首页 > 最新文献

Infosecurity Today最新文献

英文 中文
Slack space 松弛的空间
Pub Date : 2006-05-01 DOI: 10.1016/S1742-6847(06)70418-9

Welcome to Slack Space, our regular column by industry insider Slack Alice. Chip and PIN fraud, SSL decryption, and CALEA are on her lunch-time gossip menu this time round.

欢迎来到Slack Space,这是业内人士Slack Alice的定期专栏。芯片和密码欺诈,SSL解密,还有CALEA都是她午餐时间的八卦话题。
{"title":"Slack space","authors":"","doi":"10.1016/S1742-6847(06)70418-9","DOIUrl":"https://doi.org/10.1016/S1742-6847(06)70418-9","url":null,"abstract":"<div><p>Welcome to Slack Space, our regular column by industry insider Slack Alice. Chip and PIN fraud, SSL decryption, and CALEA are on her lunch-time gossip menu this time round.</p></div>","PeriodicalId":100673,"journal":{"name":"Infosecurity Today","volume":"3 3","pages":"Page 47"},"PeriodicalIF":0.0,"publicationDate":"2006-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1742-6847(06)70418-9","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136531855","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Telecoms – convergence challenge 电讯-汇流挑战
Pub Date : 2006-05-01 DOI: 10.1016/S1742-6847(06)70406-2
Ian Grant

Churchill said, “Give us the tools and we will finish the job.” We have the infosecurity tools, but the job of managing infosecurity in an age of converged digital networks is only just beginning.

丘吉尔说:“给我们工具,我们就能完成任务。”我们有信息安全工具,但在融合的数字网络时代,管理信息安全的工作才刚刚开始。
{"title":"Telecoms – convergence challenge","authors":"Ian Grant","doi":"10.1016/S1742-6847(06)70406-2","DOIUrl":"10.1016/S1742-6847(06)70406-2","url":null,"abstract":"<div><p>Churchill said, “Give us the tools and we will finish the job.” We have the infosecurity tools, but the job of managing infosecurity in an age of converged digital networks is only just beginning.</p></div>","PeriodicalId":100673,"journal":{"name":"Infosecurity Today","volume":"3 3","pages":"Pages 19-21"},"PeriodicalIF":0.0,"publicationDate":"2006-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1742-6847(06)70406-2","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76863315","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The ‘big con’ for the information age 信息时代的“大骗局”
Pub Date : 2006-05-01 DOI: 10.1016/S1742-6847(06)70398-6
Brian McKenna
{"title":"The ‘big con’ for the information age","authors":"Brian McKenna","doi":"10.1016/S1742-6847(06)70398-6","DOIUrl":"10.1016/S1742-6847(06)70398-6","url":null,"abstract":"","PeriodicalId":100673,"journal":{"name":"Infosecurity Today","volume":"3 3","pages":"Page 3"},"PeriodicalIF":0.0,"publicationDate":"2006-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1742-6847(06)70398-6","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74401593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Aping to defraud – corporate identities at stake 模仿诈骗——企业身份岌岌可危
Pub Date : 2006-05-01 DOI: 10.1016/S1742-6847(06)70408-6
Mick James

There are plenty of scam artists willing to shame your name by trading on your reputation. It takes a concerted effort to stop these corporate ID thieves.

有很多骗子愿意利用你的声誉来羞辱你的名字。要阻止这些公司的身份窃贼,需要大家齐心协力。
{"title":"Aping to defraud – corporate identities at stake","authors":"Mick James","doi":"10.1016/S1742-6847(06)70408-6","DOIUrl":"10.1016/S1742-6847(06)70408-6","url":null,"abstract":"<div><p>There are plenty of scam artists willing to shame your name by trading on your reputation. It takes a concerted effort to stop these corporate ID thieves.</p></div>","PeriodicalId":100673,"journal":{"name":"Infosecurity Today","volume":"3 3","pages":"Pages 24-26"},"PeriodicalIF":0.0,"publicationDate":"2006-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1742-6847(06)70408-6","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73433424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Industry matures at Infosecurity Europe 欧洲信息安全行业成熟
Pub Date : 2006-05-01 DOI: 10.1016/S1742-6847(06)70412-8
Angus McIlwraith

Veteran show-goer Angus McIlwraith was pleasantly surprised by the product maturity evident at the recent Infosecurity exhibition in London.

