Infosecurity最新文献

筛选
英文 中文
Mob Mentalities 暴徒的心态
Infosecurity Pub Date : 2011-01-01 DOI: 10.1016/S1754-4548(11)70010-9
Danny Bradbury
{"title":"Mob Mentalities","authors":"Danny Bradbury","doi":"10.1016/S1754-4548(11)70010-9","DOIUrl":"10.1016/S1754-4548(11)70010-9","url":null,"abstract":"<div><p>Many hands may make light work, but do they also introduce more risk? <strong>Danny Bradbury</strong> explores the thorny issue of security in crowdsourced software development</p></div>","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 1","pages":"Pages 38-41"},"PeriodicalIF":0.0,"publicationDate":"2011-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70010-9","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"99969310","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Rewards for Hacking – Good, Bad or Ugly? 黑客的奖励——好、坏还是丑?
Infosecurity Pub Date : 2011-01-01 DOI: 10.1016/S1754-4548(11)70011-0
Anthony Haywood
{"title":"Rewards for Hacking – Good, Bad or Ugly?","authors":"Anthony Haywood","doi":"10.1016/S1754-4548(11)70011-0","DOIUrl":"10.1016/S1754-4548(11)70011-0","url":null,"abstract":"","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 1","pages":"Page 42"},"PeriodicalIF":0.0,"publicationDate":"2011-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70011-0","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"93858906","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Unsporting Espionage 不光明正大的间谍
Infosecurity Pub Date : 2011-01-01 DOI: 10.1016/S1754-4548(11)70008-0
Davey Winder
{"title":"Unsporting Espionage","authors":"Davey Winder","doi":"10.1016/S1754-4548(11)70008-0","DOIUrl":"10.1016/S1754-4548(11)70008-0","url":null,"abstract":"<div><p>With the 2012 Olympics fast approaching, <strong>Davey Winder</strong> takes a look at the growing problem of IP espionage in the big, expensive world of sport…</p></div>","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 1","pages":"Pages 31-33"},"PeriodicalIF":0.0,"publicationDate":"2011-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70008-0","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74575191","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Michael Higgins 迈克尔·希金斯
Infosecurity Pub Date : 2011-01-01 DOI: 10.1016/S1754-4548(11)70003-1
Drew Amorosi
{"title":"Michael Higgins","authors":"Drew Amorosi","doi":"10.1016/S1754-4548(11)70003-1","DOIUrl":"10.1016/S1754-4548(11)70003-1","url":null,"abstract":"<div><p>Easygoing, engaging, and ready with a firm handshake, Michael Higgins of the <em>New York Times</em> bucks the stereotypes when one thinks of how an executive with years of experience in the military and intelligence communities might be perceived. <strong>Drew Amorosi</strong><span> sat down with the news organization's chief security officer to gain insight on how a top-notch media company maintains its defenses</span></p></div>","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 1","pages":"Pages 10-13"},"PeriodicalIF":0.0,"publicationDate":"2011-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70003-1","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83702394","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Keeping Tabs on Your Data's Address 密切关注你的数据地址
Infosecurity Pub Date : 2011-01-01 DOI: 10.1016/S1754-4548(11)70004-3
Stephen Pritchard
{"title":"Keeping Tabs on Your Data's Address","authors":"Stephen Pritchard","doi":"10.1016/S1754-4548(11)70004-3","DOIUrl":"10.1016/S1754-4548(11)70004-3","url":null,"abstract":"<div><p><span>Location, location, location. It's a slogan that has deep meaning for the real estate market, but it also maintains significant relevance to the regulatory and compliance risks associated with cloud computing in the era of globalization. </span><strong>Stephen Pritchard</strong> investigates</p></div>","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 1","pages":"Pages 15-19"},"PeriodicalIF":0.0,"publicationDate":"2011-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70004-3","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80823754","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Look Back and Move Forward 回顾过去,向前迈进
Infosecurity Pub Date : 2011-01-01 DOI: 10.1016/S1754-4548(11)70009-2
Drew Amorosi
{"title":"Look Back and Move Forward","authors":"Drew Amorosi","doi":"10.1016/S1754-4548(11)70009-2","DOIUrl":"10.1016/S1754-4548(11)70009-2","url":null,"abstract":"<div><p>The beginning of a new year is often a time for predictions or, sometimes, reassertions. <strong>Drew Amorosi</strong> revisits past prognostications from <em>Infosecurity</em>'s editorial board to assess its foretelling prowess, examine the year that was 2010, and gather some new projections for 2011 and beyond</p></div>","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 1","pages":"Pages 34-37"},"PeriodicalIF":0.0,"publicationDate":"2011-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70009-2","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"109411444","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security Risks in the Cloud – Reality, or A Broken Record? 云中的安全风险——现实,还是破纪录?
Infosecurity Pub Date : 2011-01-01 DOI: 10.1016/S1754-4548(11)70005-5
Ted Kritsonis
{"title":"Security Risks in the Cloud – Reality, or A Broken Record?","authors":"Ted Kritsonis","doi":"10.1016/S1754-4548(11)70005-5","DOIUrl":"10.1016/S1754-4548(11)70005-5","url":null,"abstract":"<div><p>The cost savings of cloud computing versus the anticipated security risks: it's the broken record that seems to be on continuous loop for security professionals contemplating their stragegy. Ted Kritsonis examines the key considerations</p></div>","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 1","pages":"Pages 20-23"},"PeriodicalIF":0.0,"publicationDate":"2011-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70005-5","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85727463","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
I Guess That's Why They Call it The Blues 我想这就是为什么他们叫它蓝调
Infosecurity Pub Date : 2011-01-01 DOI: 10.1016/S1754-4548(11)70001-8
Eleanor Dallaway (Editor)
{"title":"I Guess That's Why They Call it The Blues","authors":"Eleanor Dallaway (Editor)","doi":"10.1016/S1754-4548(11)70001-8","DOIUrl":"10.1016/S1754-4548(11)70001-8","url":null,"abstract":"<div><p>Each year, January brings many expected happenings and issues; most of which I regard with much disdain. In addition to the post-Christmas blues, the miserable weather, the fast-abandoned new year's resolutions, and the frantic and often misplaced desire to start afresh, it also encourages predictions.</p></div>","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 1","pages":"Page 5"},"PeriodicalIF":0.0,"publicationDate":"2011-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70001-8","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"107193594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The Great Data Center Debate 大数据中心之争
Infosecurity Pub Date : 2011-01-01 DOI: 10.1016/S1754-4548(11)70006-7
Kevin Townsend
{"title":"The Great Data Center Debate","authors":"Kevin Townsend","doi":"10.1016/S1754-4548(11)70006-7","DOIUrl":"10.1016/S1754-4548(11)70006-7","url":null,"abstract":"<div><p>Handing over your data to a cloud provider may appear almost irresistible from a cost perspective, but what about the security and compliance concerns? Kevin Townsend examines both sides of the argument</p></div>","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 1","pages":"Pages 24-27"},"PeriodicalIF":0.0,"publicationDate":"2011-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70006-7","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88410106","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Diary 日记
Infosecurity Pub Date : 2011-01-01 DOI: 10.1016/S1754-4548(11)70015-8
{"title":"Diary","authors":"","doi":"10.1016/S1754-4548(11)70015-8","DOIUrl":"https://doi.org/10.1016/S1754-4548(11)70015-8","url":null,"abstract":"","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 1","pages":"Page 47"},"PeriodicalIF":0.0,"publicationDate":"2011-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70015-8","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"137164204","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信