Infosecurity最新文献

筛选
英文 中文
Year of the Hack 黑客年
Infosecurity Pub Date : 2011-11-01 DOI: 10.1016/S1754-4548(11)70077-8
Fred Donovan
{"title":"Year of the Hack","authors":"Fred Donovan","doi":"10.1016/S1754-4548(11)70077-8","DOIUrl":"10.1016/S1754-4548(11)70077-8","url":null,"abstract":"<div><p>Commonly referred to as the year of the hack, it is no secret what 2011 has become famous for in the information security industry. This year's headlines, reports <strong>Fred Donovan</strong>, have been made up of data breaches, hacks, APT attacks and mergers and acquisitions</p></div>","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 6","pages":"Pages 8-10"},"PeriodicalIF":0.0,"publicationDate":"2011-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70077-8","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85263625","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Encryption's Weakest Link 加密的最薄弱环节
Infosecurity Pub Date : 2011-11-01 DOI: 10.1016/S1754-4548(11)70086-9
Matthew Pascucci
{"title":"Encryption's Weakest Link","authors":"Matthew Pascucci","doi":"10.1016/S1754-4548(11)70086-9","DOIUrl":"10.1016/S1754-4548(11)70086-9","url":null,"abstract":"","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 6","pages":"Page 44"},"PeriodicalIF":0.0,"publicationDate":"2011-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70086-9","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75133441","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Can Security and Privacy Co-exist? 安全和隐私可以共存吗?
Infosecurity Pub Date : 2011-11-01 DOI: 10.1016/S1754-4548(11)70083-3
Danny Bradbury
{"title":"Can Security and Privacy Co-exist?","authors":"Danny Bradbury","doi":"10.1016/S1754-4548(11)70083-3","DOIUrl":"10.1016/S1754-4548(11)70083-3","url":null,"abstract":"<div><p>Should you have to give up privacy to get more security, or does one actually support the other? <strong>Danny Bradbury</strong> sounds out the experts</p></div>","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 6","pages":"Pages 33-35"},"PeriodicalIF":0.0,"publicationDate":"2011-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70083-3","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91430429","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Breaching through Congress 突破国会
Infosecurity Pub Date : 2011-11-01 DOI: 10.1016/S1754-4548(11)70088-2
Richard Moulds
{"title":"Breaching through Congress","authors":"Richard Moulds","doi":"10.1016/S1754-4548(11)70088-2","DOIUrl":"https://doi.org/10.1016/S1754-4548(11)70088-2","url":null,"abstract":"","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 6","pages":"Page 46"},"PeriodicalIF":0.0,"publicationDate":"2011-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70088-2","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"92087335","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Almost What it Says on the Tin 就像罐头上写的一样
Infosecurity Pub Date : 2011-11-01 DOI: 10.1016/S1754-4548(11)70087-0
Sarb Sembhi
{"title":"Almost What it Says on the Tin","authors":"Sarb Sembhi","doi":"10.1016/S1754-4548(11)70087-0","DOIUrl":"https://doi.org/10.1016/S1754-4548(11)70087-0","url":null,"abstract":"","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 6","pages":"Page 45"},"PeriodicalIF":0.0,"publicationDate":"2011-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70087-0","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"92087336","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Moving on Up 继续前进
Infosecurity Pub Date : 2011-11-01 DOI: 10.1016/S1754-4548(11)70075-4
Eleanor Dallaway (Editor)
{"title":"Moving on Up","authors":"Eleanor Dallaway (Editor)","doi":"10.1016/S1754-4548(11)70075-4","DOIUrl":"10.1016/S1754-4548(11)70075-4","url":null,"abstract":"<div><p>Within industry circles, 2011 has become known as the year of the hack, or the year of the black hat if you prefer. Game-changing malware has exploded, proving that the critical national infrastructure is under threat and that cyber war and cyber espionage are very daunting realities.</p></div>","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 6","pages":"Page 3"},"PeriodicalIF":0.0,"publicationDate":"2011-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70075-4","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89591080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Breaches in Billable Hours 违反计费时间
Infosecurity Pub Date : 2011-09-01 DOI: 10.1016/S1754-4548(11)70072-9
Marco Cremonini
{"title":"Breaches in Billable Hours","authors":"Marco Cremonini","doi":"10.1016/S1754-4548(11)70072-9","DOIUrl":"10.1016/S1754-4548(11)70072-9","url":null,"abstract":"","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 5","pages":"Page 46"},"PeriodicalIF":0.0,"publicationDate":"2011-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70072-9","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"105623634","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Crossing Borders: The Right Side of Wrong? 跨越国界:错误的正确一面?
Infosecurity Pub Date : 2011-09-01 DOI: 10.1016/S1754-4548(11)70065-1
Wendy M. Grossman
{"title":"Crossing Borders: The Right Side of Wrong?","authors":"Wendy M. Grossman","doi":"10.1016/S1754-4548(11)70065-1","DOIUrl":"10.1016/S1754-4548(11)70065-1","url":null,"abstract":"<div><p>Most nations consider travel data to be crucial to protecting national security. How that data is collected, stored, and secured however seems to be a closely guarded secret. <strong>Wendy M. Grossman</strong> investigates</p></div>","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 5","pages":"Pages 22-25"},"PeriodicalIF":0.0,"publicationDate":"2011-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70065-1","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"112890616","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Patricia Titus 帕特丽夏提多
Infosecurity Pub Date : 2011-09-01 DOI: 10.1016/S1754-4548(11)70062-6
Drew Amorosi
{"title":"Patricia Titus","authors":"Drew Amorosi","doi":"10.1016/S1754-4548(11)70062-6","DOIUrl":"https://doi.org/10.1016/S1754-4548(11)70062-6","url":null,"abstract":"<div><p>The road from Minnesota to Washington has many stops, especially when you take the scenic route. <strong>Drew Amorosi</strong> recently met Patricia Titus of Unisys to regale in her remarkable journey</p></div>","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 5","pages":"Pages 9-12"},"PeriodicalIF":0.0,"publicationDate":"2011-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70062-6","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136736069","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Diary 日记
Infosecurity Pub Date : 2011-09-01 DOI: 10.1016/S1754-4548(11)70073-0
{"title":"Diary","authors":"","doi":"10.1016/S1754-4548(11)70073-0","DOIUrl":"https://doi.org/10.1016/S1754-4548(11)70073-0","url":null,"abstract":"","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 5","pages":"Page 47"},"PeriodicalIF":0.0,"publicationDate":"2011-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70073-0","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"137401569","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信