Computer Fraud & Security Bulletin最新文献

筛选
英文 中文
Consultant convicted for child porn cache 顾问因藏匿儿童色情被判有罪
Computer Fraud & Security Bulletin Pub Date : 1995-11-01 DOI: 10.1016/0142-0496(95)80061-1
{"title":"Consultant convicted for child porn cache","authors":"","doi":"10.1016/0142-0496(95)80061-1","DOIUrl":"https://doi.org/10.1016/0142-0496(95)80061-1","url":null,"abstract":"","PeriodicalId":100312,"journal":{"name":"Computer Fraud & Security Bulletin","volume":"1995 11","pages":"Page 5"},"PeriodicalIF":0.0,"publicationDate":"1995-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/0142-0496(95)80061-1","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136859208","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CAAST targets piracy suspects CAAST的目标是海盗嫌疑人
Computer Fraud & Security Bulletin Pub Date : 1995-11-01 DOI: 10.1016/0142-0496(95)80055-7
{"title":"CAAST targets piracy suspects","authors":"","doi":"10.1016/0142-0496(95)80055-7","DOIUrl":"https://doi.org/10.1016/0142-0496(95)80055-7","url":null,"abstract":"","PeriodicalId":100312,"journal":{"name":"Computer Fraud & Security Bulletin","volume":"1995 11","pages":"Page 3"},"PeriodicalIF":0.0,"publicationDate":"1995-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/0142-0496(95)80055-7","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136937821","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Get tougher on software pirates 对盗版软件采取更严厉的措施
Computer Fraud & Security Bulletin Pub Date : 1995-11-01 DOI: 10.1016/0142-0496(95)80056-5
{"title":"Get tougher on software pirates","authors":"","doi":"10.1016/0142-0496(95)80056-5","DOIUrl":"https://doi.org/10.1016/0142-0496(95)80056-5","url":null,"abstract":"","PeriodicalId":100312,"journal":{"name":"Computer Fraud & Security Bulletin","volume":"1995 11","pages":"Page 3"},"PeriodicalIF":0.0,"publicationDate":"1995-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/0142-0496(95)80056-5","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136937856","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
UK initiative to combat chip re-labelling 英国倡议打击芯片重新标签
Computer Fraud & Security Bulletin Pub Date : 1995-11-01 DOI: 10.1016/0142-0496(95)80077-8
Elspeth Wales, Thomas Kaneshige
{"title":"UK initiative to combat chip re-labelling","authors":"Elspeth Wales,&nbsp;Thomas Kaneshige","doi":"10.1016/0142-0496(95)80077-8","DOIUrl":"10.1016/0142-0496(95)80077-8","url":null,"abstract":"<div><p>A new UK initiative has announced its plans to combat the rapidly escalating international problem of chip theft, a problem that's leading to business questioning the credibility and authenticity of its supplies. The Joint Action Group (JAG), run by the London Metropolitan Police Service, earlier this year set up a computer crime sub-committee specifically to investigate the rapidly escalating problem of chip theft at the request of a group of multi-national companies, including IBM, Intel and BT.</p></div>","PeriodicalId":100312,"journal":{"name":"Computer Fraud & Security Bulletin","volume":"1995 11","pages":"Pages 17-18"},"PeriodicalIF":0.0,"publicationDate":"1995-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/0142-0496(95)80077-8","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76615973","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Initiatives against chip thieves 打击芯片窃贼的措施
Computer Fraud & Security Bulletin Pub Date : 1995-11-01 DOI: 10.1016/0142-0496(95)80057-3
{"title":"Initiatives against chip thieves","authors":"","doi":"10.1016/0142-0496(95)80057-3","DOIUrl":"https://doi.org/10.1016/0142-0496(95)80057-3","url":null,"abstract":"","PeriodicalId":100312,"journal":{"name":"Computer Fraud & Security Bulletin","volume":"1995 11","pages":"Page 4"},"PeriodicalIF":0.0,"publicationDate":"1995-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/0142-0496(95)80057-3","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136937855","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Combatting the spread of calling-card and telephone fraud 打击电话卡和电话诈骗的蔓延
Computer Fraud & Security Bulletin Pub Date : 1995-11-01 DOI: 10.1016/0142-0496(95)80078-6
Michael McCormack
