首页 > 最新文献

Infosecurity Today最新文献

英文 中文
The law starts to bite back 法律开始起反作用
Pub Date : 2006-05-01 DOI: 10.1016/S1742-6847(06)70415-3
Andy Jones

Information security professionals need to start dealing with the law, before the law deals with them.

信息安全专业人员需要在法律处理他们之前就开始处理法律。
{"title":"The law starts to bite back","authors":"Andy Jones","doi":"10.1016/S1742-6847(06)70415-3","DOIUrl":"10.1016/S1742-6847(06)70415-3","url":null,"abstract":"<div><p>Information security professionals need to start dealing with the law, before the law deals with them.</p></div>","PeriodicalId":100673,"journal":{"name":"Infosecurity Today","volume":"3 3","pages":"Page 41"},"PeriodicalIF":0.0,"publicationDate":"2006-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1742-6847(06)70415-3","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77566378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Empire and Federation differ in security style 帝国和联邦的安保风格不同
Pub Date : 2006-05-01 DOI: 10.1016/S1742-6847(06)70405-0
Stefan Krempl

The political histories of Austria and Switzerland show up in their differing approaches to safeguarding their citizens' data and privacy.

奥地利和瑞士的政治历史体现在两国保护公民数据和隐私的不同方式上。
{"title":"Empire and Federation differ in security style","authors":"Stefan Krempl","doi":"10.1016/S1742-6847(06)70405-0","DOIUrl":"10.1016/S1742-6847(06)70405-0","url":null,"abstract":"<div><p>The political histories of Austria and Switzerland show up in their differing approaches to safeguarding their citizens' data and privacy.</p></div>","PeriodicalId":100673,"journal":{"name":"Infosecurity Today","volume":"3 3","pages":"Pages 16-18"},"PeriodicalIF":0.0,"publicationDate":"2006-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1742-6847(06)70405-0","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78875006","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A return to traditional methods 回归传统方法
Pub Date : 2006-05-01 DOI: 10.1016/S1742-6847(06)70414-1
Stuart King

Automated test procedures are the lazy, misleading way to test security. Use your loaf too.

自动化测试过程是一种懒惰的、误导人的测试安全性的方法。动动脑子吧。
{"title":"A return to traditional methods","authors":"Stuart King","doi":"10.1016/S1742-6847(06)70414-1","DOIUrl":"10.1016/S1742-6847(06)70414-1","url":null,"abstract":"<div><p>Automated test procedures are the lazy, misleading way to test security. Use your loaf too.</p></div>","PeriodicalId":100673,"journal":{"name":"Infosecurity Today","volume":"3 3","pages":"Page 40"},"PeriodicalIF":0.0,"publicationDate":"2006-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1742-6847(06)70414-1","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76067295","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Australian computer crime changes tack 澳大利亚的计算机犯罪改变了策略
Pub Date : 2006-05-01 DOI: 10.1016/S1742-6847(06)70401-3
Ian Grant

Fewer reported attacks and less harm done suggest Australian cybercrime is under control. Big mistake.

更少的攻击报告和更少的伤害表明澳大利亚的网络犯罪得到了控制。大错误。
{"title":"Australian computer crime changes tack","authors":"Ian Grant","doi":"10.1016/S1742-6847(06)70401-3","DOIUrl":"10.1016/S1742-6847(06)70401-3","url":null,"abstract":"<div><p>Fewer reported attacks and less harm done suggest Australian cybercrime is under control. Big mistake.</p></div>","PeriodicalId":100673,"journal":{"name":"Infosecurity Today","volume":"3 3","pages":"Page 6"},"PeriodicalIF":0.0,"publicationDate":"2006-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1742-6847(06)70401-3","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78860359","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Managing mobile 管理移动
Pub Date : 2006-05-01 DOI: 10.1016/S1742-6847(06)70409-8
Stephen Pritchard

Powerful new mobile network access devices threaten to breach corporate information security bulwarks. Here's what to do.

强大的新型移动网络接入设备有可能破坏企业的信息安全壁垒。下面是该怎么做。
{"title":"Managing mobile","authors":"Stephen Pritchard","doi":"10.1016/S1742-6847(06)70409-8","DOIUrl":"https://doi.org/10.1016/S1742-6847(06)70409-8","url":null,"abstract":"<div><p>Powerful new mobile network access devices threaten to breach corporate information security bulwarks. Here's what to do.</p></div>","PeriodicalId":100673,"journal":{"name":"Infosecurity Today","volume":"3 3","pages":"Pages 28-30"},"PeriodicalIF":0.0,"publicationDate":"2006-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1742-6847(06)70409-8","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136496090","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Lost highway 迷失的高速公路
Pub Date : 2006-05-01 DOI: 10.1016/S1742-6847(06)70413-X
Ken Munro

Mischief and worse await public and private transport authorities as their kit joins the data highway.

