首页 > 最新文献

Infosecurity Today最新文献

英文 中文
Can you trust your partner? 你能信任你的伴侣吗?
Pub Date : 2006-07-01 DOI: 10.1016/S1742-6847(06)70425-6
Brian McKenna
{"title":"Can you trust your partner?","authors":"Brian McKenna","doi":"10.1016/S1742-6847(06)70425-6","DOIUrl":"10.1016/S1742-6847(06)70425-6","url":null,"abstract":"","PeriodicalId":100673,"journal":{"name":"Infosecurity Today","volume":"3 4","pages":"Page 6"},"PeriodicalIF":0.0,"publicationDate":"2006-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1742-6847(06)70425-6","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88809544","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Russia emerges into the shadows 俄罗斯出现在阴影中
Pub Date : 2006-07-01 DOI: 10.1016/S1742-6847(06)70431-1
Alexander Gudko

Once a dark and closed securotocracy, Russia hopes to build a fleet, light, modern economy. Moscow-based Alexander Gudko surveys.

俄罗斯曾经是一个黑暗而封闭的安全统治国家,现在它希望建立一个灵活、轻便的现代经济体。Alexander Gudko在莫斯科进行了调查。
{"title":"Russia emerges into the shadows","authors":"Alexander Gudko","doi":"10.1016/S1742-6847(06)70431-1","DOIUrl":"10.1016/S1742-6847(06)70431-1","url":null,"abstract":"<div><p>Once a dark and closed securotocracy, Russia hopes to build a fleet, light, modern economy. Moscow-based Alexander Gudko surveys.</p></div>","PeriodicalId":100673,"journal":{"name":"Infosecurity Today","volume":"3 4","pages":"Pages 20-23"},"PeriodicalIF":0.0,"publicationDate":"2006-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1742-6847(06)70431-1","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76053291","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Information security can enable mobile working 信息安全可以实现移动办公
Pub Date : 2006-07-01 DOI: 10.1016/S1742-6847(06)70440-2
Adrian Davis

Help is on hand to protect corporate information and assist in the adoption of mobile devices and technologies.

随时提供帮助,以保护企业信息,并协助采用移动设备和技术。
{"title":"Information security can enable mobile working","authors":"Adrian Davis","doi":"10.1016/S1742-6847(06)70440-2","DOIUrl":"10.1016/S1742-6847(06)70440-2","url":null,"abstract":"<div><p>Help is on hand to protect corporate information and assist in the adoption of mobile devices and technologies.</p></div>","PeriodicalId":100673,"journal":{"name":"Infosecurity Today","volume":"3 4","pages":"Page 42"},"PeriodicalIF":0.0,"publicationDate":"2006-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1742-6847(06)70440-2","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83746713","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Oracle spreads into the middle Oracle向中间扩散
Pub Date : 2006-07-01 DOI: 10.1016/S1742-6847(06)70435-9
Cath Everett

As with politics, so too with software: he who holds the middle ground wins, and Oracle is staking out its claim.

就像在政治上一样,在软件上也是如此:谁站在中间立场,谁就赢了,而甲骨文正在表明自己的立场。
{"title":"Oracle spreads into the middle","authors":"Cath Everett","doi":"10.1016/S1742-6847(06)70435-9","DOIUrl":"10.1016/S1742-6847(06)70435-9","url":null,"abstract":"<div><p>As with politics, so too with software: he who holds the middle ground wins, and Oracle is staking out its claim.</p></div>","PeriodicalId":100673,"journal":{"name":"Infosecurity Today","volume":"3 4","pages":"Pages 34-36"},"PeriodicalIF":0.0,"publicationDate":"2006-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1742-6847(06)70435-9","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77260363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Staying power 持久力
Pub Date : 2006-07-01 DOI: 10.1016/S1742-6847(06)70433-5
Mick James

Business continuity is what it's all about. Here are some new ideas on the oldest topic in business.