{"title":"Combatting the spread of calling-card and telephone fraud","authors":"Michael McCormack","doi":"10.1016/0142-0496(95)80078-6","DOIUrl":"10.1016/0142-0496(95)80078-6","url":null,"abstract":"<div><p>AT&amp;T's Services corporate security manager has called for more cooperation between nations to combat the spread of calling-card and telephone fraud. Richard Petillo said that the spate of recent European arrests for phone-related offences showed that combined international enforcement efforts could make a dent in fraud.</p></div>","PeriodicalId":100312,"journal":{"name":"Computer Fraud & Security Bulletin","volume":"1995 11","pages":"Page 19"},"PeriodicalIF":0.0,"publicationDate":"1995-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/0142-0496(95)80078-6","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89062416","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The curtain drops on US supercomputer export restrictions 美国超级计算机出口限制落下帷幕
Computer Fraud & Security Bulletin Pub Date : 1995-11-01 DOI: 10.1016/0142-0496(95)80072-7
Cynthia Bournellis
{"title":"The curtain drops on US supercomputer export restrictions","authors":"Cynthia Bournellis","doi":"10.1016/0142-0496(95)80072-7","DOIUrl":"10.1016/0142-0496(95)80072-7","url":null,"abstract":"","PeriodicalId":100312,"journal":{"name":"Computer Fraud & Security Bulletin","volume":"1995 11","pages":"Page 9"},"PeriodicalIF":0.0,"publicationDate":"1995-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/0142-0496(95)80072-7","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88469239","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Windows 95 security bug fix 修复了Windows 95的安全漏洞
Computer Fraud & Security Bulletin Pub Date : 1995-11-01 DOI: 10.1016/0142-0496(95)80062-X
{"title":"Windows 95 security bug fix","authors":"","doi":"10.1016/0142-0496(95)80062-X","DOIUrl":"https://doi.org/10.1016/0142-0496(95)80062-X","url":null,"abstract":"","PeriodicalId":100312,"journal":{"name":"Computer Fraud & Security Bulletin","volume":"1995 11","pages":"Page 6"},"PeriodicalIF":0.0,"publicationDate":"1995-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/0142-0496(95)80062-X","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136859209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Divided camps stall electronic commerce 分裂的阵营阻碍了电子商务
Computer Fraud & Security Bulletin Pub Date : 1995-11-01 DOI: 10.1016/0142-0496(95)80074-3
Thomas Kaneshige
{"title":"Divided camps stall electronic commerce","authors":"Thomas Kaneshige","doi":"10.1016/0142-0496(95)80074-3","DOIUrl":"10.1016/0142-0496(95)80074-3","url":null,"abstract":"","PeriodicalId":100312,"journal":{"name":"Computer Fraud & Security Bulletin","volume":"1995 11","pages":"Page 10"},"PeriodicalIF":0.0,"publicationDate":"1995-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/0142-0496(95)80074-3","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73894889","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
New operating systems and old viruses 新的操作系统和旧的病毒
Computer Fraud & Security Bulletin Pub Date : 1995-11-01 DOI: 10.1016/0142-0496(95)80075-1
Dr Jan Hruska
{"title":"New operating systems and old viruses","authors":"Dr Jan Hruska","doi":"10.1016/0142-0496(95)80075-1","DOIUrl":"https://doi.org/10.1016/0142-0496(95)80075-1","url":null,"abstract":"<div><p>A large majority of viruses today are written for DOS running on IBM PCs and compatibles. The advent of new 32-bit operating systems and their eventual widespread use will have a major impact on the type of future viruses. This article discusses the impact of the current crop of 7000 DOS viruses on the new operating systems, looks at the new cross-platform WinWord.Concept macro virus and analyses some security implications of easy networking.</p></div>","PeriodicalId":100312,"journal":{"name":"Computer Fraud & Security Bulletin","volume":"1995 11","pages":"Pages 11-14"},"PeriodicalIF":0.0,"publicationDate":"1995-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/0142-0496(95)80075-1","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136908960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信