Infosecurity Today最新文献

筛选
英文 中文
The law starts to bite back 法律开始起反作用
Infosecurity Today Pub Date : 2006-05-01 DOI: 10.1016/S1742-6847(06)70415-3
Andy Jones
{"title":"The law starts to bite back","authors":"Andy Jones","doi":"10.1016/S1742-6847(06)70415-3","DOIUrl":"10.1016/S1742-6847(06)70415-3","url":null,"abstract":"<div><p>Information security professionals need to start dealing with the law, before the law deals with them.</p></div>","PeriodicalId":100673,"journal":{"name":"Infosecurity Today","volume":"3 3","pages":"Page 41"},"PeriodicalIF":0.0,"publicationDate":"2006-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1742-6847(06)70415-3","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77566378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Empire and Federation differ in security style 帝国和联邦的安保风格不同
Infosecurity Today Pub Date : 2006-05-01 DOI: 10.1016/S1742-6847(06)70405-0
Stefan Krempl
{"title":"Empire and Federation differ in security style","authors":"Stefan Krempl","doi":"10.1016/S1742-6847(06)70405-0","DOIUrl":"10.1016/S1742-6847(06)70405-0","url":null,"abstract":"<div><p>The political histories of Austria and Switzerland show up in their differing approaches to safeguarding their citizens' data and privacy.</p></div>","PeriodicalId":100673,"journal":{"name":"Infosecurity Today","volume":"3 3","pages":"Pages 16-18"},"PeriodicalIF":0.0,"publicationDate":"2006-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1742-6847(06)70405-0","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78875006","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A return to traditional methods 回归传统方法
Infosecurity Today Pub Date : 2006-05-01 DOI: 10.1016/S1742-6847(06)70414-1
Stuart King
{"title":"A return to traditional methods","authors":"Stuart King","doi":"10.1016/S1742-6847(06)70414-1","DOIUrl":"10.1016/S1742-6847(06)70414-1","url":null,"abstract":"<div><p>Automated test procedures are the lazy, misleading way to test security. Use your loaf too.</p></div>","PeriodicalId":100673,"journal":{"name":"Infosecurity Today","volume":"3 3","pages":"Page 40"},"PeriodicalIF":0.0,"publicationDate":"2006-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1742-6847(06)70414-1","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76067295","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Australian computer crime changes tack 澳大利亚的计算机犯罪改变了策略
Infosecurity Today Pub Date : 2006-05-01 DOI: 10.1016/S1742-6847(06)70401-3
Ian Grant
{"title":"Australian computer crime changes tack","authors":"Ian Grant","doi":"10.1016/S1742-6847(06)70401-3","DOIUrl":"10.1016/S1742-6847(06)70401-3","url":null,"abstract":"<div><p>Fewer reported attacks and less harm done suggest Australian cybercrime is under control. Big mistake.</p></div>","PeriodicalId":100673,"journal":{"name":"Infosecurity Today","volume":"3 3","pages":"Page 6"},"PeriodicalIF":0.0,"publicationDate":"2006-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1742-6847(06)70401-3","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78860359","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Managing mobile 管理移动
Infosecurity Today Pub Date : 2006-05-01 DOI: 10.1016/S1742-6847(06)70409-8
Stephen Pritchard
{"title":"Managing mobile","authors":"Stephen Pritchard","doi":"10.1016/S1742-6847(06)70409-8","DOIUrl":"https://doi.org/10.1016/S1742-6847(06)70409-8","url":null,"abstract":"<div><p>Powerful new mobile network access devices threaten to breach corporate information security bulwarks. Here's what to do.</p></div>","PeriodicalId":100673,"journal":{"name":"Infosecurity Today","volume":"3 3","pages":"Pages 28-30"},"PeriodicalIF":0.0,"publicationDate":"2006-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1742-6847(06)70409-8","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136496090","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Lost highway 迷失的高速公路
Infosecurity Today Pub Date : 2006-05-01 DOI: 10.1016/S1742-6847(06)70413-X
Ken Munro
{"title":"Lost highway","authors":"Ken Munro","doi":"10.1016/S1742-6847(06)70413-X","DOIUrl":"https://doi.org/10.1016/S1742-6847(06)70413-X","url":null,"abstract":"<div><p>Mischief and worse await public and private transport authorities as their kit joins the data highway.</p></div>","PeriodicalId":100673,"journal":{"name":"Infosecurity Today","volume":"3 3","pages":"Page 39"},"PeriodicalIF":0.0,"publicationDate":"2006-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1742-6847(06)70413-X","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136549531","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The money's at the margins 钱在边缘
Infosecurity Today Pub Date : 2006-05-01 DOI: 10.1016/S1742-6847(06)70403-7
Wade Baker
{"title":"The money's at the margins","authors":"Wade Baker","doi":"10.1016/S1742-6847(06)70403-7","DOIUrl":"10.1016/S1742-6847(06)70403-7","url":null,"abstract":"<div><p>It's time information security professionals started using marginal returns to analyse and rank their investments.</p></div>","PeriodicalId":100673,"journal":{"name":"Infosecurity Today","volume":"3 3","pages":"Pages 10-11"},"PeriodicalIF":0.0,"publicationDate":"2006-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1742-6847(06)70403-7","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91252803","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
RFID – another technology, another security mess? RFID——另一项技术,另一个安全问题?
Infosecurity Today Pub Date : 2006-05-01 DOI: 10.1016/S1742-6847(06)70411-6
William Knight
{"title":"RFID – another technology, another security mess?","authors":"William Knight","doi":"10.1016/S1742-6847(06)70411-6","DOIUrl":"10.1016/S1742-6847(06)70411-6","url":null,"abstract":"<div><p>It's infinitely useful, has a wide range of applications and is going in at a gallop. But has anybody really thought through the security implications of radio frequency identification (RFID)?</p></div>","PeriodicalId":100673,"journal":{"name":"Infosecurity Today","volume":"3 3","pages":"Pages 35-37"},"PeriodicalIF":0.0,"publicationDate":"2006-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1742-6847(06)70411-6","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91375855","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Industry calendar 行业的日历
Infosecurity Today Pub Date : 2006-05-01 DOI: 10.1016/S1742-6847(06)70419-0
{"title":"Industry calendar","authors":"","doi":"10.1016/S1742-6847(06)70419-0","DOIUrl":"https://doi.org/10.1016/S1742-6847(06)70419-0","url":null,"abstract":"","PeriodicalId":100673,"journal":{"name":"Infosecurity Today","volume":"3 3","pages":"Page 48"},"PeriodicalIF":0.0,"publicationDate":"2006-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1742-6847(06)70419-0","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136531856","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Crypto goes into the bloodstream 密码进入血液
Infosecurity Today Pub Date : 2006-05-01 DOI: 10.1016/S1742-6847(06)70416-5
Daniel Murton
{"title":"Crypto goes into the bloodstream","authors":"Daniel Murton","doi":"10.1016/S1742-6847(06)70416-5","DOIUrl":"10.1016/S1742-6847(06)70416-5","url":null,"abstract":"<div><p>Cryptography is moving to centre-stage as companies seek to secure their data at rest and in transmission.</p></div>","PeriodicalId":100673,"journal":{"name":"Infosecurity Today","volume":"3 3","pages":"Page 42"},"PeriodicalIF":0.0,"publicationDate":"2006-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1742-6847(06)70416-5","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82454245","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信