{"title":"十大拨入安全错误","authors":"Heather Smartt","doi":"10.1201/1086/43300.7.3.19980901/31001.2","DOIUrl":null,"url":null,"abstract":"Abstract A constant barrage of information about hackers bombards companies. There are hundreds, if not thousands of books about computer security, network security, and operating system security. There are a number of security products on the market — some keep people out, some keep people in, some track people down. All of the Big Five accounting firms and many small, boutique firms are offering security consulting services. It is fair to say that computer security is a hot topic in society.","PeriodicalId":207082,"journal":{"name":"Inf. Secur. J. A Glob. Perspect.","volume":"19 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1998-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Top 10 Dial-In Security Mistakes\",\"authors\":\"Heather Smartt\",\"doi\":\"10.1201/1086/43300.7.3.19980901/31001.2\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Abstract A constant barrage of information about hackers bombards companies. There are hundreds, if not thousands of books about computer security, network security, and operating system security. There are a number of security products on the market — some keep people out, some keep people in, some track people down. All of the Big Five accounting firms and many small, boutique firms are offering security consulting services. It is fair to say that computer security is a hot topic in society.\",\"PeriodicalId\":207082,\"journal\":{\"name\":\"Inf. Secur. J. A Glob. Perspect.\",\"volume\":\"19 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1998-09-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Inf. Secur. J. A Glob. Perspect.\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1201/1086/43300.7.3.19980901/31001.2\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Inf. Secur. J. A Glob. Perspect.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1201/1086/43300.7.3.19980901/31001.2","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Abstract A constant barrage of information about hackers bombards companies. There are hundreds, if not thousands of books about computer security, network security, and operating system security. There are a number of security products on the market — some keep people out, some keep people in, some track people down. All of the Big Five accounting firms and many small, boutique firms are offering security consulting services. It is fair to say that computer security is a hot topic in society.