Inf. Secur. J. A Glob. Perspect.最新文献

筛选
英文 中文
Two New Books on UNIX and Data Base Security 两本关于UNIX和数据库安全的新书
Inf. Secur. J. A Glob. Perspect. Pub Date : 1900-01-01 DOI: 10.1080/10658989409342443
R. Moeller
{"title":"Two New Books on UNIX and Data Base Security","authors":"R. Moeller","doi":"10.1080/10658989409342443","DOIUrl":"https://doi.org/10.1080/10658989409342443","url":null,"abstract":"Taylor & Francis makes every effort to ensure the accuracy of all the information (the “Content”) contained in the publications on our platform. However, Taylor & Francis, our agents, and our licensors make no representations or warranties whatsoever as to the accuracy, completeness, or suitability for any purpose of the Content. Any opinions and views expressed in this publication are the opinions and views of the authors, and are not the views of or endorsed by Taylor & Francis. The accuracy of the Content should not be relied upon and should be independently verified with primary sources of information. Taylor and Francis shall not be liable for any losses, actions, claims, proceedings, demands, costs, expenses, damages, and other liabilities whatsoever or howsoever caused arising directly or indirectly in connection with, in relation to or arising out of the use of the Content.","PeriodicalId":207082,"journal":{"name":"Inf. Secur. J. A Glob. Perspect.","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116807702","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Single Sign-on and Security in a Client/Server Environment 客户端/服务器环境中的单点登录和安全性
Inf. Secur. J. A Glob. Perspect. Pub Date : 1900-01-01 DOI: 10.1080/10658989509342508
Ralph P. Massaro
{"title":"Single Sign-on and Security in a Client/Server Environment","authors":"Ralph P. Massaro","doi":"10.1080/10658989509342508","DOIUrl":"https://doi.org/10.1080/10658989509342508","url":null,"abstract":"","PeriodicalId":207082,"journal":{"name":"Inf. Secur. J. A Glob. Perspect.","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115244515","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Is Error Detection a Security Concern? 错误检测是一个安全问题吗?
Inf. Secur. J. A Glob. Perspect. Pub Date : 1900-01-01 DOI: 10.1080/19393559308551339
W. List
{"title":"Is Error Detection a Security Concern?","authors":"W. List","doi":"10.1080/19393559308551339","DOIUrl":"https://doi.org/10.1080/19393559308551339","url":null,"abstract":"","PeriodicalId":207082,"journal":{"name":"Inf. Secur. J. A Glob. Perspect.","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123088960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Securing the NET (and Other Issues) 保护。NET(和其他问题)
Inf. Secur. J. A Glob. Perspect. Pub Date : 1900-01-01 DOI: 10.1080/10658989509342488
R. Moeller
{"title":"Securing the NET (and Other Issues)","authors":"R. Moeller","doi":"10.1080/10658989509342488","DOIUrl":"https://doi.org/10.1080/10658989509342488","url":null,"abstract":"","PeriodicalId":207082,"journal":{"name":"Inf. Secur. J. A Glob. Perspect.","volume":"602 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123214693","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Developing the Office Recovery Plan 制定办公室恢复计划
Inf. Secur. J. A Glob. Perspect. Pub Date : 1900-01-01 DOI: 10.1080/19393559308551369
Andrew J. Logan
{"title":"Developing the Office Recovery Plan","authors":"Andrew J. Logan","doi":"10.1080/19393559308551369","DOIUrl":"https://doi.org/10.1080/19393559308551369","url":null,"abstract":"When developing an office recovery plan, the contingency planner must address two major concerns. The first concern is the complete loss or extended inaccessibility of the building that houses the office environment. The second concern of the contingency planner in developing the office recovery plan is the loss of access to mainframe computers if the company's data center experiences a disaster. Many companies have established data processing centers remotely located from the office environment. They have developed separate disaster recovery strategies to restore processing services, usually at an alternative processing site (e.g., a commercial hot site or an in-house backup facility). Depending on the criticality of the business functions to be restored, users in the office environment could be without data processing services for a period of several hours to a few days.","PeriodicalId":207082,"journal":{"name":"Inf. Secur. J. A Glob. Perspect.","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123424422","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Planning and Implementing Kerberos for Large Distributed Systems Part 1 为大型分布式系统规划和实现Kerberos,第1部分
Inf. Secur. J. A Glob. Perspect. Pub Date : 1900-01-01 DOI: 10.1080/10658989409342444
Ray Kaplan, Joe Kovara, G. Zorn
{"title":"Planning and Implementing Kerberos for Large Distributed Systems Part 1","authors":"Ray Kaplan, Joe Kovara, G. Zorn","doi":"10.1080/10658989409342444","DOIUrl":"https://doi.org/10.1080/10658989409342444","url":null,"abstract":"Taylor & Francis makes every effort to ensure the accuracy of all the information (the “Content”) contained in the publications on our platform. However, Taylor & Francis, our agents, and our licensors make no representations or warranties whatsoever as to the accuracy, completeness, or suitability for any purpose of the Content. Any opinions and views expressed in this publication are the opinions and views of the authors, and are not the views of or endorsed by Taylor & Francis. The accuracy of the Content should not be relied upon and should be independently verified with primary sources of information. Taylor and Francis shall not be liable for any losses, actions, claims, proceedings, demands, costs, expenses, damages, and other liabilities whatsoever or howsoever caused arising directly or indirectly in connection with, in relation to or arising out of the use of the Content.","PeriodicalId":207082,"journal":{"name":"Inf. Secur. J. A Glob. Perspect.","volume":"287 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123451984","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Taking Fax Security Seriously 重视传真安全
