首页 > 最新文献

Infosecurity最新文献

英文 中文
Year of the Hack 黑客年
Pub Date : 2011-11-01 DOI: 10.1016/S1754-4548(11)70077-8
Fred Donovan

Commonly referred to as the year of the hack, it is no secret what 2011 has become famous for in the information security industry. This year's headlines, reports Fred Donovan, have been made up of data breaches, hacks, APT attacks and mergers and acquisitions

2011年通常被称为“黑客之年”,众所周知,2011年在信息安全行业声名鹊起。据弗雷德·多诺万报道,今年的头条新闻由数据泄露、黑客攻击、APT攻击和并购构成
{"title":"Year of the Hack","authors":"Fred Donovan","doi":"10.1016/S1754-4548(11)70077-8","DOIUrl":"10.1016/S1754-4548(11)70077-8","url":null,"abstract":"<div><p>Commonly referred to as the year of the hack, it is no secret what 2011 has become famous for in the information security industry. This year's headlines, reports <strong>Fred Donovan</strong>, have been made up of data breaches, hacks, APT attacks and mergers and acquisitions</p></div>","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 6","pages":"Pages 8-10"},"PeriodicalIF":0.0,"publicationDate":"2011-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70077-8","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85263625","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Encryption's Weakest Link 加密的最薄弱环节
Pub Date : 2011-11-01 DOI: 10.1016/S1754-4548(11)70086-9
Matthew Pascucci
{"title":"Encryption's Weakest Link","authors":"Matthew Pascucci","doi":"10.1016/S1754-4548(11)70086-9","DOIUrl":"10.1016/S1754-4548(11)70086-9","url":null,"abstract":"","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 6","pages":"Page 44"},"PeriodicalIF":0.0,"publicationDate":"2011-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70086-9","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75133441","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Can Security and Privacy Co-exist? 安全和隐私可以共存吗?
Pub Date : 2011-11-01 DOI: 10.1016/S1754-4548(11)70083-3
Danny Bradbury

Should you have to give up privacy to get more security, or does one actually support the other? Danny Bradbury sounds out the experts

你是否应该放弃隐私来获得更多的安全性,或者两者实际上是相互支持的?丹尼·布拉德伯里听取了专家的意见
{"title":"Can Security and Privacy Co-exist?","authors":"Danny Bradbury","doi":"10.1016/S1754-4548(11)70083-3","DOIUrl":"10.1016/S1754-4548(11)70083-3","url":null,"abstract":"<div><p>Should you have to give up privacy to get more security, or does one actually support the other? <strong>Danny Bradbury</strong> sounds out the experts</p></div>","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 6","pages":"Pages 33-35"},"PeriodicalIF":0.0,"publicationDate":"2011-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70083-3","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91430429","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Breaching through Congress 突破国会
Pub Date : 2011-11-01 DOI: 10.1016/S1754-4548(11)70088-2
Richard Moulds
{"title":"Breaching through Congress","authors":"Richard Moulds","doi":"10.1016/S1754-4548(11)70088-2","DOIUrl":"https://doi.org/10.1016/S1754-4548(11)70088-2","url":null,"abstract":"","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 6","pages":"Page 46"},"PeriodicalIF":0.0,"publicationDate":"2011-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70088-2","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"92087335","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Almost What it Says on the Tin 就像罐头上写的一样
Pub Date : 2011-11-01 DOI: 10.1016/S1754-4548(11)70087-0
Sarb Sembhi
{"title":"Almost What it Says on the Tin","authors":"Sarb Sembhi","doi":"10.1016/S1754-4548(11)70087-0","DOIUrl":"https://doi.org/10.1016/S1754-4548(11)70087-0","url":null,"abstract":"","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 6","pages":"Page 45"},"PeriodicalIF":0.0,"publicationDate":"2011-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70087-0","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"92087336","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Moving on Up 继续前进
Pub Date : 2011-11-01 DOI: 10.1016/S1754-4548(11)70075-4
Eleanor Dallaway (Editor)

Within industry circles, 2011 has become known as the year of the hack, or the year of the black hat if you prefer. Game-changing malware has exploded, proving that the critical national infrastructure is under threat and that cyber war and cyber espionage are very daunting realities.

