Infosecurity最新文献

筛选
英文 中文
Breaking the Online Bank 破解网上银行
Infosecurity Pub Date : 2011-09-01 DOI: 10.1016/S1754-4548(11)70068-7
Ted Kritsonis
{"title":"Breaking the Online Bank","authors":"Ted Kritsonis","doi":"10.1016/S1754-4548(11)70068-7","DOIUrl":"10.1016/S1754-4548(11)70068-7","url":null,"abstract":"<div><p>As technology and online behaviors change, so too do methods to compromise a person's — or organization's — most vital assets: their financial details. <strong>Ted Kritsonis</strong> examines how cyber thieves are adapting, and what the banks are doing to stop them</p></div>","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 5","pages":"Pages 36-39"},"PeriodicalIF":0.0,"publicationDate":"2011-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70068-7","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"96806499","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security Vendors: Trend-Setters, or Trend Followers? 安全供应商:潮流引领者还是潮流跟随者?
Infosecurity Pub Date : 2011-07-01 DOI: 10.1016/S1754-4548(11)70053-5
Danny Bradbury
{"title":"Security Vendors: Trend-Setters, or Trend Followers?","authors":"Danny Bradbury","doi":"10.1016/S1754-4548(11)70053-5","DOIUrl":"10.1016/S1754-4548(11)70053-5","url":null,"abstract":"<div><p>How far ahead of the curve – or behind it – are vendors when it comes to identifying security trends? <strong>Danny Bradbury</strong> finds out that the curve may not matter at all</p></div>","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 4","pages":"Pages 32-35"},"PeriodicalIF":0.0,"publicationDate":"2011-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70053-5","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"110913112","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Truth About DLP DLP的真相
Infosecurity Pub Date : 2011-07-01 DOI: 10.1016/S1754-4548(11)70049-3
Stephen Prichard
{"title":"The Truth About DLP","authors":"Stephen Prichard","doi":"10.1016/S1754-4548(11)70049-3","DOIUrl":"10.1016/S1754-4548(11)70049-3","url":null,"abstract":"<div><p><span>Data loss prevention: the term that fills marketing managers with joy, and infosec managers with dread. Preventing a data leak may be the top priority for the IT security team, but is DLP technology mature, and cost effective enough, to be the answer? </span><strong>Stephen Pritchard</strong> reports</p></div>","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 4","pages":"Pages 18-21"},"PeriodicalIF":0.0,"publicationDate":"2011-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70049-3","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88180992","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
AV: Life in the Old Dog? AV:《老狗的生活》?
Infosecurity Pub Date : 2011-07-01 DOI: 10.1016/S1754-4548(11)70050-X
Cath Everett
{"title":"AV: Life in the Old Dog?","authors":"Cath Everett","doi":"10.1016/S1754-4548(11)70050-X","DOIUrl":"10.1016/S1754-4548(11)70050-X","url":null,"abstract":"<div><p>Once upon a time, anti-virus technology was a well-coveted standalone product. These days, it is often considered a commodity that can be adequately built into a UTM offering. <strong>Cath Everett</strong> investigates whether or not a market for standalone anti-virus technology still exists</p></div>","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 4","pages":"Pages 22-25"},"PeriodicalIF":0.0,"publicationDate":"2011-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70050-X","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80611469","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Come Together 聚在一起
Infosecurity Pub Date : 2011-07-01 DOI: 10.1016/S1754-4548(11)70045-6
Eleanor Dallaway (Editor)
{"title":"Come Together","authors":"Eleanor Dallaway (Editor)","doi":"10.1016/S1754-4548(11)70045-6","DOIUrl":"https://doi.org/10.1016/S1754-4548(11)70045-6","url":null,"abstract":"<div><p>My last editorial was all about change. I wrote that uncertainty was the biggest certainty we have in this industry, and to (bizarrely) quote myself, “Change will happen, and it will do so because whatever preceded ‘it’ was imperfect”. In the two months since the May/June issue was published, <em>Infosecurity</em> magazine has been through some exciting changes of its own.</p></div>","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 4","pages":"Page 5"},"PeriodicalIF":0.0,"publicationDate":"2011-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70045-6","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136459179","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cashing in on Security Training 利用安全培训赚钱
