Linda W. Perkins

Category: Security

Mining for Data: Use It, Don't Lose It

Percento Technologies February 18th, 2016 Mining for Data: Use It, Don't Lose It

Making Every IT Dollar Count in a Tight Economy

Percento Technologies February 4th, 2016 Trendy Technology Article - Making Every IT Dollar Count in a Tight Economy

NetIQ AppManager Module Builder

NetIQ March 4th, 2010

The Last Line of Defense: Protecting Your Databases from Malicious Attacks

NetIQ March 1st, 2010

File Integrity Monitoring: Challenges & Solutions

NetIQ February 12th, 2010

NetIQ Security Manager Data Sheet

NetIQ January 10th, 2010

Avoiding Information Overload: A Logical Approach to Managing Endpoint Security and Compliance

FutureSoft, Inc. September 25th, 2008

Wanted poster

FutureSoft, Inc. May 1st, 2008

Texas Guide

FutureSoft, Inc. May 1st, 2008

Have I Got a Deal for You!

Information Security Magazine May 1st, 2003

Blue Lance LT Auditor+ Ad

Blue Lance October 25th, 2002

LT Auditor+ Brochure

Blue Lance October 24th, 2002

Power of Knowledge - Blue Lance Press Release

Blue Lance March 18th, 2002

Managing the Audit Trail: The Foundation for a Legal Offensive (Ghost Written Placed Article)

Larstan Publishing March 1st, 2002