在业界,2011年被称为黑客之年,或者黑帽之年。改变游戏规则的恶意软件已经爆发,证明关键的国家基础设施受到威胁,网络战争和网络间谍活动是非常令人生畏的现实。
{"title":"Moving on Up","authors":"Eleanor Dallaway (Editor)","doi":"10.1016/S1754-4548(11)70075-4","DOIUrl":"10.1016/S1754-4548(11)70075-4","url":null,"abstract":"<div><p>Within industry circles, 2011 has become known as the year of the hack, or the year of the black hat if you prefer. Game-changing malware has exploded, proving that the critical national infrastructure is under threat and that cyber war and cyber espionage are very daunting realities.</p></div>","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 6","pages":"Page 3"},"PeriodicalIF":0.0,"publicationDate":"2011-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70075-4","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89591080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Breaches in Billable Hours 违反计费时间
Pub Date : 2011-09-01 DOI: 10.1016/S1754-4548(11)70072-9
Marco Cremonini
{"title":"Breaches in Billable Hours","authors":"Marco Cremonini","doi":"10.1016/S1754-4548(11)70072-9","DOIUrl":"10.1016/S1754-4548(11)70072-9","url":null,"abstract":"","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 5","pages":"Page 46"},"PeriodicalIF":0.0,"publicationDate":"2011-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70072-9","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"105623634","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Crossing Borders: The Right Side of Wrong? 跨越国界:错误的正确一面?
Pub Date : 2011-09-01 DOI: 10.1016/S1754-4548(11)70065-1
Wendy M. Grossman

Most nations consider travel data to be crucial to protecting national security. How that data is collected, stored, and secured however seems to be a closely guarded secret. Wendy M. Grossman investigates

大多数国家认为旅行数据对保护国家安全至关重要。然而,如何收集、存储和保护这些数据似乎是一个严格保密的秘密。Wendy M. Grossman对此进行了调查
{"title":"Crossing Borders: The Right Side of Wrong?","authors":"Wendy M. Grossman","doi":"10.1016/S1754-4548(11)70065-1","DOIUrl":"10.1016/S1754-4548(11)70065-1","url":null,"abstract":"<div><p>Most nations consider travel data to be crucial to protecting national security. How that data is collected, stored, and secured however seems to be a closely guarded secret. <strong>Wendy M. Grossman</strong> investigates</p></div>","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 5","pages":"Pages 22-25"},"PeriodicalIF":0.0,"publicationDate":"2011-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70065-1","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"112890616","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Patricia Titus 帕特丽夏提多
Pub Date : 2011-09-01 DOI: 10.1016/S1754-4548(11)70062-6
Drew Amorosi

The road from Minnesota to Washington has many stops, especially when you take the scenic route. Drew Amorosi recently met Patricia Titus of Unisys to regale in her remarkable journey

从明尼苏达州到华盛顿的路上有很多站,尤其是当你走风景优美的路线时。德鲁•阿莫罗西最近与Unisys公司的帕特里夏•提图斯会面,分享了她非凡的旅程
{"title":"Patricia Titus","authors":"Drew Amorosi","doi":"10.1016/S1754-4548(11)70062-6","DOIUrl":"https://doi.org/10.1016/S1754-4548(11)70062-6","url":null,"abstract":"<div><p>The road from Minnesota to Washington has many stops, especially when you take the scenic route. <strong>Drew Amorosi</strong> recently met Patricia Titus of Unisys to regale in her remarkable journey</p></div>","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 5","pages":"Pages 9-12"},"PeriodicalIF":0.0,"publicationDate":"2011-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70062-6","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136736069","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Diary 日记
Pub Date : 2011-09-01 DOI: 10.1016/S1754-4548(11)70073-0
{"title":"Diary","authors":"","doi":"10.1016/S1754-4548(11)70073-0","DOIUrl":"https://doi.org/10.1016/S1754-4548(11)70073-0","url":null,"abstract":"","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 5","pages":"Page 47"},"PeriodicalIF":0.0,"publicationDate":"2011-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70073-0","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"137401569","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Infosecurity
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1