Infosecurity TodayPub Date : 2006-05-01DOI: 10.1016/S1742-6847(06)70402-5
SA Mathieson
{"title":"Ecrime at Infosecurity Europe 2006","authors":"SA Mathieson","doi":"10.1016/S1742-6847(06)70402-5","DOIUrl":"10.1016/S1742-6847(06)70402-5","url":null,"abstract":"<div><p>Tony Neate was not to know it when he spoke at the Infosecurity Europe exhibition on 25 April, but his ultimate boss was 10 days away from being fired.</p></div>","PeriodicalId":100673,"journal":{"name":"Infosecurity Today","volume":"3 3","pages":"Page 8"},"PeriodicalIF":0.0,"publicationDate":"2006-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1742-6847(06)70402-5","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80700466","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Infosecurity TodayPub Date : 2006-03-01DOI: 10.1016/S1742-6847(06)70376-7
SA Mathieson
{"title":"Commissioner tells CeBit that privacy is RFID concern","authors":"SA Mathieson","doi":"10.1016/S1742-6847(06)70376-7","DOIUrl":"https://doi.org/10.1016/S1742-6847(06)70376-7","url":null,"abstract":"","PeriodicalId":100673,"journal":{"name":"Infosecurity Today","volume":"3 2","pages":"Page 8"},"PeriodicalIF":0.0,"publicationDate":"2006-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1742-6847(06)70376-7","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91588441","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Infosecurity TodayPub Date : 2006-03-01DOI: 10.1016/S1742-6847(06)70375-5
{"title":"Designing for security at the University of Oxford","authors":"","doi":"10.1016/S1742-6847(06)70375-5","DOIUrl":"https://doi.org/10.1016/S1742-6847(06)70375-5","url":null,"abstract":"","PeriodicalId":100673,"journal":{"name":"Infosecurity Today","volume":"3 2","pages":"Page 8"},"PeriodicalIF":0.0,"publicationDate":"2006-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1742-6847(06)70375-5","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91599731","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Infosecurity TodayPub Date : 2006-03-01DOI: 10.1016/S1742-6847(06)70378-0
SA Mathieson
{"title":"Security less problematic than IT staffing","authors":"SA Mathieson","doi":"10.1016/S1742-6847(06)70378-0","DOIUrl":"https://doi.org/10.1016/S1742-6847(06)70378-0","url":null,"abstract":"","PeriodicalId":100673,"journal":{"name":"Infosecurity Today","volume":"3 2","pages":"Page 10"},"PeriodicalIF":0.0,"publicationDate":"2006-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1742-6847(06)70378-0","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91760978","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Infosecurity TodayPub Date : 2006-03-01DOI: 10.1016/S1742-6847(06)70389-5
Danny Bradbury
{"title":"Words and things","authors":"Danny Bradbury","doi":"10.1016/S1742-6847(06)70389-5","DOIUrl":"10.1016/S1742-6847(06)70389-5","url":null,"abstract":"<div><p>The infosec industry has its work cut out in standardizing the vocabulary and metrics of security vulnerabilities. Danny Bradbury reports.</p></div>","PeriodicalId":100673,"journal":{"name":"Infosecurity Today","volume":"3 2","pages":"Pages 42-43"},"PeriodicalIF":0.0,"publicationDate":"2006-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1742-6847(06)70389-5","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79720648","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Infosecurity TodayPub Date : 2006-03-01DOI: 10.1016/S1742-6847(06)70381-0
Sarah Hilley
{"title":"Cisco gets physical with video surveillance camera acquisition","authors":"Sarah Hilley","doi":"10.1016/S1742-6847(06)70381-0","DOIUrl":"10.1016/S1742-6847(06)70381-0","url":null,"abstract":"<div><p>Will Cisco's acquisition of video surveillance company SyPixx kick start the long anticipated convergence of IT security and physical security? Sarah Hilley reports.</p></div>","PeriodicalId":100673,"journal":{"name":"Infosecurity Today","volume":"3 2","pages":"Page 11"},"PeriodicalIF":0.0,"publicationDate":"2006-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1742-6847(06)70381-0","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90018124","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Infosecurity TodayPub Date : 2006-03-01DOI: 10.1016/S1742-6847(06)70376-7
S. Mathieson
{"title":"Commissioner tells CeBit that privacy is RFID concern","authors":"S. Mathieson","doi":"10.1016/S1742-6847(06)70376-7","DOIUrl":"https://doi.org/10.1016/S1742-6847(06)70376-7","url":null,"abstract":"","PeriodicalId":100673,"journal":{"name":"Infosecurity Today","volume":"45 1","pages":"8"},"PeriodicalIF":0.0,"publicationDate":"2006-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76376943","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}