Infosecurity Today最新文献

筛选
英文 中文
Slack space 松弛的空间
Infosecurity Today Pub Date : 2006-05-01 DOI: 10.1016/S1742-6847(06)70418-9
{"title":"Slack space","authors":"","doi":"10.1016/S1742-6847(06)70418-9","DOIUrl":"https://doi.org/10.1016/S1742-6847(06)70418-9","url":null,"abstract":"<div><p>Welcome to Slack Space, our regular column by industry insider Slack Alice. Chip and PIN fraud, SSL decryption, and CALEA are on her lunch-time gossip menu this time round.</p></div>","PeriodicalId":100673,"journal":{"name":"Infosecurity Today","volume":"3 3","pages":"Page 47"},"PeriodicalIF":0.0,"publicationDate":"2006-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1742-6847(06)70418-9","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136531855","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Telecoms – convergence challenge 电讯-汇流挑战
Infosecurity Today Pub Date : 2006-05-01 DOI: 10.1016/S1742-6847(06)70406-2
Ian Grant
{"title":"Telecoms – convergence challenge","authors":"Ian Grant","doi":"10.1016/S1742-6847(06)70406-2","DOIUrl":"10.1016/S1742-6847(06)70406-2","url":null,"abstract":"<div><p>Churchill said, “Give us the tools and we will finish the job.” We have the infosecurity tools, but the job of managing infosecurity in an age of converged digital networks is only just beginning.</p></div>","PeriodicalId":100673,"journal":{"name":"Infosecurity Today","volume":"3 3","pages":"Pages 19-21"},"PeriodicalIF":0.0,"publicationDate":"2006-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1742-6847(06)70406-2","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76863315","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The ‘big con’ for the information age 信息时代的“大骗局”
Infosecurity Today Pub Date : 2006-05-01 DOI: 10.1016/S1742-6847(06)70398-6
Brian McKenna
{"title":"The ‘big con’ for the information age","authors":"Brian McKenna","doi":"10.1016/S1742-6847(06)70398-6","DOIUrl":"10.1016/S1742-6847(06)70398-6","url":null,"abstract":"","PeriodicalId":100673,"journal":{"name":"Infosecurity Today","volume":"3 3","pages":"Page 3"},"PeriodicalIF":0.0,"publicationDate":"2006-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1742-6847(06)70398-6","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74401593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Aping to defraud – corporate identities at stake 模仿诈骗——企业身份岌岌可危
Infosecurity Today Pub Date : 2006-05-01 DOI: 10.1016/S1742-6847(06)70408-6
Mick James
{"title":"Aping to defraud – corporate identities at stake","authors":"Mick James","doi":"10.1016/S1742-6847(06)70408-6","DOIUrl":"10.1016/S1742-6847(06)70408-6","url":null,"abstract":"<div><p>There are plenty of scam artists willing to shame your name by trading on your reputation. It takes a concerted effort to stop these corporate ID thieves.</p></div>","PeriodicalId":100673,"journal":{"name":"Infosecurity Today","volume":"3 3","pages":"Pages 24-26"},"PeriodicalIF":0.0,"publicationDate":"2006-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1742-6847(06)70408-6","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73433424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Industry matures at Infosecurity Europe 欧洲信息安全行业成熟
Infosecurity Today Pub Date : 2006-05-01 DOI: 10.1016/S1742-6847(06)70412-8
Angus McIlwraith
{"title":"Industry matures at Infosecurity Europe","authors":"Angus McIlwraith","doi":"10.1016/S1742-6847(06)70412-8","DOIUrl":"10.1016/S1742-6847(06)70412-8","url":null,"abstract":"<div><p>Veteran show-goer Angus McIlwraith was pleasantly surprised by the product maturity evident at the recent Infosecurity exhibition in London.</p></div>","PeriodicalId":100673,"journal":{"name":"Infosecurity Today","volume":"3 3","pages":"Page 38"},"PeriodicalIF":0.0,"publicationDate":"2006-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1742-6847(06)70412-8","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73949464","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Webroot spies enterprise growth Webroot监视企业成长
Infosecurity Today Pub Date : 2006-05-01 DOI: 10.1016/S1742-6847(06)70410-4
Cath Everett
{"title":"Webroot spies enterprise growth","authors":"Cath Everett","doi":"10.1016/S1742-6847(06)70410-4","DOIUrl":"10.1016/S1742-6847(06)70410-4","url":null,"abstract":"<div><p>Webroot is currently the leading pure play anti-spyware vendor, but its desire to remain independent may make it vulnerable as the market consolidates.</p></div>","PeriodicalId":100673,"journal":{"name":"Infosecurity Today","volume":"3 3","pages":"Pages 32-34"},"PeriodicalIF":0.0,"publicationDate":"2006-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1742-6847(06)70410-4","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81576028","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Smart cards face long wait 智能卡面临着漫长的等待
Infosecurity Today Pub Date : 2006-05-01 DOI: 10.1016/S1742-6847(06)70407-4
Cath Everett
{"title":"Smart cards face long wait","authors":"Cath Everett","doi":"10.1016/S1742-6847(06)70407-4","DOIUrl":"10.1016/S1742-6847(06)70407-4","url":null,"abstract":"<div><p>Smart cards may be in your cellphone and bank card but relative few organizations are using them as they should – to authenticate identity.</p></div>","PeriodicalId":100673,"journal":{"name":"Infosecurity Today","volume":"3 3","pages":"Pages 22-23"},"PeriodicalIF":0.0,"publicationDate":"2006-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1742-6847(06)70407-4","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87583757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Product roundup 产品综述
Infosecurity Today Pub Date : 2006-05-01 DOI: 10.1016/S1742-6847(06)70417-7
{"title":"Product roundup","authors":"","doi":"10.1016/S1742-6847(06)70417-7","DOIUrl":"https://doi.org/10.1016/S1742-6847(06)70417-7","url":null,"abstract":"","PeriodicalId":100673,"journal":{"name":"Infosecurity Today","volume":"3 3","pages":"Pages 43-46"},"PeriodicalIF":0.0,"publicationDate":"2006-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1742-6847(06)70417-7","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136530765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Big Con 大骗局
Infosecurity Today Pub Date : 2006-05-01 DOI: 10.1016/S1742-6847(06)70404-9
SA Mathieson
{"title":"The Big Con","authors":"SA Mathieson","doi":"10.1016/S1742-6847(06)70404-9","DOIUrl":"10.1016/S1742-6847(06)70404-9","url":null,"abstract":"<div><p>Hackers and penetration testers use our social habits and expectations to infiltrate our firms and our lives. A better understanding of the risks will encourage the required changes.</p></div>","PeriodicalId":100673,"journal":{"name":"Infosecurity Today","volume":"3 3","pages":"Pages 12-14"},"PeriodicalIF":0.0,"publicationDate":"2006-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1742-6847(06)70404-9","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79372108","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
McKinnon extradition no risk to pen testers 麦金农引渡对渗透测试人员没有风险
Infosecurity Today Pub Date : 2006-05-01 DOI: 10.1016/S1742-6847(06)70399-8
SA Mathieson
{"title":"McKinnon extradition no risk to pen testers","authors":"SA Mathieson","doi":"10.1016/S1742-6847(06)70399-8","DOIUrl":"10.1016/S1742-6847(06)70399-8","url":null,"abstract":"","PeriodicalId":100673,"journal":{"name":"Infosecurity Today","volume":"3 3","pages":"Page 4"},"PeriodicalIF":0.0,"publicationDate":"2006-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1742-6847(06)70399-8","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75178436","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信