Computer Fraud & Security Bulletin最新文献

筛选
英文 中文
PC security and asset control service 个人电脑安全和资产控制服务
Computer Fraud & Security Bulletin Pub Date : 1995-10-01 DOI: 10.1016/0142-0496(95)80041-7
{"title":"PC security and asset control service","authors":"","doi":"10.1016/0142-0496(95)80041-7","DOIUrl":"https://doi.org/10.1016/0142-0496(95)80041-7","url":null,"abstract":"","PeriodicalId":100312,"journal":{"name":"Computer Fraud & Security Bulletin","volume":"1995 10","pages":"Page 7"},"PeriodicalIF":0.0,"publicationDate":"1995-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/0142-0496(95)80041-7","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"92338753","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Viruses get a day of their own 病毒有自己的一天
Computer Fraud & Security Bulletin Pub Date : 1995-10-01 DOI: 10.1016/0142-0496(95)80044-1
Chris Bucholtz
{"title":"Viruses get a day of their own","authors":"Chris Bucholtz","doi":"10.1016/0142-0496(95)80044-1","DOIUrl":"10.1016/0142-0496(95)80044-1","url":null,"abstract":"","PeriodicalId":100312,"journal":{"name":"Computer Fraud & Security Bulletin","volume":"1995 10","pages":"Page 10"},"PeriodicalIF":0.0,"publicationDate":"1995-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/0142-0496(95)80044-1","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77239896","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Events 事件
Computer Fraud & Security Bulletin Pub Date : 1995-10-01 DOI: 10.1016/0142-0496(95)80050-6
{"title":"Events","authors":"","doi":"10.1016/0142-0496(95)80050-6","DOIUrl":"https://doi.org/10.1016/0142-0496(95)80050-6","url":null,"abstract":"","PeriodicalId":100312,"journal":{"name":"Computer Fraud & Security Bulletin","volume":"1995 10","pages":"Page 20"},"PeriodicalIF":0.0,"publicationDate":"1995-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/0142-0496(95)80050-6","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"137009125","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Trainee hacks tube computer 培训生黑电脑
Computer Fraud & Security Bulletin Pub Date : 1995-10-01 DOI: 10.1016/0142-0496(95)80023-9
{"title":"Trainee hacks tube computer","authors":"","doi":"10.1016/0142-0496(95)80023-9","DOIUrl":"https://doi.org/10.1016/0142-0496(95)80023-9","url":null,"abstract":"","PeriodicalId":100312,"journal":{"name":"Computer Fraud & Security Bulletin","volume":"1995 10","pages":"Page 2"},"PeriodicalIF":0.0,"publicationDate":"1995-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/0142-0496(95)80023-9","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"137009127","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hotel hacker found guilty 酒店黑客被判有罪
Computer Fraud & Security Bulletin Pub Date : 1995-10-01 DOI: 10.1016/0142-0496(95)80024-7
{"title":"Hotel hacker found guilty","authors":"","doi":"10.1016/0142-0496(95)80024-7","DOIUrl":"https://doi.org/10.1016/0142-0496(95)80024-7","url":null,"abstract":"","PeriodicalId":100312,"journal":{"name":"Computer Fraud & Security Bulletin","volume":"1995 10","pages":"Page 2"},"PeriodicalIF":0.0,"publicationDate":"1995-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/0142-0496(95)80024-7","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"137009130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Software to help prevent money laundering 帮助防止洗钱的软件
Computer Fraud & Security Bulletin Pub Date : 1995-10-01 DOI: 10.1016/0142-0496(95)80029-8
{"title":"Software to help prevent money laundering","authors":"","doi":"10.1016/0142-0496(95)80029-8","DOIUrl":"https://doi.org/10.1016/0142-0496(95)80029-8","url":null,"abstract":"","PeriodicalId":100312,"journal":{"name":"Computer Fraud & Security Bulletin","volume":"1995 10","pages":"Page 4"},"PeriodicalIF":0.0,"publicationDate":"1995-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/0142-0496(95)80029-8","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136566681","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The software piracy menace 软件盗版威胁
Computer Fraud & Security Bulletin Pub Date : 1995-10-01 DOI: 10.1016/0142-0496(95)80027-1
{"title":"The software piracy menace","authors":"","doi":"10.1016/0142-0496(95)80027-1","DOIUrl":"https://doi.org/10.1016/0142-0496(95)80027-1","url":null,"abstract":"","PeriodicalId":100312,"journal":{"name":"Computer Fraud & Security Bulletin","volume":"1995 10","pages":"Page 3"},"PeriodicalIF":0.0,"publicationDate":"1995-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/0142-0496(95)80027-1","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136566682","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dirty money in clean systems 肮脏的钱流入干净的系统
Computer Fraud & Security Bulletin Pub Date : 1995-10-01 DOI: 10.1016/0142-0496(95)80048-4
Nigel Morris-Cotterill
{"title":"Dirty money in clean systems","authors":"Nigel Morris-Cotterill","doi":"10.1016/0142-0496(95)80048-4","DOIUrl":"10.1016/0142-0496(95)80048-4","url":null,"abstract":"<div><p>It is said that the laundering of the proceeds of crime is the third biggest industry by value worldwide. In the USA a survey stated that 90% of notes in circulation are tainted with narcotics. Governments all over the world are falling into line and drawing up legislation to control the movement of proceeds of crime. The EC (as it was) in 1991 accepted that it was not possible to control crime by targeting the criminal and that the only way of reducing crime seemed to be try to prevent criminals profiting from their labours. And of course, to profit, the criminal needs to spend money and, wherever money is spent, it sooner or later finds its way into the financial services industry through banking or investments.</p></div>","PeriodicalId":100312,"journal":{"name":"Computer Fraud & Security Bulletin","volume":"1995 10","pages":"Pages 16-18"},"PeriodicalIF":0.0,"publicationDate":"1995-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/0142-0496(95)80048-4","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90477860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security of the software cycle 软件周期的安全性
Computer Fraud & Security Bulletin Pub Date : 1995-10-01 DOI: 10.1016/0142-0496(95)80038-7
{"title":"Security of the software cycle","authors":"","doi":"10.1016/0142-0496(95)80038-7","DOIUrl":"https://doi.org/10.1016/0142-0496(95)80038-7","url":null,"abstract":"","PeriodicalId":100312,"journal":{"name":"Computer Fraud & Security Bulletin","volume":"1995 10","pages":"Page 7"},"PeriodicalIF":0.0,"publicationDate":"1995-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/0142-0496(95)80038-7","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"92234274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
NetWare 4 receives high marks for security NetWare 4在安全性方面得到了很高的评价
Computer Fraud & Security Bulletin Pub Date : 1995-10-01 DOI: 10.1016/0142-0496(95)80043-3
Erin English
{"title":"NetWare 4 receives high marks for security","authors":"Erin English","doi":"10.1016/0142-0496(95)80043-3","DOIUrl":"10.1016/0142-0496(95)80043-3","url":null,"abstract":"","PeriodicalId":100312,"journal":{"name":"Computer Fraud & Security Bulletin","volume":"1995 10","pages":"Pages 9-10"},"PeriodicalIF":0.0,"publicationDate":"1995-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/0142-0496(95)80043-3","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86209712","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信