Infosecurity TodayPub Date : 2006-09-01DOI: 10.1016/S1742-6847(06)70457-8
Cath Everett
{"title":"Biometrics – ready to be used in anger?","authors":"Cath Everett","doi":"10.1016/S1742-6847(06)70457-8","DOIUrl":"10.1016/S1742-6847(06)70457-8","url":null,"abstract":"<div><p>Biometric technology seems to have been with us forever. But is it ready to flex its muscles beyond the public sector?</p></div>","PeriodicalId":100673,"journal":{"name":"Infosecurity Today","volume":"3 5","pages":"Pages 30-32"},"PeriodicalIF":0.0,"publicationDate":"2006-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1742-6847(06)70457-8","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77302760","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Infosecurity TodayPub Date : 2006-09-01DOI: 10.1016/S1742-6847(06)70460-8
Ken Munro
{"title":"Safe to shelter under a Mac?","authors":"Ken Munro","doi":"10.1016/S1742-6847(06)70460-8","DOIUrl":"10.1016/S1742-6847(06)70460-8","url":null,"abstract":"<div><p>Macs are more elegant than PCs, and, on the face of it, more secure. Better option for a private computer?</p></div>","PeriodicalId":100673,"journal":{"name":"Infosecurity Today","volume":"3 5","pages":"Page 40"},"PeriodicalIF":0.0,"publicationDate":"2006-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1742-6847(06)70460-8","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90221872","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Infosecurity TodayPub Date : 2006-07-01DOI: 10.1016/S1742-6847(06)70430-X
Ian Grant
{"title":"IT strategy @ UK.gov","authors":"Ian Grant","doi":"10.1016/S1742-6847(06)70430-X","DOIUrl":"10.1016/S1742-6847(06)70430-X","url":null,"abstract":"<div><p>The UK government needs to improve its ability to deliver effective IT-based systems at reasonable cost. But the proposed solution could change utterly the relationship between the state and the citizen.</p></div>","PeriodicalId":100673,"journal":{"name":"Infosecurity Today","volume":"3 4","pages":"Pages 14, 16-18"},"PeriodicalIF":0.0,"publicationDate":"2006-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1742-6847(06)70430-X","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74209632","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Infosecurity TodayPub Date : 2006-07-01DOI: 10.1016/S1742-6847(06)70439-6
Ken Salchow Jr
{"title":"Mobile madness: securing the endpoint","authors":"Ken Salchow Jr","doi":"10.1016/S1742-6847(06)70439-6","DOIUrl":"10.1016/S1742-6847(06)70439-6","url":null,"abstract":"<div><p>Road warriors have punched holes in the perimeter defences. Here's how to reorganize your defences.</p></div>","PeriodicalId":100673,"journal":{"name":"Infosecurity Today","volume":"3 4","pages":"Page 41"},"PeriodicalIF":0.0,"publicationDate":"2006-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1742-6847(06)70439-6","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79456852","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Infosecurity TodayPub Date : 2006-07-01DOI: 10.1016/S1742-6847(06)70437-2
{"title":"eema Award for Excellence in Secure Electronic Business in partnership with Infosecurity Today","authors":"","doi":"10.1016/S1742-6847(06)70437-2","DOIUrl":"https://doi.org/10.1016/S1742-6847(06)70437-2","url":null,"abstract":"","PeriodicalId":100673,"journal":{"name":"Infosecurity Today","volume":"3 4","pages":"Page 39"},"PeriodicalIF":0.0,"publicationDate":"2006-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1742-6847(06)70437-2","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"137266473","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}