{"title":"麦金塔安全和数据完整性产品","authors":"M. I. Sobol","doi":"10.1080/19393559308551340","DOIUrl":null,"url":null,"abstract":"Access control, virus prevention, and data integrity have always been concerns for management and information security personnel. Until recently, most of the efforts in this area have been devoted to the IBM PC and compatible equipment. During the past year or so, however, Apple Computer and its Macintosh line of microcomputers have become increasingly popular in business environments. Because of this emerging interest in the Mac and because of the ongoing concern for information protection and data integrity, several vendors are now marketing security products for the Macintosh line of microcomputers. This column reviews several of those products.","PeriodicalId":207082,"journal":{"name":"Inf. Secur. J. A Glob. Perspect.","volume":"31 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Macintosh Security and Data Integrity Products\",\"authors\":\"M. I. Sobol\",\"doi\":\"10.1080/19393559308551340\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Access control, virus prevention, and data integrity have always been concerns for management and information security personnel. Until recently, most of the efforts in this area have been devoted to the IBM PC and compatible equipment. During the past year or so, however, Apple Computer and its Macintosh line of microcomputers have become increasingly popular in business environments. Because of this emerging interest in the Mac and because of the ongoing concern for information protection and data integrity, several vendors are now marketing security products for the Macintosh line of microcomputers. This column reviews several of those products.\",\"PeriodicalId\":207082,\"journal\":{\"name\":\"Inf. Secur. J. A Glob. Perspect.\",\"volume\":\"31 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1900-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Inf. Secur. J. A Glob. Perspect.\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1080/19393559308551340\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Inf. Secur. J. A Glob. Perspect.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1080/19393559308551340","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Access control, virus prevention, and data integrity have always been concerns for management and information security personnel. Until recently, most of the efforts in this area have been devoted to the IBM PC and compatible equipment. During the past year or so, however, Apple Computer and its Macintosh line of microcomputers have become increasingly popular in business environments. Because of this emerging interest in the Mac and because of the ongoing concern for information protection and data integrity, several vendors are now marketing security products for the Macintosh line of microcomputers. This column reviews several of those products.