P><P>Atlanta, GA 30328</P><P>Contact: Eric Bleke</P><P>Phone: 770-522-0222</P><P>Fax: 770-522-0201</P><P>E-mail: <A HREF="mailto:info@tlogic.com"><TT>info@tlogic.com</TT></A></P><P>URL: <A HREF="http://www.tlogic.com"><TT>http://www.tlogic.com</TT></A><H3><FONT COLOR="#000077"><B>Triumph Technologies, Inc.</B></FONT></H3><P>Triumph Technologies' Internet Security Division is focused on providing enterprise-widesecurity solutions. We utilize only the best security products and technologies.We offer services which include: turn-key firewall solutions (UNIX/NT), enterprisesecurity assessments, IP addressing re/designing, and integration of specializedproducts such as SMTP mail content management.</P><P>Triumph Technologies, Inc.</P><P>3 New England Executive Park</P><P>Burlington, MA 01803</P><P>Contact: Mitchell Hryckowian</P><P>Phone: 617-273-0073</P><P>Fax: 617-272-4855</P><P>E-mail: <A HREF="mailto:info@security.triumph.com"><TT>info@security.triumph.com</TT></A></P><P>URL: <A HREF="http://www.triumph.com"><TT>http://www.triumph.com</TT></A><H3><FONT COLOR="#000077"><B>Tucker Network Technologies, Inc.</B></FONT></H3><P>Network and telecommunications consulting and integration firm specializing inLAN/WAN, network management, Internet policy, infrastructures, firewalls, security,and access.</P><P>Tucker Network Technologies, Inc.</P><P>P.O. Box 429</P><P>50 Washington Street</P><P>South Norwalk, CT 06856-0429</P><P>Contact: Tucker McDonagh, Managing Director</P><P>Phone: 203-857-0080</P><P>Fax: 203-857-0082</P><P>E-mail: <A HREF="mailto:tucker@tuckernet.com"><TT>tucker@tuckernet.com</TT></A><H3><FONT COLOR="#000077"><B>Visionary Corporate Computing Concepts</B></FONT></H3><P>UNIX, firewall solutions, research and penetration testing, risk assessments,intrusion detection, remote system monitoring, emergency problem handling, consulting,and outsourcing.</P><P>Visionary Corporate Computing Concepts</P><P>712 Richland Street Suite F</P><P>Columbia, SC, 29201 USA</P><P>Contact: Matthew Caldwell</P><P>Phone: 803-733-7333</P><P>Fax: 803-733-5888</P><P>E-mail: <A HREF="mailto:matt.caldwell@vc3.com"><TT>matt.caldwell@vc3.com</TT></A><TT></TT></P><P>URL: <A HREF="http://www.vc3.com"><TT>http://www.vc3.com</TT></A><H3><FONT COLOR="#000077"><B>Wang I-Net Government Services</B></FONT></H3><P>Wang I-Net offers the XTS-300&tm; NSA-evaluated B3 Trusted Computer System,the Secure Automated Guard Environment (SAGE&tm;), and trusted application developmentservices. Wang I-Net Secure Systems customers include the NSA, DoD, Army, Air Force,Navy, State Department, FBI, DOE, IRS, NATO, governments of UK, Canada, and Norway,and several contractors.</P><P>Wang I-Net Government Services</P><P>7900 Westpark Drive MS 700</P><P>McLean, VA 22102-4299</P><P>Contact: K.M. Goertzel</P><P>Phone: 703-827-3914</P><P>Fax: 703-827-3161</P><P>E-mail: <A HREF="mailto:goertzek@wangfed.com"><TT>goertzek@wangfed.com</TT></A></P><P>URL: <A HREF="http://www.wangfed.com"><TT>http://www.wangfed.com</TT></A><BLOCKQUOTE> <P><HR><FONT COLOR="#000077"><B>NOTE:</B></FONT><B> </B>Wang Federal is one of the leading providers of TEMPEST protection technology. Wang Federal's TEMPEST products prevent eavesdropping of electronic emissions that leak from your monitor (or computer). <HR></BLOCKQUOTE><H3><FONT COLOR="#000077"><B>Zot Consulting</B></FONT></H3><P>I have over 17 years of experience on the Internet. I do pure Internet consultingfor firewalls, Web and information servers, database connectivity, and company securityfor small and Fortune 100 companies.</P><P>Zot Consulting</P><P>808 SE Umatilla Street</P><P>Portland, OR 97202</P><P>Contact: Zot O'Connor</P><P>Phone: 503-231-3893</P><P>Fax: 503-236-5177</P><P>E-mail: <A HREF="mailto:zot@crl.com"><TT>zot@crl.com</TT></A></P><P>URL: <A HREF="http://www.crl.com/~zot"><TT>http://www.crl.com/~zot</TT></A><H1></H1><CENTER><P><HR><A HREF="../apa/apa.htm"><IMG SRC="../button/previous.gif" WIDTH="128" HEIGHT="28"ALIGN="BOTTOM" ALT="Previous chapter" BORDER="0"></A><A HREF="../apc/apc.htm"><IMGSRC="../button/next.gif" WIDTH="128" HEIGHT="28" ALIGN="BOTTOM" ALT="Next chapter"BORDER="0"></A><A HREF="../index.htm"><IMG SRC="../button/contents.gif" WIDTH="128"HEIGHT="28" ALIGN="BOTTOM" ALT="Contents" BORDER="0"></A> <BR><BR><BR><IMG SRC="../button/corp.gif" WIDTH="284" HEIGHT="45" ALIGN="BOTTOM" ALT="Macmillan Computer Publishing USA"BORDER="0"></P><P>© <A HREF="../copy.htm">Copyright</A>, Macmillan Computer Publishing. Allrights reserved.</CENTER></BODY></HTML>
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -