首页 > 最新文献

Computer Fraud & Security Bulletin最新文献

英文 中文
PC security and asset control service 个人电脑安全和资产控制服务
Pub Date : 1995-10-01 DOI: 10.1016/0142-0496(95)80041-7
{"title":"PC security and asset control service","authors":"","doi":"10.1016/0142-0496(95)80041-7","DOIUrl":"https://doi.org/10.1016/0142-0496(95)80041-7","url":null,"abstract":"","PeriodicalId":100312,"journal":{"name":"Computer Fraud & Security Bulletin","volume":"1995 10","pages":"Page 7"},"PeriodicalIF":0.0,"publicationDate":"1995-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/0142-0496(95)80041-7","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"92338753","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Viruses get a day of their own 病毒有自己的一天
Pub Date : 1995-10-01 DOI: 10.1016/0142-0496(95)80044-1
Chris Bucholtz
{"title":"Viruses get a day of their own","authors":"Chris Bucholtz","doi":"10.1016/0142-0496(95)80044-1","DOIUrl":"10.1016/0142-0496(95)80044-1","url":null,"abstract":"","PeriodicalId":100312,"journal":{"name":"Computer Fraud & Security Bulletin","volume":"1995 10","pages":"Page 10"},"PeriodicalIF":0.0,"publicationDate":"1995-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/0142-0496(95)80044-1","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77239896","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Events 事件
Pub Date : 1995-10-01 DOI: 10.1016/0142-0496(95)80050-6
{"title":"Events","authors":"","doi":"10.1016/0142-0496(95)80050-6","DOIUrl":"https://doi.org/10.1016/0142-0496(95)80050-6","url":null,"abstract":"","PeriodicalId":100312,"journal":{"name":"Computer Fraud & Security Bulletin","volume":"1995 10","pages":"Page 20"},"PeriodicalIF":0.0,"publicationDate":"1995-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/0142-0496(95)80050-6","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"137009125","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Trainee hacks tube computer 培训生黑电脑
Pub Date : 1995-10-01 DOI: 10.1016/0142-0496(95)80023-9
{"title":"Trainee hacks tube computer","authors":"","doi":"10.1016/0142-0496(95)80023-9","DOIUrl":"https://doi.org/10.1016/0142-0496(95)80023-9","url":null,"abstract":"","PeriodicalId":100312,"journal":{"name":"Computer Fraud & Security Bulletin","volume":"1995 10","pages":"Page 2"},"PeriodicalIF":0.0,"publicationDate":"1995-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/0142-0496(95)80023-9","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"137009127","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hotel hacker found guilty 酒店黑客被判有罪
Pub Date : 1995-10-01 DOI: 10.1016/0142-0496(95)80024-7
{"title":"Hotel hacker found guilty","authors":"","doi":"10.1016/0142-0496(95)80024-7","DOIUrl":"https://doi.org/10.1016/0142-0496(95)80024-7","url":null,"abstract":"","PeriodicalId":100312,"journal":{"name":"Computer Fraud & Security Bulletin","volume":"1995 10","pages":"Page 2"},"PeriodicalIF":0.0,"publicationDate":"1995-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/0142-0496(95)80024-7","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"137009130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Software to help prevent money laundering 帮助防止洗钱的软件
Pub Date : 1995-10-01 DOI: 10.1016/0142-0496(95)80029-8
{"title":"Software to help prevent money laundering","authors":"","doi":"10.1016/0142-0496(95)80029-8","DOIUrl":"https://doi.org/10.1016/0142-0496(95)80029-8","url":null,"abstract":"","PeriodicalId":100312,"journal":{"name":"Computer Fraud & Security Bulletin","volume":"1995 10","pages":"Page 4"},"PeriodicalIF":0.0,"publicationDate":"1995-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/0142-0496(95)80029-8","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136566681","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The software piracy menace 软件盗版威胁
Pub Date : 1995-10-01 DOI: 10.1016/0142-0496(95)80027-1
{"title":"The software piracy menace","authors":"","doi":"10.1016/0142-0496(95)80027-1","DOIUrl":"https://doi.org/10.1016/0142-0496(95)80027-1","url":null,"abstract":"","PeriodicalId":100312,"journal":{"name":"Computer Fraud & Security Bulletin","volume":"1995 10","pages":"Page 3"},"PeriodicalIF":0.0,"publicationDate":"1995-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/0142-0496(95)80027-1","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136566682","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dirty money in clean systems 肮脏的钱流入干净的系统
Pub Date : 1995-10-01 DOI: 10.1016/0142-0496(95)80048-4
Nigel Morris-Cotterill

