Computer Fraud & Security Bulletin最新文献

筛选
英文 中文
The IBM virus antidote IBM病毒解毒剂
Computer Fraud & Security Bulletin Pub Date : 1995-10-01 DOI: 10.1016/0142-0496(95)80036-0
{"title":"The IBM virus antidote","authors":"","doi":"10.1016/0142-0496(95)80036-0","DOIUrl":"https://doi.org/10.1016/0142-0496(95)80036-0","url":null,"abstract":"","PeriodicalId":100312,"journal":{"name":"Computer Fraud & Security Bulletin","volume":"1995 10","pages":"Page 6"},"PeriodicalIF":0.0,"publicationDate":"1995-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/0142-0496(95)80036-0","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"92214663","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
£2 million counterfeit software and chips haul 查获价值200万英镑的盗版软件和芯片
Computer Fraud & Security Bulletin Pub Date : 1995-10-01 DOI: 10.1016/0142-0496(95)80026-3
{"title":"£2 million counterfeit software and chips haul","authors":"","doi":"10.1016/0142-0496(95)80026-3","DOIUrl":"https://doi.org/10.1016/0142-0496(95)80026-3","url":null,"abstract":"","PeriodicalId":100312,"journal":{"name":"Computer Fraud & Security Bulletin","volume":"1995 10","pages":"Page 3"},"PeriodicalIF":0.0,"publicationDate":"1995-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/0142-0496(95)80026-3","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"137009128","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
French lottery protected from hackers 法国彩票免受黑客攻击
Computer Fraud & Security Bulletin Pub Date : 1995-10-01 DOI: 10.1016/0142-0496(95)80040-9
{"title":"French lottery protected from hackers","authors":"","doi":"10.1016/0142-0496(95)80040-9","DOIUrl":"https://doi.org/10.1016/0142-0496(95)80040-9","url":null,"abstract":"","PeriodicalId":100312,"journal":{"name":"Computer Fraud & Security Bulletin","volume":"1995 10","pages":"Page 7"},"PeriodicalIF":0.0,"publicationDate":"1995-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/0142-0496(95)80040-9","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"137009126","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Lawless cyberspace frustrates police 无法无天的网络空间让警方感到沮丧
Computer Fraud & Security Bulletin Pub Date : 1995-10-01 DOI: 10.1016/0142-0496(95)80028-X
{"title":"Lawless cyberspace frustrates police","authors":"","doi":"10.1016/0142-0496(95)80028-X","DOIUrl":"https://doi.org/10.1016/0142-0496(95)80028-X","url":null,"abstract":"","PeriodicalId":100312,"journal":{"name":"Computer Fraud & Security Bulletin","volume":"1995 10","pages":"Page 4"},"PeriodicalIF":0.0,"publicationDate":"1995-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/0142-0496(95)80028-X","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136566680","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The growing business of chip theft 不断增长的芯片盗窃业务
Computer Fraud & Security Bulletin Pub Date : 1995-10-01 DOI: 10.1016/0142-0496(95)80049-2
Michael McCormack
{"title":"The growing business of chip theft","authors":"Michael McCormack","doi":"10.1016/0142-0496(95)80049-2","DOIUrl":"10.1016/0142-0496(95)80049-2","url":null,"abstract":"<div><p>Chip theft is, without a doubt, the fastest growing area of computer-related crime, causing losses in excess of £200 million to British businesses in 1994. This year, insurance industry watchdogs fear, that figure may double.</p></div>","PeriodicalId":100312,"journal":{"name":"Computer Fraud & Security Bulletin","volume":"1995 10","pages":"Pages 19-20"},"PeriodicalIF":0.0,"publicationDate":"1995-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/0142-0496(95)80049-2","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74004003","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The ebridge project ebridge项目
Computer Fraud & Security Bulletin Pub Date : 1995-10-01 DOI: 10.1016/0142-0496(95)80047-6
R.P.J. Winsborrow
