Infosecurity Today最新文献

筛选
英文 中文
Can you trust your partner? 你能信任你的伴侣吗?
Infosecurity Today Pub Date : 2006-07-01 DOI: 10.1016/S1742-6847(06)70425-6
Brian McKenna
{"title":"Can you trust your partner?","authors":"Brian McKenna","doi":"10.1016/S1742-6847(06)70425-6","DOIUrl":"10.1016/S1742-6847(06)70425-6","url":null,"abstract":"","PeriodicalId":100673,"journal":{"name":"Infosecurity Today","volume":"3 4","pages":"Page 6"},"PeriodicalIF":0.0,"publicationDate":"2006-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1742-6847(06)70425-6","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88809544","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Russia emerges into the shadows 俄罗斯出现在阴影中
Infosecurity Today Pub Date : 2006-07-01 DOI: 10.1016/S1742-6847(06)70431-1
Alexander Gudko
{"title":"Russia emerges into the shadows","authors":"Alexander Gudko","doi":"10.1016/S1742-6847(06)70431-1","DOIUrl":"10.1016/S1742-6847(06)70431-1","url":null,"abstract":"<div><p>Once a dark and closed securotocracy, Russia hopes to build a fleet, light, modern economy. Moscow-based Alexander Gudko surveys.</p></div>","PeriodicalId":100673,"journal":{"name":"Infosecurity Today","volume":"3 4","pages":"Pages 20-23"},"PeriodicalIF":0.0,"publicationDate":"2006-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1742-6847(06)70431-1","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76053291","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Information security can enable mobile working 信息安全可以实现移动办公
Infosecurity Today Pub Date : 2006-07-01 DOI: 10.1016/S1742-6847(06)70440-2
Adrian Davis
{"title":"Information security can enable mobile working","authors":"Adrian Davis","doi":"10.1016/S1742-6847(06)70440-2","DOIUrl":"10.1016/S1742-6847(06)70440-2","url":null,"abstract":"<div><p>Help is on hand to protect corporate information and assist in the adoption of mobile devices and technologies.</p></div>","PeriodicalId":100673,"journal":{"name":"Infosecurity Today","volume":"3 4","pages":"Page 42"},"PeriodicalIF":0.0,"publicationDate":"2006-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1742-6847(06)70440-2","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83746713","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Oracle spreads into the middle Oracle向中间扩散
Infosecurity Today Pub Date : 2006-07-01 DOI: 10.1016/S1742-6847(06)70435-9
Cath Everett
{"title":"Oracle spreads into the middle","authors":"Cath Everett","doi":"10.1016/S1742-6847(06)70435-9","DOIUrl":"10.1016/S1742-6847(06)70435-9","url":null,"abstract":"<div><p>As with politics, so too with software: he who holds the middle ground wins, and Oracle is staking out its claim.</p></div>","PeriodicalId":100673,"journal":{"name":"Infosecurity Today","volume":"3 4","pages":"Pages 34-36"},"PeriodicalIF":0.0,"publicationDate":"2006-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1742-6847(06)70435-9","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77260363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Staying power 持久力
Infosecurity Today Pub Date : 2006-07-01 DOI: 10.1016/S1742-6847(06)70433-5
Mick James
{"title":"Staying power","authors":"Mick James","doi":"10.1016/S1742-6847(06)70433-5","DOIUrl":"https://doi.org/10.1016/S1742-6847(06)70433-5","url":null,"abstract":"<div><p>Business continuity is what it's all about. Here are some new ideas on the oldest topic in business.</p></div>","PeriodicalId":100673,"journal":{"name":"Infosecurity Today","volume":"3 4","pages":"Pages 28-30"},"PeriodicalIF":0.0,"publicationDate":"2006-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1742-6847(06)70433-5","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"137398927","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
(ISC)2 scholarship winner aims to please users (ISC)2奖学金获得者旨在取悦用户
Infosecurity Today Pub Date : 2006-07-01 DOI: 10.1016/S1742-6847(06)70426-8
{"title":"(ISC)2 scholarship winner aims to please users","authors":"","doi":"10.1016/S1742-6847(06)70426-8","DOIUrl":"https://doi.org/10.1016/S1742-6847(06)70426-8","url":null,"abstract":"","PeriodicalId":100673,"journal":{"name":"Infosecurity Today","volume":"3 4","pages":"Page 6"},"PeriodicalIF":0.0,"publicationDate":"2006-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1742-6847(06)70426-8","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"137398565","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Product roundup 产品综述
Infosecurity Today Pub Date : 2006-07-01 DOI: 10.1016/S1742-6847(06)70441-4
{"title":"Product roundup","authors":"","doi":"10.1016/S1742-6847(06)70441-4","DOIUrl":"https://doi.org/10.1016/S1742-6847(06)70441-4","url":null,"abstract":"","PeriodicalId":100673,"journal":{"name":"Infosecurity Today","volume":"3 4","pages":"Pages 43-45"},"PeriodicalIF":0.0,"publicationDate":"2006-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1742-6847(06)70441-4","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"137265206","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Nokia and G&D connect to turn cellphones into credit cards 诺基亚和G&D合作,将手机变成信用卡
Infosecurity Today Pub Date : 2006-07-01 DOI: 10.1016/S1742-6847(06)70422-0
Ian Grant
{"title":"Nokia and G&D connect to turn cellphones into credit cards","authors":"Ian Grant","doi":"10.1016/S1742-6847(06)70422-0","DOIUrl":"10.1016/S1742-6847(06)70422-0","url":null,"abstract":"","PeriodicalId":100673,"journal":{"name":"Infosecurity Today","volume":"3 4","pages":"Page 4"},"PeriodicalIF":0.0,"publicationDate":"2006-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1742-6847(06)70422-0","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81881404","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Trends help the wise prepare 趋势帮助聪明人做好准备
Infosecurity Today Pub Date : 2006-07-01 DOI: 10.1016/S1742-6847(06)70428-1
Mark Zimmerman
{"title":"Trends help the wise prepare","authors":"Mark Zimmerman","doi":"10.1016/S1742-6847(06)70428-1","DOIUrl":"10.1016/S1742-6847(06)70428-1","url":null,"abstract":"<div><p>IT managers need to understand how malcode and exploit activity changes if they are to prioritize correctly their efforts to protect their employers' information assets.</p></div>","PeriodicalId":100673,"journal":{"name":"Infosecurity Today","volume":"3 4","pages":"Pages 8-9"},"PeriodicalIF":0.0,"publicationDate":"2006-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1742-6847(06)70428-1","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76641137","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Microsoft makes stealthy progress into security market 微软悄悄进军安全市场
Infosecurity Today Pub Date : 2006-07-01 DOI: 10.1016/S1742-6847(06)70427-X
Sarah Hilley
{"title":"Microsoft makes stealthy progress into security market","authors":"Sarah Hilley","doi":"10.1016/S1742-6847(06)70427-X","DOIUrl":"10.1016/S1742-6847(06)70427-X","url":null,"abstract":"","PeriodicalId":100673,"journal":{"name":"Infosecurity Today","volume":"3 4","pages":"Page 6"},"PeriodicalIF":0.0,"publicationDate":"2006-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1742-6847(06)70427-X","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88993728","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信