It is said that the laundering of the proceeds of crime is the third biggest industry by value worldwide. In the USA a survey stated that 90% of notes in circulation are tainted with narcotics. Governments all over the world are falling into line and drawing up legislation to control the movement of proceeds of crime. The EC (as it was) in 1991 accepted that it was not possible to control crime by targeting the criminal and that the only way of reducing crime seemed to be try to prevent criminals profiting from their labours. And of course, to profit, the criminal needs to spend money and, wherever money is spent, it sooner or later finds its way into the financial services industry through banking or investments.

据说,犯罪所得的洗钱是全球第三大产业。在美国,一项调查表明,90%的流通纸币被麻醉品污染。世界各国政府正在采取一致行动,制定法律来控制犯罪收益的流动。1991年,欧共体承认,不可能通过打击罪犯来控制犯罪,减少犯罪的唯一途径似乎是设法防止罪犯从他们的劳动中获利。当然,为了获利,犯罪分子需要花钱,无论钱花在哪里,它迟早会通过银行或投资进入金融服务业。
{"title":"Dirty money in clean systems","authors":"Nigel Morris-Cotterill","doi":"10.1016/0142-0496(95)80048-4","DOIUrl":"10.1016/0142-0496(95)80048-4","url":null,"abstract":"<div><p>It is said that the laundering of the proceeds of crime is the third biggest industry by value worldwide. In the USA a survey stated that 90% of notes in circulation are tainted with narcotics. Governments all over the world are falling into line and drawing up legislation to control the movement of proceeds of crime. The EC (as it was) in 1991 accepted that it was not possible to control crime by targeting the criminal and that the only way of reducing crime seemed to be try to prevent criminals profiting from their labours. And of course, to profit, the criminal needs to spend money and, wherever money is spent, it sooner or later finds its way into the financial services industry through banking or investments.</p></div>","PeriodicalId":100312,"journal":{"name":"Computer Fraud & Security Bulletin","volume":"1995 10","pages":"Pages 16-18"},"PeriodicalIF":0.0,"publicationDate":"1995-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/0142-0496(95)80048-4","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90477860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security of the software cycle 软件周期的安全性
Pub Date : 1995-10-01 DOI: 10.1016/0142-0496(95)80038-7
{"title":"Security of the software cycle","authors":"","doi":"10.1016/0142-0496(95)80038-7","DOIUrl":"https://doi.org/10.1016/0142-0496(95)80038-7","url":null,"abstract":"","PeriodicalId":100312,"journal":{"name":"Computer Fraud & Security Bulletin","volume":"1995 10","pages":"Page 7"},"PeriodicalIF":0.0,"publicationDate":"1995-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/0142-0496(95)80038-7","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"92234274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
NetWare 4 receives high marks for security NetWare 4在安全性方面得到了很高的评价
Pub Date : 1995-10-01 DOI: 10.1016/0142-0496(95)80043-3
Erin English
{"title":"NetWare 4 receives high marks for security","authors":"Erin English","doi":"10.1016/0142-0496(95)80043-3","DOIUrl":"10.1016/0142-0496(95)80043-3","url":null,"abstract":"","PeriodicalId":100312,"journal":{"name":"Computer Fraud & Security Bulletin","volume":"1995 10","pages":"Pages 9-10"},"PeriodicalIF":0.0,"publicationDate":"1995-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/0142-0496(95)80043-3","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86209712","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Computer Fraud & Security Bulletin
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1