Inf. Secur. J. A Glob. Perspect. Pub Date : 1900-01-01 DOI: 10.1080/19393559308551347
Harry B. DeMaio
{"title":"Taking Fax Security Seriously","authors":"Harry B. DeMaio","doi":"10.1080/19393559308551347","DOIUrl":"https://doi.org/10.1080/19393559308551347","url":null,"abstract":"It's not uncommon when security specialists get together for someone to conduct an impromptu poll on such burning issues as single sign-on, client/server security, multiplatform security, data sharing, dial-up security, and downsizing. If the concerns of my security consulting clients are any indicator, these issues certainly belong there. Important as these topics are, however, I want to raise a subject that seldom makes that list but should: the physical and procedural security of fax devices. The issue of fax security isn't difficult to understand or to explain to others. The problem can be presented to business executives with ample justification for concern—and real solutions that require a relatively small investment can be proposed. All in all, it's an attractive combination of problem and solution that doesn't come around often in the field of information security.","PeriodicalId":207082,"journal":{"name":"Inf. Secur. J. A Glob. Perspect.","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130273694","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security Testing Is Not All The Same: A Reference Taxonomy 安全性测试并不完全相同:参考分类法
Inf. Secur. J. A Glob. Perspect. Pub Date : 1900-01-01 DOI: 10.1080/10658989809342549
Jim Kates
{"title":"Security Testing Is Not All The Same: A Reference Taxonomy","authors":"Jim Kates","doi":"10.1080/10658989809342549","DOIUrl":"https://doi.org/10.1080/10658989809342549","url":null,"abstract":"Security managers are always being offered new methods to test the security of their systems. Unfamiliarity with the terminology and types of testing can result in the manager not getting the services he or she is seeking. This article presents a taxonomy of terms in order to classify the different types of services available, and explain how each technique evaluates security controls in real-world settings.","PeriodicalId":207082,"journal":{"name":"Inf. Secur. J. A Glob. Perspect.","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129258782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Data Encryption 数据加密
Inf. Secur. J. A Glob. Perspect. Pub Date : 1900-01-01 DOI: 10.1080/10658989409342465
M. I. Sobol
{"title":"Data Encryption","authors":"M. I. Sobol","doi":"10.1080/10658989409342465","DOIUrl":"https://doi.org/10.1080/10658989409342465","url":null,"abstract":"Taylor & Francis makes every effort to ensure the accuracy of all the information (the “Content”) contained in the publications on our platform. However, Taylor & Francis, our agents, and our licensors make no representations or warranties whatsoever as to the accuracy, completeness, or suitability for any purpose of the Content. Any opinions and views expressed in this publication are the opinions and views of the authors, and are not the views of or endorsed by Taylor & Francis. The accuracy of the Content should not be relied upon and should be independently verified with primary sources of information. Taylor and Francis shall not be liable for any losses, actions, claims, proceedings, demands, costs, expenses, damages, and other liabilities whatsoever or howsoever caused arising directly or indirectly in connection with, in relation to or arising out of the use of the Content.","PeriodicalId":207082,"journal":{"name":"Inf. Secur. J. A Glob. Perspect.","volume":"227 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129346655","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Securing NetWare Against Trojan Horse Attacks 保护网络免受特洛伊木马攻击
Inf. Secur. J. A Glob. Perspect. Pub Date : 1900-01-01 DOI: 10.1080/10658989509342478
E. Sawicki
{"title":"Securing NetWare Against Trojan Horse Attacks","authors":"E. Sawicki","doi":"10.1080/10658989509342478","DOIUrl":"https://doi.org/10.1080/10658989509342478","url":null,"abstract":"Taylor & Francis makes every effort to ensure the accuracy of all the information (the “Content”) contained in the publications on our platform. However, Taylor & Francis, our agents, and our licensors make no representations or warranties whatsoever as to the accuracy, completeness, or suitability for any purpose of the Content. Any opinions and views expressed in this publication are the opinions and views of the authors, and are not the views of or endorsed by Taylor & Francis. The accuracy of the Content should not be relied upon and should be independently verified with primary sources of information. Taylor and Francis shall not be liable for any losses, actions, claims, proceedings, demands, costs, expenses, damages, and other liabilities whatsoever or howsoever caused arising directly or indirectly in connection with, in relation to or arising out of the use of the Content.","PeriodicalId":207082,"journal":{"name":"Inf. Secur. J. A Glob. Perspect.","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122820843","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信