随着公共和私人交通部门的工具加入数据高速公路,恶作剧和更糟的事情正在等着他们。
{"title":"Lost highway","authors":"Ken Munro","doi":"10.1016/S1742-6847(06)70413-X","DOIUrl":"https://doi.org/10.1016/S1742-6847(06)70413-X","url":null,"abstract":"<div><p>Mischief and worse await public and private transport authorities as their kit joins the data highway.</p></div>","PeriodicalId":100673,"journal":{"name":"Infosecurity Today","volume":"3 3","pages":"Page 39"},"PeriodicalIF":0.0,"publicationDate":"2006-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1742-6847(06)70413-X","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136549531","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The money's at the margins 钱在边缘
Pub Date : 2006-05-01 DOI: 10.1016/S1742-6847(06)70403-7
Wade Baker

It's time information security professionals started using marginal returns to analyse and rank their investments.

现在是信息安全专业人员开始使用边际回报来分析和排名他们的投资的时候了。
{"title":"The money's at the margins","authors":"Wade Baker","doi":"10.1016/S1742-6847(06)70403-7","DOIUrl":"10.1016/S1742-6847(06)70403-7","url":null,"abstract":"<div><p>It's time information security professionals started using marginal returns to analyse and rank their investments.</p></div>","PeriodicalId":100673,"journal":{"name":"Infosecurity Today","volume":"3 3","pages":"Pages 10-11"},"PeriodicalIF":0.0,"publicationDate":"2006-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1742-6847(06)70403-7","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91252803","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
RFID – another technology, another security mess? RFID——另一项技术,另一个安全问题?
Pub Date : 2006-05-01 DOI: 10.1016/S1742-6847(06)70411-6
William Knight

It's infinitely useful, has a wide range of applications and is going in at a gallop. But has anybody really thought through the security implications of radio frequency identification (RFID)?

它是无限有用的,具有广泛的应用范围,并且正在飞速发展。但是,有没有人真正考虑过射频识别(RFID)的安全隐患?
{"title":"RFID – another technology, another security mess?","authors":"William Knight","doi":"10.1016/S1742-6847(06)70411-6","DOIUrl":"10.1016/S1742-6847(06)70411-6","url":null,"abstract":"<div><p>It's infinitely useful, has a wide range of applications and is going in at a gallop. But has anybody really thought through the security implications of radio frequency identification (RFID)?</p></div>","PeriodicalId":100673,"journal":{"name":"Infosecurity Today","volume":"3 3","pages":"Pages 35-37"},"PeriodicalIF":0.0,"publicationDate":"2006-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1742-6847(06)70411-6","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91375855","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Industry calendar 行业的日历
Pub Date : 2006-05-01 DOI: 10.1016/S1742-6847(06)70419-0
{"title":"Industry calendar","authors":"","doi":"10.1016/S1742-6847(06)70419-0","DOIUrl":"https://doi.org/10.1016/S1742-6847(06)70419-0","url":null,"abstract":"","PeriodicalId":100673,"journal":{"name":"Infosecurity Today","volume":"3 3","pages":"Page 48"},"PeriodicalIF":0.0,"publicationDate":"2006-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1742-6847(06)70419-0","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136531856","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Crypto goes into the bloodstream 密码进入血液
Pub Date : 2006-05-01 DOI: 10.1016/S1742-6847(06)70416-5
Daniel Murton

Cryptography is moving to centre-stage as companies seek to secure their data at rest and in transmission.

随着企业寻求保护静态和传输中的数据,密码学正走向舞台的中心。
{"title":"Crypto goes into the bloodstream","authors":"Daniel Murton","doi":"10.1016/S1742-6847(06)70416-5","DOIUrl":"10.1016/S1742-6847(06)70416-5","url":null,"abstract":"<div><p>Cryptography is moving to centre-stage as companies seek to secure their data at rest and in transmission.</p></div>","PeriodicalId":100673,"journal":{"name":"Infosecurity Today","volume":"3 3","pages":"Page 42"},"PeriodicalIF":0.0,"publicationDate":"2006-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1742-6847(06)70416-5","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82454245","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Infosecurity Today
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1