Inf. Secur. J. A Glob. Perspect.最新文献

筛选
英文 中文
Professional Certification - What's the Point? 专业认证-有什么意义?
Inf. Secur. J. A Glob. Perspect. Pub Date : 1998-03-01 DOI: 10.1201/1086/43302.7.1.19980301/31022.2
Harold F. Tipton
{"title":"Professional Certification - What's the Point?","authors":"Harold F. Tipton","doi":"10.1201/1086/43302.7.1.19980301/31022.2","DOIUrl":"https://doi.org/10.1201/1086/43302.7.1.19980301/31022.2","url":null,"abstract":"","PeriodicalId":207082,"journal":{"name":"Inf. Secur. J. A Glob. Perspect.","volume":"149 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1998-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115585002","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Network and Internet Security 网络与互联网安全
Inf. Secur. J. A Glob. Perspect. Pub Date : 1997-10-01 DOI: 10.1080/10658989709342539
S. Bellovin
{"title":"Network and Internet Security","authors":"S. Bellovin","doi":"10.1080/10658989709342539","DOIUrl":"https://doi.org/10.1080/10658989709342539","url":null,"abstract":"It sounds good when knowing the network and internet security in this website. This is one of the books that many people looking for. In the past, many people ask about this book as their favourite book to read and collect. And now, we present hat you need quickly. It seems to be so happy to offer you this famous book. It will not become a unity of the way for you to get amazing benefits at all. But, it will serve something that will let you get the best time and moment to spend for reading the book.","PeriodicalId":207082,"journal":{"name":"Inf. Secur. J. A Glob. Perspect.","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122768254","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Facing the Challenge of Vital Records Recovery 面对生命记录恢复的挑战
Inf. Secur. J. A Glob. Perspect. Pub Date : 1900-01-01 DOI: 10.1080/19393559308551350
Cole Emerson
{"title":"Facing the Challenge of Vital Records Recovery","authors":"Cole Emerson","doi":"10.1080/19393559308551350","DOIUrl":"https://doi.org/10.1080/19393559308551350","url":null,"abstract":"For most of us who have moved up to senior management positions, our heads ache whenever we have to get back into the bits and bytes of our work. Unfortunately, no effective records management program was ever developed without digging deeply into the details of how information is used within the organization, and this can require a tremendous amount of patience and hard work. It is no wonder that senior management's eyes roll up and ears shut when we bring up such issues as records management and vital records identification. Sadly, aversion to these issues is common among most of us; recovery of vital records always seems to be the last component developed in the business recovery process. Records management is not a technically elegant area of interest; problems cannot be quickly resolved by some simple piece of hardware or software.","PeriodicalId":207082,"journal":{"name":"Inf. Secur. J. A Glob. Perspect.","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126767693","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Invisible Connections 看不见的连接
Inf. Secur. J. A Glob. Perspect. Pub Date : 1900-01-01 DOI: 10.1080/10658989709342531
R. Poore
{"title":"Invisible Connections","authors":"R. Poore","doi":"10.1080/10658989709342531","DOIUrl":"https://doi.org/10.1080/10658989709342531","url":null,"abstract":"","PeriodicalId":207082,"journal":{"name":"Inf. Secur. J. A Glob. Perspect.","volume":"170 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122290560","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Information warfare and the information systems security professional 信息战和信息系统安全专业
Inf. Secur. J. A Glob. Perspect. Pub Date : 1900-01-01 DOI: 10.1080/10658989709342535
Gerald L. Kovacich
{"title":"Information warfare and the information systems security professional","authors":"Gerald L. Kovacich","doi":"10.1080/10658989709342535","DOIUrl":"https://doi.org/10.1080/10658989709342535","url":null,"abstract":"The ‘Cold War’ has ended, but it has been replaced by new ‘wars’. These wars involve the use of technology as a tool to assist in conducting information warfare. It encompasses electronic warfare, techno-terrorist activities and even economic espionage. The term information warfare (IW) is being talked about as the 21st century method of waging war. The United States, among other countries, is in the process of developing ‘cyberspace weapons’. According to the June 22, 1995 issue of a United States magazine, Washington Technology, “. . . The cyberspace war plans dubbed information warfare by the Pentagon are intended to manipulate the flow of information to enemy leaders, weapons and citizens...“.","PeriodicalId":207082,"journal":{"name":"Inf. Secur. J. A Glob. Perspect.","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122511760","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
The Fight for International Security Solutions 争取国际安全解决方案
Inf. Secur. J. A Glob. Perspect. Pub Date : 1900-01-01 DOI: 10.1080/19393559308551363
C. Blatchford
