Computer Fraud & Security Bulletin最新文献

筛选
英文 中文
Joint Action Group fights computer crime 打击电脑犯罪联合行动小组
Computer Fraud & Security Bulletin Pub Date : 1995-11-01 DOI: 10.1016/0142-0496(95)80064-6
{"title":"Joint Action Group fights computer crime","authors":"","doi":"10.1016/0142-0496(95)80064-6","DOIUrl":"https://doi.org/10.1016/0142-0496(95)80064-6","url":null,"abstract":"","PeriodicalId":100312,"journal":{"name":"Computer Fraud & Security Bulletin","volume":"1995 11","pages":"Page 6"},"PeriodicalIF":0.0,"publicationDate":"1995-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/0142-0496(95)80064-6","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136859211","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Internet security code 互联网安全守则
Computer Fraud & Security Bulletin Pub Date : 1995-11-01 DOI: 10.1016/0142-0496(95)80063-8
{"title":"Internet security code","authors":"","doi":"10.1016/0142-0496(95)80063-8","DOIUrl":"https://doi.org/10.1016/0142-0496(95)80063-8","url":null,"abstract":"","PeriodicalId":100312,"journal":{"name":"Computer Fraud & Security Bulletin","volume":"1995 11","pages":"Page 6"},"PeriodicalIF":0.0,"publicationDate":"1995-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/0142-0496(95)80063-8","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136887450","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Keylock Secure protects laptops Keylock Secure保护笔记本电脑
Computer Fraud & Security Bulletin Pub Date : 1995-11-01 DOI: 10.1016/0142-0496(95)80068-9
{"title":"Keylock Secure protects laptops","authors":"","doi":"10.1016/0142-0496(95)80068-9","DOIUrl":"https://doi.org/10.1016/0142-0496(95)80068-9","url":null,"abstract":"","PeriodicalId":100312,"journal":{"name":"Computer Fraud & Security Bulletin","volume":"1995 11","pages":"Page 7"},"PeriodicalIF":0.0,"publicationDate":"1995-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/0142-0496(95)80068-9","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136908959","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Disconnect PCs, it's the only way to be safe 断开电脑,这是唯一安全的方法
Computer Fraud & Security Bulletin Pub Date : 1995-11-01 DOI: 10.1016/0142-0496(95)80051-4
{"title":"Disconnect PCs, it's the only way to be safe","authors":"","doi":"10.1016/0142-0496(95)80051-4","DOIUrl":"https://doi.org/10.1016/0142-0496(95)80051-4","url":null,"abstract":"","PeriodicalId":100312,"journal":{"name":"Computer Fraud & Security Bulletin","volume":"1995 11","pages":"Page 2"},"PeriodicalIF":0.0,"publicationDate":"1995-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/0142-0496(95)80051-4","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91680113","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hire a hacker to test your security 雇一个黑客来测试你的安全性
Computer Fraud & Security Bulletin Pub Date : 1995-11-01 DOI: 10.1016/0142-0496(95)80058-1
{"title":"Hire a hacker to test your security","authors":"","doi":"10.1016/0142-0496(95)80058-1","DOIUrl":"https://doi.org/10.1016/0142-0496(95)80058-1","url":null,"abstract":"","PeriodicalId":100312,"journal":{"name":"Computer Fraud & Security Bulletin","volume":"1995 11","pages":"Page 4"},"PeriodicalIF":0.0,"publicationDate":"1995-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/0142-0496(95)80058-1","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136937854","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The ID-BAR deterrent ID-BAR威慑
Computer Fraud & Security Bulletin Pub Date : 1995-11-01 DOI: 10.1016/0142-0496(95)80066-2
{"title":"The ID-BAR deterrent","authors":"","doi":"10.1016/0142-0496(95)80066-2","DOIUrl":"https://doi.org/10.1016/0142-0496(95)80066-2","url":null,"abstract":"","PeriodicalId":100312,"journal":{"name":"Computer Fraud & Security Bulletin","volume":"1995 11","pages":"Page 7"},"PeriodicalIF":0.0,"publicationDate":"1995-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/0142-0496(95)80066-2","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136887452","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Software licensing compliance from CentaMeter CentaMeter的软件许可合规性
Computer Fraud & Security Bulletin Pub Date : 1995-11-01 DOI: 10.1016/0142-0496(95)80071-9
{"title":"Software licensing compliance from CentaMeter","authors":"","doi":"10.1016/0142-0496(95)80071-9","DOIUrl":"https://doi.org/10.1016/0142-0496(95)80071-9","url":null,"abstract":"","PeriodicalId":100312,"journal":{"name":"Computer Fraud & Security Bulletin","volume":"1995 11","pages":"Page 8"},"PeriodicalIF":0.0,"publicationDate":"1995-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/0142-0496(95)80071-9","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136907985","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fingerprints could prevent credit card fraud 指纹可以防止信用卡诈骗
Computer Fraud & Security Bulletin Pub Date : 1995-11-01 DOI: 10.1016/0142-0496(95)80052-2
{"title":"Fingerprints could prevent credit card fraud","authors":"","doi":"10.1016/0142-0496(95)80052-2","DOIUrl":"https://doi.org/10.1016/0142-0496(95)80052-2","url":null,"abstract":"","PeriodicalId":100312,"journal":{"name":"Computer Fraud & Security Bulletin","volume":"1995 11","pages":"Page 2"},"PeriodicalIF":0.0,"publicationDate":"1995-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/0142-0496(95)80052-2","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91680114","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hertfordshire's computer thieves 赫特福德郡的电脑窃贼
Computer Fraud & Security Bulletin Pub Date : 1995-11-01 DOI: 10.1016/0142-0496(95)80060-3
{"title":"Hertfordshire's computer thieves","authors":"","doi":"10.1016/0142-0496(95)80060-3","DOIUrl":"https://doi.org/10.1016/0142-0496(95)80060-3","url":null,"abstract":"","PeriodicalId":100312,"journal":{"name":"Computer Fraud & Security Bulletin","volume":"1995 11","pages":"Page 5"},"PeriodicalIF":0.0,"publicationDate":"1995-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/0142-0496(95)80060-3","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136859207","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security for data on disks 磁盘上数据的安全性
Computer Fraud & Security Bulletin Pub Date : 1995-11-01 DOI: 10.1016/0142-0496(95)80070-0
{"title":"Security for data on disks","authors":"","doi":"10.1016/0142-0496(95)80070-0","DOIUrl":"https://doi.org/10.1016/0142-0496(95)80070-0","url":null,"abstract":"","PeriodicalId":100312,"journal":{"name":"Computer Fraud & Security Bulletin","volume":"1995 11","pages":"Page 8"},"PeriodicalIF":0.0,"publicationDate":"1995-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/0142-0496(95)80070-0","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136908957","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信