Infosecurity最新文献

筛选
英文 中文
A Superior Education 优质教育
Infosecurity Pub Date : 2011-11-01 DOI: 10.1016/S1754-4548(11)70085-7
Wendy M. Grossman
{"title":"A Superior Education","authors":"Wendy M. Grossman","doi":"10.1016/S1754-4548(11)70085-7","DOIUrl":"10.1016/S1754-4548(11)70085-7","url":null,"abstract":"<div><p>As the information security industry becomes more coveted, <strong>Wendy M. Grossman</strong> takes a look at the university courses available to aspiring and competing infosec professionals on both sides of the Atlantic</p></div>","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 6","pages":"Pages 40-43"},"PeriodicalIF":0.0,"publicationDate":"2011-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70085-7","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"95387020","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Compliance Strategies – A.K.A. Alphabet Soup 遵从策略——又名字母汤
Infosecurity Pub Date : 2011-11-01 DOI: 10.1016/S1754-4548(11)70080-8
Fred Donovan
{"title":"Compliance Strategies – A.K.A. Alphabet Soup","authors":"Fred Donovan","doi":"10.1016/S1754-4548(11)70080-8","DOIUrl":"10.1016/S1754-4548(11)70080-8","url":null,"abstract":"<div><p>Does your organization follow a recipe, or simply ‘eye-up’ the ingredients to your compliance tick boxes? <strong>Fred Donovan</strong> taste-tests what is often viewed as the unsavory side of the information security profession</p></div>","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 6","pages":"Pages 22-25"},"PeriodicalIF":0.0,"publicationDate":"2011-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70080-8","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83388686","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Infosecurity: Do You Eat Your Own Dog Food? 信息安全:你吃自己的狗粮吗?
Infosecurity Pub Date : 2011-11-01 DOI: 10.1016/S1754-4548(11)70081-X
Davey Winder
{"title":"Infosecurity: Do You Eat Your Own Dog Food?","authors":"Davey Winder","doi":"10.1016/S1754-4548(11)70081-X","DOIUrl":"10.1016/S1754-4548(11)70081-X","url":null,"abstract":"<div><p>How many traffic policemen never exceed the speed limit when off duty? How many vicars don't swear? And how many IT security professionals practice what they preach? No, seriously, do you eat your own dog food? That's the question <strong>Davey Winder</strong> has been asking of infosec professionals in an attempt to determine just how secure security experts really are away from the office</p></div>","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 6","pages":"Pages 26-29"},"PeriodicalIF":0.0,"publicationDate":"2011-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70081-X","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86850340","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Good, the Bad, and the Ugly Insider Threats 好的,坏的,和丑陋的内部威胁
Infosecurity Pub Date : 2011-11-01 DOI: 10.1016/S1754-4548(11)70082-1
The (ISC)2 US Government Advisory Board Executive Writers Bureau
{"title":"The Good, the Bad, and the Ugly Insider Threats","authors":"The (ISC)2 US Government Advisory Board Executive Writers Bureau","doi":"10.1016/S1754-4548(11)70082-1","DOIUrl":"https://doi.org/10.1016/S1754-4548(11)70082-1","url":null,"abstract":"<div><p>Whether intentional or unintentional, insider threats take many forms. <strong>The (ISC)<sup>2</sup> US Government Advisory Board Executive Writers Bureau</strong> examines this dichotomy and how it is being affected by both regulatory considerations, and the rapidly changing technology landscape</p></div>","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 6","pages":"Pages 30-32"},"PeriodicalIF":0.0,"publicationDate":"2011-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70082-1","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"92005152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Diary 日记
Infosecurity Pub Date : 2011-11-01 DOI: 10.1016/S1754-4548(11)70089-4
{"title":"Diary","authors":"","doi":"10.1016/S1754-4548(11)70089-4","DOIUrl":"https://doi.org/10.1016/S1754-4548(11)70089-4","url":null,"abstract":"","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 6","pages":"Page 47"},"PeriodicalIF":0.0,"publicationDate":"2011-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70089-4","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"92086932","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Slack Space 松弛的空间
