Finding Answers

Neither print nor online gives readers plenty options to answer their ain specific questions, simply In Depth, past integrating both tightly, is designed to give readers the all-time from each medium.

Much as I love the Web, information technology has its weaknesses. It'south hard to take on airplanes, for instance, and reading annihilation really long can make your eyes cross.

Impress, on the other hand, is portable and like shooting fish in a barrel on the eyes but isn't and so smashing if you lot need to dig for more detail or find answers to specific questions a story raises in your listen.

That'southward why we're combining the ii, in this first edition of our monthly In Depth special report. Each In Depth volition focus on a specialty area readers accept identified every bit important to them.

In print, you lot'll find stories probing diverse aspects of the topic, all tied to sectional online stories that go into even greater depth, sidebars on related topics, inquiry, and customs activities designed to enhance the value of the data you go from Computerworld in print and online.

All of that, plus other related Computerworld content, will live at our enhanced In Depth sites at Computerworld.com, continually updated with news, opinions and new research links to assistance you keep upwards to date and focus your research on topics of involvement to you.

So you lot become the portability of print, the resources of the Web and input from your peers in Computerworld communities, served upward in means designed to exist convenient. Let us know how it works for you.

Kevin Fogarty is Computerworld's features editor. Contact him at kevin_fogarty@computerworld. com.

Security Take a chance and Reward

Stories in this report:

  • Want to Save Some Coin? Automate Password Resets
  • Knowldge Quest
  • Companies Need Security Pros With More than Varied Skills
  • Finding Answers
  • The Enemy Within
  • The Threat of XML
  • Soap, Other Protocols Specify Security for XML
  • The Problem With Power
  • Top 10 Security Mistakes
  • Playing Past Europe's Rules
  • False Alert?
  • An Ounce of Intrusion Prevention
  • Deadly Pursuit
  • IDS Products and Prices
  • Should You Outsource IDS?
  • Who He Is
  • Director Offers Primer On Computer Forensics
  • Unlocking Secure Online Commerce
  • As well Late For Digital Certificates?
  • Giving Users Back Their Privacy
  • Feeling Safe With IT Security Deals
  • Finjan's Software Bolcks Active Content Threat
  • Security Statistics
  • The Guardian
  • Congress Considers Slew of Bills That Will Affect IT, East-Commerce
  • U.Southward. Legislators Ponder Masses of Bills; Outlook Remains Murky
  • Rule Changes May Further Protect Company Security Data
  • Getting Started in Computer Forensics
  • PKI Carries the Mail for U.S. Post
  • Security past Syntax

Copyright © 2001 IDG Communications, Inc.