Infosecurity最新文献

筛选
英文 中文
Phishing for Chips: Why the Online Gambling Industry is Odds-On to Beat Cybercrime 为筹码而钓鱼:为什么在线赌博业很有可能打败网络犯罪
Infosecurity Pub Date : 2011-03-01 DOI: 10.1016/S1754-4548(11)70024-9
Davey Winder
{"title":"Phishing for Chips: Why the Online Gambling Industry is Odds-On to Beat Cybercrime","authors":"Davey Winder","doi":"10.1016/S1754-4548(11)70024-9","DOIUrl":"10.1016/S1754-4548(11)70024-9","url":null,"abstract":"<div><p>While online gamers might not consider information security a priority, online gambling operators are very much aware that their sites are great big targets for cybercriminals<span>. Davey Winder asks what online gaming sites are doing to secure themselves, and their customers, against a rising tide of cybercrime?</span></p></div>","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 2","pages":"Pages 32-34"},"PeriodicalIF":0.0,"publicationDate":"2011-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70024-9","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83743020","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Night Dragon Will not Be Defeated $44.99 at a Time 夜龙不会被打败一次44.99美元
Infosecurity Pub Date : 2011-03-01 DOI: 10.1016/S1754-4548(11)70028-6
Marc Maiffret
{"title":"Night Dragon Will not Be Defeated $44.99 at a Time","authors":"Marc Maiffret","doi":"10.1016/S1754-4548(11)70028-6","DOIUrl":"10.1016/S1754-4548(11)70028-6","url":null,"abstract":"","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 2","pages":"Page 45"},"PeriodicalIF":0.0,"publicationDate":"2011-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70028-6","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89769845","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Diary 日记
Infosecurity Pub Date : 2011-03-01 DOI: 10.1016/S1754-4548(11)70029-8
{"title":"Diary","authors":"","doi":"10.1016/S1754-4548(11)70029-8","DOIUrl":"https://doi.org/10.1016/S1754-4548(11)70029-8","url":null,"abstract":"","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 2","pages":"Page 47"},"PeriodicalIF":0.0,"publicationDate":"2011-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70029-8","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136532709","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
People Are People 人就是人
Infosecurity Pub Date : 2011-03-01 DOI: 10.1016/S1754-4548(11)70017-1
Eleanor Dallaway (Editor)
{"title":"People Are People","authors":"Eleanor Dallaway (Editor)","doi":"10.1016/S1754-4548(11)70017-1","DOIUrl":"10.1016/S1754-4548(11)70017-1","url":null,"abstract":"<div><p>Over the past few months, I've probably talked to around fifty information security professionals. In 90% of cases, the topic of discussion was technology. The exceptions to the rule – and thus my most memorable discussions – included my time spent with John Colley, (ISC)<sup>2</sup>, and Martin Smith, The Security Company.</p></div>","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 2","pages":"Page 5"},"PeriodicalIF":0.0,"publicationDate":"2011-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70017-1","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80645593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Cybercrime Knows No Borders 网络犯罪不分国界
Infosecurity Pub Date : 2011-03-01 DOI: 10.1016/S1754-4548(11)70021-3
Lauren Moraski
{"title":"Cybercrime Knows No Borders","authors":"Lauren Moraski","doi":"10.1016/S1754-4548(11)70021-3","DOIUrl":"10.1016/S1754-4548(11)70021-3","url":null,"abstract":"<div><p>Prosecuting cybercrime is no easy task. Even with today's forensic capabilities, legal inadequacies in various jurisdictions, not to mention uneven enforcement, make stemming the tide a rather daunting task. Lauren Moraski reports on the complications</p></div>","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 2","pages":"Pages 20-23"},"PeriodicalIF":0.0,"publicationDate":"2011-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70021-3","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81084403","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
John Colley 约翰·考利
Infosecurity Pub Date : 2011-03-01 DOI: 10.1016/S1754-4548(11)70019-5
Eleanor Dallaway
{"title":"John Colley","authors":"Eleanor Dallaway","doi":"10.1016/S1754-4548(11)70019-5","DOIUrl":"10.1016/S1754-4548(11)70019-5","url":null,"abstract":"<div><p>You'd be hard pressed to find anyone in the UK infosec industry who doesn't know of John Colley. He is to infosec what Simon Cowell is to the music industry – a true figurehead (albeit, less scary). He doesn't attribute his high profile to his impressive CV though – instead, as Eleanor Dallaway finds out, he believes it to be the result of his networking with helpful peers over the years</p></div>","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 2","pages":"Pages 10-13"},"PeriodicalIF":0.0,"publicationDate":"2011-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70019-5","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90522560","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
WikiLeaks ‘Cablegate’ Dominates Year-End Headlines 维基解密“电文”占据了年终头条
Infosecurity Pub Date : 2011-01-01 DOI: 10.1016/S1754-4548(11)70002-X
Drew Amorosi
{"title":"WikiLeaks ‘Cablegate’ Dominates Year-End Headlines","authors":"Drew Amorosi","doi":"10.1016/S1754-4548(11)70002-X","DOIUrl":"10.1016/S1754-4548(11)70002-X","url":null,"abstract":"<div><p><strong>Drew Amorosi</strong> recounts the events surrounding WikiLeaks' publication of thousands of confidential US diplomatic cables that recently garnered so much international attention, and takes a look at the political fallout.</p></div>","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 1","pages":"Pages 6-9"},"PeriodicalIF":0.0,"publicationDate":"2011-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70002-X","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88059860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The Dirty Secrets of Green IT 绿色IT的肮脏秘密
Infosecurity Pub Date : 2011-01-01 DOI: 10.1016/S1754-4548(11)70007-9
Wendy M. Grossman
{"title":"The Dirty Secrets of Green IT","authors":"Wendy M. Grossman","doi":"10.1016/S1754-4548(11)70007-9","DOIUrl":"10.1016/S1754-4548(11)70007-9","url":null,"abstract":"<div><p>The recent push to save the planet from environmental catastrophe in some quarters has dovetailed nicely with organizations' need to pare down budgets – making for some nice PR. But, as <strong>Wendy M. Grossman</strong> demonstrates, hiding behind some ‘green’ initiatives are increased security risks</p></div>","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 1","pages":"Pages 28-30"},"PeriodicalIF":0.0,"publicationDate":"2011-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70007-9","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"98102074","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Slack Space 松弛的空间
Infosecurity Pub Date : 2011-01-01 DOI: 10.1016/S1754-4548(11)70016-X
{"title":"Slack Space","authors":"","doi":"10.1016/S1754-4548(11)70016-X","DOIUrl":"https://doi.org/10.1016/S1754-4548(11)70016-X","url":null,"abstract":"","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 1","pages":"Page 48"},"PeriodicalIF":0.0,"publicationDate":"2011-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70016-X","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"137083473","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Brand New Old Classic 一个全新的老经典
Infosecurity Pub Date : 2011-01-01 DOI: 10.1016/S1754-4548(11)70014-6
Raj Samani
{"title":"A Brand New Old Classic","authors":"Raj Samani","doi":"10.1016/S1754-4548(11)70014-6","DOIUrl":"10.1016/S1754-4548(11)70014-6","url":null,"abstract":"","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 1","pages":"Page 46"},"PeriodicalIF":0.0,"publicationDate":"2011-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70014-6","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90612831","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信