Infosecurity Pub Date : 2011-11-01 DOI: 10.1016/S1754-4548(11)70090-0
{"title":"Slack Space","authors":"","doi":"10.1016/S1754-4548(11)70090-0","DOIUrl":"https://doi.org/10.1016/S1754-4548(11)70090-0","url":null,"abstract":"","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 6","pages":"Page 48"},"PeriodicalIF":0.0,"publicationDate":"2011-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70090-0","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"92087337","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Chinese State of Denial 中国的否认状态
Infosecurity Pub Date : 2011-11-01 DOI: 10.1016/S1754-4548(11)70076-6
Drew Amorosi
{"title":"Chinese State of Denial","authors":"Drew Amorosi","doi":"10.1016/S1754-4548(11)70076-6","DOIUrl":"10.1016/S1754-4548(11)70076-6","url":null,"abstract":"<div><p>Hackers exist almost anywhere there is an internet connection, yet the Chinese government continues to downplay their existence at home. <strong>Drew Amorosi</strong> takes a journey of enlightenment and seeks the truth</p></div>","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 6","pages":"Pages 4-7"},"PeriodicalIF":0.0,"publicationDate":"2011-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70076-6","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79274925","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Paging Doctor Compliance 传呼医生依从性
Infosecurity Pub Date : 2011-11-01 DOI: 10.1016/S1754-4548(11)70079-1
Esther Shein
{"title":"Paging Doctor Compliance","authors":"Esther Shein","doi":"10.1016/S1754-4548(11)70079-1","DOIUrl":"10.1016/S1754-4548(11)70079-1","url":null,"abstract":"<div><p>With changes to the US healthcare system already underway – albeit at a snail's pace – now is the perfect time to examine how the regulatory and compliance landscape may change with it. <strong>Esther Shein</strong> surveys the sector and seeks the proper prescription</p></div>","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 6","pages":"Pages 16-20"},"PeriodicalIF":0.0,"publicationDate":"2011-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70079-1","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"106174616","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hord Tipton
Infosecurity Pub Date : 2011-11-01 DOI: 10.1016/S1754-4548(11)70078-X
Eleanor Dallaway
{"title":"Hord Tipton","authors":"Eleanor Dallaway","doi":"10.1016/S1754-4548(11)70078-X","DOIUrl":"https://doi.org/10.1016/S1754-4548(11)70078-X","url":null,"abstract":"<div><p>Within only a minute of sitting down with Hord Tipton, executive director of (ISC)<sup>2</sup>, our own <strong>Eleanor Dallaway</strong> knew that the hour she had booked with him would not be adequate. You see, it's impossible to capture the true essence of a man with a career that many can only dream of in 60 minutes. While they may have been short for time, Tipton, however, certainly wasn't short on stories</p></div>","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 6","pages":"Pages 11-14"},"PeriodicalIF":0.0,"publicationDate":"2011-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70078-X","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"92005151","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Phone Hacking Scandal: Who's Getting the Message? 电话窃听丑闻:谁得到了消息?
Infosecurity Pub Date : 2011-11-01 DOI: 10.1016/S1754-4548(11)70084-5
Jim Mortleman
{"title":"Phone Hacking Scandal: Who's Getting the Message?","authors":"Jim Mortleman","doi":"10.1016/S1754-4548(11)70084-5","DOIUrl":"https://doi.org/10.1016/S1754-4548(11)70084-5","url":null,"abstract":"<div><p>In the wake of the tabloid cellphone hacking scandal, have operators really closed all the loopholes that let snoopers intercept our communications? <strong>Jim Mortleman</strong> investigates</p></div>","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 6","pages":"Pages 36-39"},"PeriodicalIF":0.0,"publicationDate":"2011-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70084-5","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"92025894","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信