Infosecurity TodayPub Date : 2006-07-01DOI: 10.1016/S1742-6847(06)70425-6
Brian McKenna
{"title":"Can you trust your partner?","authors":"Brian McKenna","doi":"10.1016/S1742-6847(06)70425-6","DOIUrl":"10.1016/S1742-6847(06)70425-6","url":null,"abstract":"","PeriodicalId":100673,"journal":{"name":"Infosecurity Today","volume":"3 4","pages":"Page 6"},"PeriodicalIF":0.0,"publicationDate":"2006-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1742-6847(06)70425-6","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88809544","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Infosecurity TodayPub Date : 2006-07-01DOI: 10.1016/S1742-6847(06)70431-1
Alexander Gudko
{"title":"Russia emerges into the shadows","authors":"Alexander Gudko","doi":"10.1016/S1742-6847(06)70431-1","DOIUrl":"10.1016/S1742-6847(06)70431-1","url":null,"abstract":"<div><p>Once a dark and closed securotocracy, Russia hopes to build a fleet, light, modern economy. Moscow-based Alexander Gudko surveys.</p></div>","PeriodicalId":100673,"journal":{"name":"Infosecurity Today","volume":"3 4","pages":"Pages 20-23"},"PeriodicalIF":0.0,"publicationDate":"2006-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1742-6847(06)70431-1","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76053291","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Infosecurity TodayPub Date : 2006-07-01DOI: 10.1016/S1742-6847(06)70440-2
Adrian Davis
{"title":"Information security can enable mobile working","authors":"Adrian Davis","doi":"10.1016/S1742-6847(06)70440-2","DOIUrl":"10.1016/S1742-6847(06)70440-2","url":null,"abstract":"<div><p>Help is on hand to protect corporate information and assist in the adoption of mobile devices and technologies.</p></div>","PeriodicalId":100673,"journal":{"name":"Infosecurity Today","volume":"3 4","pages":"Page 42"},"PeriodicalIF":0.0,"publicationDate":"2006-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1742-6847(06)70440-2","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83746713","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Infosecurity TodayPub Date : 2006-07-01DOI: 10.1016/S1742-6847(06)70435-9
Cath Everett
{"title":"Oracle spreads into the middle","authors":"Cath Everett","doi":"10.1016/S1742-6847(06)70435-9","DOIUrl":"10.1016/S1742-6847(06)70435-9","url":null,"abstract":"<div><p>As with politics, so too with software: he who holds the middle ground wins, and Oracle is staking out its claim.</p></div>","PeriodicalId":100673,"journal":{"name":"Infosecurity Today","volume":"3 4","pages":"Pages 34-36"},"PeriodicalIF":0.0,"publicationDate":"2006-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1742-6847(06)70435-9","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77260363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Infosecurity TodayPub Date : 2006-07-01DOI: 10.1016/S1742-6847(06)70433-5
Mick James
{"title":"Staying power","authors":"Mick James","doi":"10.1016/S1742-6847(06)70433-5","DOIUrl":"https://doi.org/10.1016/S1742-6847(06)70433-5","url":null,"abstract":"<div><p>Business continuity is what it's all about. Here are some new ideas on the oldest topic in business.</p></div>","PeriodicalId":100673,"journal":{"name":"Infosecurity Today","volume":"3 4","pages":"Pages 28-30"},"PeriodicalIF":0.0,"publicationDate":"2006-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1742-6847(06)70433-5","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"137398927","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Infosecurity TodayPub Date : 2006-07-01DOI: 10.1016/S1742-6847(06)70422-0
Ian Grant
{"title":"Nokia and G&D connect to turn cellphones into credit cards","authors":"Ian Grant","doi":"10.1016/S1742-6847(06)70422-0","DOIUrl":"10.1016/S1742-6847(06)70422-0","url":null,"abstract":"","PeriodicalId":100673,"journal":{"name":"Infosecurity Today","volume":"3 4","pages":"Page 4"},"PeriodicalIF":0.0,"publicationDate":"2006-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1742-6847(06)70422-0","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81881404","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Infosecurity TodayPub Date : 2006-07-01DOI: 10.1016/S1742-6847(06)70428-1
Mark Zimmerman
{"title":"Trends help the wise prepare","authors":"Mark Zimmerman","doi":"10.1016/S1742-6847(06)70428-1","DOIUrl":"10.1016/S1742-6847(06)70428-1","url":null,"abstract":"<div><p>IT managers need to understand how malcode and exploit activity changes if they are to prioritize correctly their efforts to protect their employers' information assets.</p></div>","PeriodicalId":100673,"journal":{"name":"Infosecurity Today","volume":"3 4","pages":"Pages 8-9"},"PeriodicalIF":0.0,"publicationDate":"2006-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1742-6847(06)70428-1","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76641137","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}