Infosecurity Today最新文献

筛选
英文 中文
Biometrics – ready to be used in anger? 生物识别技术-准备好用于愤怒吗?
Infosecurity Today Pub Date : 2006-09-01 DOI: 10.1016/S1742-6847(06)70457-8
Cath Everett
{"title":"Biometrics – ready to be used in anger?","authors":"Cath Everett","doi":"10.1016/S1742-6847(06)70457-8","DOIUrl":"10.1016/S1742-6847(06)70457-8","url":null,"abstract":"<div><p>Biometric technology seems to have been with us forever. But is it ready to flex its muscles beyond the public sector?</p></div>","PeriodicalId":100673,"journal":{"name":"Infosecurity Today","volume":"3 5","pages":"Pages 30-32"},"PeriodicalIF":0.0,"publicationDate":"2006-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1742-6847(06)70457-8","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77302760","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Microsoft ingests Whale 微软收购鲸鱼
Infosecurity Today Pub Date : 2006-09-01 DOI: 10.1016/S1742-6847(06)70448-7
Brian McKenna
{"title":"Microsoft ingests Whale","authors":"Brian McKenna","doi":"10.1016/S1742-6847(06)70448-7","DOIUrl":"10.1016/S1742-6847(06)70448-7","url":null,"abstract":"","PeriodicalId":100673,"journal":{"name":"Infosecurity Today","volume":"3 5","pages":"Page 5"},"PeriodicalIF":0.0,"publicationDate":"2006-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1742-6847(06)70448-7","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79288870","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Product roundup 产品综述
Infosecurity Today Pub Date : 2006-09-01 DOI: 10.1016/S1742-6847(06)70463-3
{"title":"Product roundup","authors":"","doi":"10.1016/S1742-6847(06)70463-3","DOIUrl":"https://doi.org/10.1016/S1742-6847(06)70463-3","url":null,"abstract":"","PeriodicalId":100673,"journal":{"name":"Infosecurity Today","volume":"3 5","pages":"Pages 44-45"},"PeriodicalIF":0.0,"publicationDate":"2006-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1742-6847(06)70463-3","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91984039","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Safe to shelter under a Mac? 躲在Mac下面安全吗?
Infosecurity Today Pub Date : 2006-09-01 DOI: 10.1016/S1742-6847(06)70460-8
Ken Munro
{"title":"Safe to shelter under a Mac?","authors":"Ken Munro","doi":"10.1016/S1742-6847(06)70460-8","DOIUrl":"10.1016/S1742-6847(06)70460-8","url":null,"abstract":"<div><p>Macs are more elegant than PCs, and, on the face of it, more secure. Better option for a private computer?</p></div>","PeriodicalId":100673,"journal":{"name":"Infosecurity Today","volume":"3 5","pages":"Page 40"},"PeriodicalIF":0.0,"publicationDate":"2006-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1742-6847(06)70460-8","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90221872","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Slack space 松弛的空间
Infosecurity Today Pub Date : 2006-09-01 DOI: 10.1016/S1742-6847(06)70465-7
{"title":"Slack space","authors":"","doi":"10.1016/S1742-6847(06)70465-7","DOIUrl":"https://doi.org/10.1016/S1742-6847(06)70465-7","url":null,"abstract":"<div><p>Welcome to Slack Space, our regular column by industry insider Slack Alice.</p></div>","PeriodicalId":100673,"journal":{"name":"Infosecurity Today","volume":"3 5","pages":"Page 47"},"PeriodicalIF":0.0,"publicationDate":"2006-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1742-6847(06)70465-7","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136596365","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IT strategy @ UK.gov IT战略@ UK.gov
Infosecurity Today Pub Date : 2006-07-01 DOI: 10.1016/S1742-6847(06)70430-X
Ian Grant
{"title":"IT strategy @ UK.gov","authors":"Ian Grant","doi":"10.1016/S1742-6847(06)70430-X","DOIUrl":"10.1016/S1742-6847(06)70430-X","url":null,"abstract":"<div><p>The UK government needs to improve its ability to deliver effective IT-based systems at reasonable cost. But the proposed solution could change utterly the relationship between the state and the citizen.</p></div>","PeriodicalId":100673,"journal":{"name":"Infosecurity Today","volume":"3 4","pages":"Pages 14, 16-18"},"PeriodicalIF":0.0,"publicationDate":"2006-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1742-6847(06)70430-X","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74209632","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Slack space 松弛的空间
Infosecurity Today Pub Date : 2006-07-01 DOI: 10.1016/S1742-6847(06)70443-8
{"title":"Slack space","authors":"","doi":"10.1016/S1742-6847(06)70443-8","DOIUrl":"https://doi.org/10.1016/S1742-6847(06)70443-8","url":null,"abstract":"<div><p>Welcome to Slack Space, our regular column by industry insider Slack Alice.</p></div>","PeriodicalId":100673,"journal":{"name":"Infosecurity Today","volume":"3 4","pages":"Page 47"},"PeriodicalIF":0.0,"publicationDate":"2006-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1742-6847(06)70443-8","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"137398564","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mobile madness: securing the endpoint 移动疯狂:保护终端
Infosecurity Today Pub Date : 2006-07-01 DOI: 10.1016/S1742-6847(06)70439-6
Ken Salchow Jr
{"title":"Mobile madness: securing the endpoint","authors":"Ken Salchow Jr","doi":"10.1016/S1742-6847(06)70439-6","DOIUrl":"10.1016/S1742-6847(06)70439-6","url":null,"abstract":"<div><p>Road warriors have punched holes in the perimeter defences. Here's how to reorganize your defences.</p></div>","PeriodicalId":100673,"journal":{"name":"Infosecurity Today","volume":"3 4","pages":"Page 41"},"PeriodicalIF":0.0,"publicationDate":"2006-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1742-6847(06)70439-6","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79456852","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hacking matures as a criminal discipline 黑客作为一门刑事学科逐渐成熟
Infosecurity Today Pub Date : 2006-07-01 DOI: 10.1016/S1742-6847(06)70423-2
SA Mathieson
{"title":"Hacking matures as a criminal discipline","authors":"SA Mathieson","doi":"10.1016/S1742-6847(06)70423-2","DOIUrl":"10.1016/S1742-6847(06)70423-2","url":null,"abstract":"","PeriodicalId":100673,"journal":{"name":"Infosecurity Today","volume":"3 4","pages":"Page 5"},"PeriodicalIF":0.0,"publicationDate":"2006-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1742-6847(06)70423-2","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89418574","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
eema Award for Excellence in Secure Electronic Business in partnership with Infosecurity Today 与《今日资讯安全》合办的eema电子商务安全卓越奖
Infosecurity Today Pub Date : 2006-07-01 DOI: 10.1016/S1742-6847(06)70437-2
{"title":"eema Award for Excellence in Secure Electronic Business in partnership with Infosecurity Today","authors":"","doi":"10.1016/S1742-6847(06)70437-2","DOIUrl":"https://doi.org/10.1016/S1742-6847(06)70437-2","url":null,"abstract":"","PeriodicalId":100673,"journal":{"name":"Infosecurity Today","volume":"3 4","pages":"Page 39"},"PeriodicalIF":0.0,"publicationDate":"2006-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1742-6847(06)70437-2","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"137266473","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信