Infosecurity Pub Date : 2011-07-01 DOI: 10.1016/S1754-4548(11)70051-1
{"title":"Cashing in on Security Training","authors":"","doi":"10.1016/S1754-4548(11)70051-1","DOIUrl":"https://doi.org/10.1016/S1754-4548(11)70051-1","url":null,"abstract":"<div><p>At long last, a cybersecurity career field has emerged. The <strong>(ISC)<sup>2</sup> US Government Advisory Board Executive Writers Bureau</strong> examines where employment opportunities lie and how much you can expect to be paid in this very important sector</p></div>","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 4","pages":"Pages 26-28"},"PeriodicalIF":0.0,"publicationDate":"2011-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70051-1","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136530582","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The State of Smartphone Security 智能手机的安全状况
Infosecurity Pub Date : 2011-07-01 DOI: 10.1016/S1754-4548(11)70054-7
Davey Winder
{"title":"The State of Smartphone Security","authors":"Davey Winder","doi":"10.1016/S1754-4548(11)70054-7","DOIUrl":"10.1016/S1754-4548(11)70054-7","url":null,"abstract":"<div><p>An awful lot of lip service has been paid to smartphone security. Whereas most industry experts agree that, to date at least, smartphone security threats are mainly hype, that doesn't mean this won't change. <strong>Davey Winder</strong> investigates…</p></div>","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 4","pages":"Pages 36-39"},"PeriodicalIF":0.0,"publicationDate":"2011-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70054-7","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77544698","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Biometrics: How and Now? 生物识别技术:如何以及现在?
Infosecurity Pub Date : 2011-07-01 DOI: 10.1016/S1754-4548(11)70048-1
Esther Shein
{"title":"Biometrics: How and Now?","authors":"Esther Shein","doi":"10.1016/S1754-4548(11)70048-1","DOIUrl":"10.1016/S1754-4548(11)70048-1","url":null,"abstract":"<div><p><span>Using biometric data<span> for identity access and management can be a controversial move. </span></span><strong>Esther Shein</strong><span> examines the drawbacks, and looks at where and how biometrics are currently being used</span></p></div>","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 4","pages":"Pages 14-17"},"PeriodicalIF":0.0,"publicationDate":"2011-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70048-1","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75986832","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Nice Idea, Shame About the Outcome 好主意,可惜结果不好
Infosecurity Pub Date : 2011-07-01 DOI: 10.1016/S1754-4548(11)70056-0
Hugh H. Penri-Williams
{"title":"Nice Idea, Shame About the Outcome","authors":"Hugh H. Penri-Williams","doi":"10.1016/S1754-4548(11)70056-0","DOIUrl":"10.1016/S1754-4548(11)70056-0","url":null,"abstract":"","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 4","pages":"Page 45"},"PeriodicalIF":0.0,"publicationDate":"2011-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70056-0","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"99764276","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Rotting Apple 腐烂的苹果
Infosecurity Pub Date : 2011-07-01 DOI: 10.1016/S1754-4548(11)70046-8
Drew Amorosi
{"title":"Rotting Apple","authors":"Drew Amorosi","doi":"10.1016/S1754-4548(11)70046-8","DOIUrl":"https://doi.org/10.1016/S1754-4548(11)70046-8","url":null,"abstract":"<div><p><span>Vendors, analysts, and commentators alike have long predicted a surge in malware affecting Apple's products. Yet, until recently, these prognostications have failed to materialize. </span><strong>Drew Amorosi</strong> examines recent malware threats to Apple's OS X operating system to find out if this is an anomaly, or a sign of things to come</p></div>","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 4","pages":"Pages 6-9"},"PeriodicalIF":0.0,"publicationDate":"2011-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70046-8","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136493532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信