Infosecurity Today最新文献

筛选
英文 中文
Keeping the wheels on 保持轮子转动
Infosecurity Today Pub Date : 2006-07-01 DOI: 10.1016/S1742-6847(06)70420-7
Brian McKenna
{"title":"Keeping the wheels on","authors":"Brian McKenna","doi":"10.1016/S1742-6847(06)70420-7","DOIUrl":"10.1016/S1742-6847(06)70420-7","url":null,"abstract":"","PeriodicalId":100673,"journal":{"name":"Infosecurity Today","volume":"3 4","pages":"Page 3"},"PeriodicalIF":0.0,"publicationDate":"2006-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1742-6847(06)70420-7","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88169886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Stand up for the little guy 为小人物站起来
Infosecurity Today Pub Date : 2006-07-01 DOI: 10.1016/S1742-6847(06)70436-0
Steve Gold
{"title":"Stand up for the little guy","authors":"Steve Gold","doi":"10.1016/S1742-6847(06)70436-0","DOIUrl":"10.1016/S1742-6847(06)70436-0","url":null,"abstract":"<div><p>As spam and email-borne malware attacks continue to rise, how can small firms and individuals protect their IT assets?</p></div>","PeriodicalId":100673,"journal":{"name":"Infosecurity Today","volume":"3 4","pages":"Pages 37-38"},"PeriodicalIF":0.0,"publicationDate":"2006-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1742-6847(06)70436-0","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82032054","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Industry calendar 行业的日历
Infosecurity Today Pub Date : 2006-07-01 DOI: 10.1016/S1742-6847(06)70444-X
{"title":"Industry calendar","authors":"","doi":"10.1016/S1742-6847(06)70444-X","DOIUrl":"https://doi.org/10.1016/S1742-6847(06)70444-X","url":null,"abstract":"","PeriodicalId":100673,"journal":{"name":"Infosecurity Today","volume":"3 4","pages":"Page 48"},"PeriodicalIF":0.0,"publicationDate":"2006-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1742-6847(06)70444-X","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"137398562","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Peer-to-peer software exposes corporate data 点对点软件公开公司数据
Infosecurity Today Pub Date : 2006-07-01 DOI: 10.1016/S1742-6847(06)70424-4
SA Mathieson
{"title":"Peer-to-peer software exposes corporate data","authors":"SA Mathieson","doi":"10.1016/S1742-6847(06)70424-4","DOIUrl":"10.1016/S1742-6847(06)70424-4","url":null,"abstract":"","PeriodicalId":100673,"journal":{"name":"Infosecurity Today","volume":"3 4","pages":"Page 5"},"PeriodicalIF":0.0,"publicationDate":"2006-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1742-6847(06)70424-4","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84768517","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Yes, but… 是的,但是……
Infosecurity Today Pub Date : 2006-07-01 DOI: 10.1016/S1742-6847(06)70442-6
Richard Ford
{"title":"Yes, but…","authors":"Richard Ford","doi":"10.1016/S1742-6847(06)70442-6","DOIUrl":"https://doi.org/10.1016/S1742-6847(06)70442-6","url":null,"abstract":"","PeriodicalId":100673,"journal":{"name":"Infosecurity Today","volume":"3 4","pages":"Page 46"},"PeriodicalIF":0.0,"publicationDate":"2006-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1742-6847(06)70442-6","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"137398563","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Lock up your data 锁定数据
Infosecurity Today Pub Date : 2006-07-01 DOI: 10.1016/S1742-6847(06)70434-7
Eric Doyle
{"title":"Lock up your data","authors":"Eric Doyle","doi":"10.1016/S1742-6847(06)70434-7","DOIUrl":"10.1016/S1742-6847(06)70434-7","url":null,"abstract":"<div><p>It hurts anyone's head to define a database, but sorting out the security options sharpens the dull ache to cross-eyed migraine level. Here's a possible painkiller.</p></div>","PeriodicalId":100673,"journal":{"name":"Infosecurity Today","volume":"3 4","pages":"Pages 31-33"},"PeriodicalIF":0.0,"publicationDate":"2006-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1742-6847(06)70434-7","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82258512","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Researchers find way around Great Firewall of China 研究人员找到了绕过中国防火墙的方法
Infosecurity Today Pub Date : 2006-07-01 DOI: 10.1016/S1742-6847(06)70421-9
SA Mathieson
{"title":"Researchers find way around Great Firewall of China","authors":"SA Mathieson","doi":"10.1016/S1742-6847(06)70421-9","DOIUrl":"10.1016/S1742-6847(06)70421-9","url":null,"abstract":"","PeriodicalId":100673,"journal":{"name":"Infosecurity Today","volume":"3 4","pages":"Page 4"},"PeriodicalIF":0.0,"publicationDate":"2006-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1742-6847(06)70421-9","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78962420","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Medical charts give way to smartcards 医疗图表让位于智能卡
Infosecurity Today Pub Date : 2006-07-01 DOI: 10.1016/S1742-6847(06)70429-3
SA Mathieson
{"title":"Medical charts give way to smartcards","authors":"SA Mathieson","doi":"10.1016/S1742-6847(06)70429-3","DOIUrl":"10.1016/S1742-6847(06)70429-3","url":null,"abstract":"<div><p>The prospect of carrying around your medical records on a smartcard has some benefits, but the cost may cause severe pain and distress to taxpayers.</p></div>","PeriodicalId":100673,"journal":{"name":"Infosecurity Today","volume":"3 4","pages":"Pages 10, 12-13"},"PeriodicalIF":0.0,"publicationDate":"2006-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1742-6847(06)70429-3","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83075508","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
How to make the most of IT 如何充分利用信息技术
Infosecurity Today Pub Date : 2006-07-01 DOI: 10.1016/S1742-6847(06)70432-3
Cath Everett
{"title":"How to make the most of IT","authors":"Cath Everett","doi":"10.1016/S1742-6847(06)70432-3","DOIUrl":"10.1016/S1742-6847(06)70432-3","url":null,"abstract":"<div><p>The jury is still out on virtualization and security. Here's what some leading experts think.</p></div>","PeriodicalId":100673,"journal":{"name":"Infosecurity Today","volume":"3 4","pages":"Pages 24-26"},"PeriodicalIF":0.0,"publicationDate":"2006-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1742-6847(06)70432-3","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85820364","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
VPN security needs beefing up VPN安全需要加强
Infosecurity Today Pub Date : 2006-07-01 DOI: 10.1016/S1742-6847(06)70438-4
Ken Munro
{"title":"VPN security needs beefing up","authors":"Ken Munro","doi":"10.1016/S1742-6847(06)70438-4","DOIUrl":"10.1016/S1742-6847(06)70438-4","url":null,"abstract":"<div><p>Virtual private networks are a delight from a productivity aspect, but they open the doors to a host of undesirable and unnecessary risks.</p></div>","PeriodicalId":100673,"journal":{"name":"Infosecurity Today","volume":"3 4","pages":"Page 40"},"PeriodicalIF":0.0,"publicationDate":"2006-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1742-6847(06)70438-4","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89068956","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信