{"title":"The ebridge project","authors":"R.P.J. Winsborrow","doi":"10.1016/0142-0496(95)80047-6","DOIUrl":"10.1016/0142-0496(95)80047-6","url":null,"abstract":"<div><p>In many organizations and government administrations, electronic documents are opening the way to faster and more efficient ways of doing business. In fact, electronic information exchange, far from being considered a luxury, is increasingly seen as a staple requirement for survival in today's competitive environment. The increasing use of EDI is a good example of this reality. Another is the development over the past few years of an increasing variety of pan-European information services. The growth in these services is being driven in part by the increasing globalization of trade and by the needs of the Single Market within the European Union. However, the provision of information services on a pan-European basis raises many issues from a security perspective. This article provides an overview of one of these pan-European information services and the steps that have been taken to improve its operational security within the context of the EC-sponsored ebridge project.</p></div>","PeriodicalId":100312,"journal":{"name":"Computer Fraud & Security Bulletin","volume":"1995 10","pages":"Pages 12-15"},"PeriodicalIF":0.0,"publicationDate":"1995-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/0142-0496(95)80047-6","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75311291","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Insurers fight chip theft 保险公司打击芯片盗窃
Computer Fraud & Security Bulletin Pub Date : 1995-10-01 DOI: 10.1016/0142-0496(95)80030-1
{"title":"Insurers fight chip theft","authors":"","doi":"10.1016/0142-0496(95)80030-1","DOIUrl":"https://doi.org/10.1016/0142-0496(95)80030-1","url":null,"abstract":"","PeriodicalId":100312,"journal":{"name":"Computer Fraud & Security Bulletin","volume":"1995 10","pages":"Page 5"},"PeriodicalIF":0.0,"publicationDate":"1995-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/0142-0496(95)80030-1","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"137009131","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Exceptionally virulent rainbows 毒性极强的彩虹
Computer Fraud & Security Bulletin Pub Date : 1995-10-01 DOI: 10.1016/0142-0496(95)80035-2
{"title":"Exceptionally virulent rainbows","authors":"","doi":"10.1016/0142-0496(95)80035-2","DOIUrl":"https://doi.org/10.1016/0142-0496(95)80035-2","url":null,"abstract":"","PeriodicalId":100312,"journal":{"name":"Computer Fraud & Security Bulletin","volume":"1995 10","pages":"Page 6"},"PeriodicalIF":0.0,"publicationDate":"1995-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/0142-0496(95)80035-2","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"92234290","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
BSkyB code cracked 英国天空广播公司代码破解
Computer Fraud & Security Bulletin Pub Date : 1995-09-01 DOI: 10.1016/0142-0496(95)80238-X
{"title":"BSkyB code cracked","authors":"","doi":"10.1016/0142-0496(95)80238-X","DOIUrl":"https://doi.org/10.1016/0142-0496(95)80238-X","url":null,"abstract":"","PeriodicalId":100312,"journal":{"name":"Computer Fraud & Security Bulletin","volume":"1995 9","pages":"Page 1"},"PeriodicalIF":0.0,"publicationDate":"1995-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/0142-0496(95)80238-X","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72267256","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
New intellectual property and the need for information security 新知识产权与信息安全的需要
Computer Fraud & Security Bulletin Pub Date : 1995-09-01 DOI: 10.1016/0142-0496(95)80255-X
{"title":"New intellectual property and the need for information security","authors":"","doi":"10.1016/0142-0496(95)80255-X","DOIUrl":"https://doi.org/10.1016/0142-0496(95)80255-X","url":null,"abstract":"","PeriodicalId":100312,"journal":{"name":"Computer Fraud & Security Bulletin","volume":"1995 9","pages":"Pages 18-19"},"PeriodicalIF":0.0,"publicationDate":"1995-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/0142-0496(95)80255-X","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72267258","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信