{"title":"The Fight for International Security Solutions","authors":"C. Blatchford","doi":"10.1080/19393559308551363","DOIUrl":"https://doi.org/10.1080/19393559308551363","url":null,"abstract":"In the new world order, the boundary between national and corporate objectives could become indistinct. Resources aligned as part of the Cold War could be refocused for perverse commercial advantage. One possibility is the shifting of intelligence-gathering capabilities of individual nation states so that they are more overtly targeted at the international corporate environment. Some consider this just a “profitable” adjunct to normal market forces (as in a multinational corporation buying time in the competitive marketplace from an enterprise offering services on a spy satellite). In the extreme, however, it could result in a closer coupling of the national intelligence services to specific, preferred and friendly capitalist enterprises. Moves to align national and corporate security objectives may have already emerged as national authorities agonize over the imbalances in the trade of manufactured goods between the various players.","PeriodicalId":207082,"journal":{"name":"Inf. Secur. J. A Glob. Perspect.","volume":"352 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122841764","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Telephony Security 电话安全
Inf. Secur. J. A Glob. Perspect. Pub Date : 1900-01-01 DOI: 10.1201/1086/43304.8.1.19990301/31056.12
W. Yarberry
{"title":"Telephony Security","authors":"W. Yarberry","doi":"10.1201/1086/43304.8.1.19990301/31056.12","DOIUrl":"https://doi.org/10.1201/1086/43304.8.1.19990301/31056.12","url":null,"abstract":"","PeriodicalId":207082,"journal":{"name":"Inf. Secur. J. A Glob. Perspect.","volume":"282 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122952307","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Top Secret Traffic and the Public ATM Network Infrastructure 绝密流量和公共ATM网络基础设施
Inf. Secur. J. A Glob. Perspect. Pub Date : 1900-01-01 DOI: 10.1201/1086/43301.7.4.19990101/31018.7
H. J. Schumacher, Sumit Ghosh, Tony S. Lee
{"title":"Top Secret Traffic and the Public ATM Network Infrastructure","authors":"H. J. Schumacher, Sumit Ghosh, Tony S. Lee","doi":"10.1201/1086/43301.7.4.19990101/31018.7","DOIUrl":"https://doi.org/10.1201/1086/43301.7.4.19990101/31018.7","url":null,"abstract":"Abstract The current network security paradigm, coupled with the desire to transport classified traffic securely, has caused the U.S. Department of Defense (DoD) to maintain its own isolated networks, distinct from the public ATM network infrastructure. Internally, the DoD maintains four types of completely separate and isolated networks to carry top secret, secret, confidential, and unclassified traffic, respectively. A public ATM network may be viewed as carrying unclassified or nonsecure traffic. Although the cost of maintaining four separate network types is becoming increasingly prohibitive to the DoD, the inability of the public and DoD to utilize each other's network resources runs counter to the current atmosphere of dual use and economies of scale. This article introduces the concept of a “mixed use” network, wherein the four DoD network types and the public ATM network are coalesced into a single, unified network that transports all four types of traffic, efficiently and without compromising the...","PeriodicalId":207082,"journal":{"name":"Inf. Secur. J. A Glob. Perspect.","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123480351","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Twelve Months to Go - and Counting 还有12个月,而且还在继续
Inf. Secur. J. A Glob. Perspect. Pub Date : 1900-01-01 DOI: 10.1201/1086/43301.7.4.19990101/31012.1
Jeffrey L. Ott
{"title":"Twelve Months to Go - and Counting","authors":"Jeffrey L. Ott","doi":"10.1201/1086/43301.7.4.19990101/31012.1","DOIUrl":"https://doi.org/10.1201/1086/43301.7.4.19990101/31012.1","url":null,"abstract":"Abstract In twelve months, the world's computers will hit a technological wall. Some will survive without even noticing the transition. Others will hit so hard, we will feel the impact while sitting in the comfort of our homes. We will know that it is not Dick Clark's New Year's Celebration we feel, but the crashing and burning of countless computers. We in the information technology profession are probably more aware of the underlying issues than the average person but, in the long run, I do not think that really helps.","PeriodicalId":207082,"journal":{"name":"Inf. Secur. J. A Glob. Perspect.","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125470193","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Situational Approach to Integrity 情境下的诚信方法
Inf. Secur. J. A Glob. Perspect. Pub Date : 1900-01-01 DOI: 10.1080/19393559308551359
Harry B. DeMaio
{"title":"A Situational Approach to Integrity","authors":"Harry B. DeMaio","doi":"10.1080/19393559308551359","DOIUrl":"https://doi.org/10.1080/19393559308551359","url":null,"abstract":"Orthodoxy can be both beneficial and destructive. Without a certain amount of orthodoxy in defining security practices and terminology, for example, it would be impossible to develop useful standards. However, orthodoxy should never be an end in itself. Security professionals should be judged according to the effectiveness of their recommendations and actions, not by the number of individuals that quote from their catechism. And yet despite the valuable efforts of a number of professional associations and practitioners to develop a common body of knowledge for information security, I believe that we are inexorably moving toward a world in which circumstances are almost as important as standards and definitions. Such an existential approach to security does not imply an intellectual free-for-all; it means being pragmatic, responsive to individual situations, but in a disciplined and internally consistent manner.","PeriodicalId":207082,"journal":{"name":"Inf. Secur. J. A Glob. Perspect.","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121964344","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信