业务连续性是它的全部。这里有一些关于商业中最古老的话题的新想法。
{"title":"Staying power","authors":"Mick James","doi":"10.1016/S1742-6847(06)70433-5","DOIUrl":"https://doi.org/10.1016/S1742-6847(06)70433-5","url":null,"abstract":"<div><p>Business continuity is what it's all about. Here are some new ideas on the oldest topic in business.</p></div>","PeriodicalId":100673,"journal":{"name":"Infosecurity Today","volume":"3 4","pages":"Pages 28-30"},"PeriodicalIF":0.0,"publicationDate":"2006-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1742-6847(06)70433-5","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"137398927","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
(ISC)2 scholarship winner aims to please users (ISC)2奖学金获得者旨在取悦用户
Pub Date : 2006-07-01 DOI: 10.1016/S1742-6847(06)70426-8
{"title":"(ISC)2 scholarship winner aims to please users","authors":"","doi":"10.1016/S1742-6847(06)70426-8","DOIUrl":"https://doi.org/10.1016/S1742-6847(06)70426-8","url":null,"abstract":"","PeriodicalId":100673,"journal":{"name":"Infosecurity Today","volume":"3 4","pages":"Page 6"},"PeriodicalIF":0.0,"publicationDate":"2006-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1742-6847(06)70426-8","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"137398565","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Product roundup 产品综述
Pub Date : 2006-07-01 DOI: 10.1016/S1742-6847(06)70441-4
{"title":"Product roundup","authors":"","doi":"10.1016/S1742-6847(06)70441-4","DOIUrl":"https://doi.org/10.1016/S1742-6847(06)70441-4","url":null,"abstract":"","PeriodicalId":100673,"journal":{"name":"Infosecurity Today","volume":"3 4","pages":"Pages 43-45"},"PeriodicalIF":0.0,"publicationDate":"2006-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1742-6847(06)70441-4","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"137265206","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Nokia and G&D connect to turn cellphones into credit cards 诺基亚和G&D合作,将手机变成信用卡
Pub Date : 2006-07-01 DOI: 10.1016/S1742-6847(06)70422-0
Ian Grant
{"title":"Nokia and G&D connect to turn cellphones into credit cards","authors":"Ian Grant","doi":"10.1016/S1742-6847(06)70422-0","DOIUrl":"10.1016/S1742-6847(06)70422-0","url":null,"abstract":"","PeriodicalId":100673,"journal":{"name":"Infosecurity Today","volume":"3 4","pages":"Page 4"},"PeriodicalIF":0.0,"publicationDate":"2006-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1742-6847(06)70422-0","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81881404","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Trends help the wise prepare 趋势帮助聪明人做好准备
Pub Date : 2006-07-01 DOI: 10.1016/S1742-6847(06)70428-1
Mark Zimmerman

IT managers need to understand how malcode and exploit activity changes if they are to prioritize correctly their efforts to protect their employers' information assets.

如果IT经理要正确地优先考虑保护雇主信息资产的工作,他们需要了解恶意代码和利用活动变化的方式。
{"title":"Trends help the wise prepare","authors":"Mark Zimmerman","doi":"10.1016/S1742-6847(06)70428-1","DOIUrl":"10.1016/S1742-6847(06)70428-1","url":null,"abstract":"<div><p>IT managers need to understand how malcode and exploit activity changes if they are to prioritize correctly their efforts to protect their employers' information assets.</p></div>","PeriodicalId":100673,"journal":{"name":"Infosecurity Today","volume":"3 4","pages":"Pages 8-9"},"PeriodicalIF":0.0,"publicationDate":"2006-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1742-6847(06)70428-1","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76641137","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Microsoft makes stealthy progress into security market 微软悄悄进军安全市场
Pub Date : 2006-07-01 DOI: 10.1016/S1742-6847(06)70427-X
Sarah Hilley
{"title":"Microsoft makes stealthy progress into security market","authors":"Sarah Hilley","doi":"10.1016/S1742-6847(06)70427-X","DOIUrl":"10.1016/S1742-6847(06)70427-X","url":null,"abstract":"","PeriodicalId":100673,"journal":{"name":"Infosecurity Today","volume":"3 4","pages":"Page 6"},"PeriodicalIF":0.0,"publicationDate":"2006-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1742-6847(06)70427-X","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88993728","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Infosecurity Today
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1