资深展会常客Angus McIlwraith对最近在伦敦举办的信息安全展上产品的成熟度感到惊喜。
{"title":"Industry matures at Infosecurity Europe","authors":"Angus McIlwraith","doi":"10.1016/S1742-6847(06)70412-8","DOIUrl":"10.1016/S1742-6847(06)70412-8","url":null,"abstract":"<div><p>Veteran show-goer Angus McIlwraith was pleasantly surprised by the product maturity evident at the recent Infosecurity exhibition in London.</p></div>","PeriodicalId":100673,"journal":{"name":"Infosecurity Today","volume":"3 3","pages":"Page 38"},"PeriodicalIF":0.0,"publicationDate":"2006-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1742-6847(06)70412-8","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73949464","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Webroot spies enterprise growth Webroot监视企业成长
Pub Date : 2006-05-01 DOI: 10.1016/S1742-6847(06)70410-4
Cath Everett

Webroot is currently the leading pure play anti-spyware vendor, but its desire to remain independent may make it vulnerable as the market consolidates.

Webroot目前是领先的纯反间谍软件供应商,但其保持独立的愿望可能会使其在市场整合时变得脆弱。
{"title":"Webroot spies enterprise growth","authors":"Cath Everett","doi":"10.1016/S1742-6847(06)70410-4","DOIUrl":"10.1016/S1742-6847(06)70410-4","url":null,"abstract":"<div><p>Webroot is currently the leading pure play anti-spyware vendor, but its desire to remain independent may make it vulnerable as the market consolidates.</p></div>","PeriodicalId":100673,"journal":{"name":"Infosecurity Today","volume":"3 3","pages":"Pages 32-34"},"PeriodicalIF":0.0,"publicationDate":"2006-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1742-6847(06)70410-4","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81576028","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Smart cards face long wait 智能卡面临着漫长的等待
Pub Date : 2006-05-01 DOI: 10.1016/S1742-6847(06)70407-4
Cath Everett

Smart cards may be in your cellphone and bank card but relative few organizations are using them as they should – to authenticate identity.

智能卡可能存在于你的手机和银行卡中,但相对而言,很少有组织使用它们来验证身份。
{"title":"Smart cards face long wait","authors":"Cath Everett","doi":"10.1016/S1742-6847(06)70407-4","DOIUrl":"10.1016/S1742-6847(06)70407-4","url":null,"abstract":"<div><p>Smart cards may be in your cellphone and bank card but relative few organizations are using them as they should – to authenticate identity.</p></div>","PeriodicalId":100673,"journal":{"name":"Infosecurity Today","volume":"3 3","pages":"Pages 22-23"},"PeriodicalIF":0.0,"publicationDate":"2006-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1742-6847(06)70407-4","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87583757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Product roundup 产品综述
Pub Date : 2006-05-01 DOI: 10.1016/S1742-6847(06)70417-7
{"title":"Product roundup","authors":"","doi":"10.1016/S1742-6847(06)70417-7","DOIUrl":"https://doi.org/10.1016/S1742-6847(06)70417-7","url":null,"abstract":"","PeriodicalId":100673,"journal":{"name":"Infosecurity Today","volume":"3 3","pages":"Pages 43-46"},"PeriodicalIF":0.0,"publicationDate":"2006-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1742-6847(06)70417-7","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136530765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Big Con 大骗局
Pub Date : 2006-05-01 DOI: 10.1016/S1742-6847(06)70404-9
SA Mathieson

Hackers and penetration testers use our social habits and expectations to infiltrate our firms and our lives. A better understanding of the risks will encourage the required changes.

黑客和渗透测试者利用我们的社交习惯和期望来渗透我们的公司和生活。对风险的更好理解将鼓励必要的改变。
{"title":"The Big Con","authors":"SA Mathieson","doi":"10.1016/S1742-6847(06)70404-9","DOIUrl":"10.1016/S1742-6847(06)70404-9","url":null,"abstract":"<div><p>Hackers and penetration testers use our social habits and expectations to infiltrate our firms and our lives. A better understanding of the risks will encourage the required changes.</p></div>","PeriodicalId":100673,"journal":{"name":"Infosecurity Today","volume":"3 3","pages":"Pages 12-14"},"PeriodicalIF":0.0,"publicationDate":"2006-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1742-6847(06)70404-9","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79372108","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
McKinnon extradition no risk to pen testers 麦金农引渡对渗透测试人员没有风险
Pub Date : 2006-05-01 DOI: 10.1016/S1742-6847(06)70399-8
SA Mathieson
{"title":"McKinnon extradition no risk to pen testers","authors":"SA Mathieson","doi":"10.1016/S1742-6847(06)70399-8","DOIUrl":"10.1016/S1742-6847(06)70399-8","url":null,"abstract":"","PeriodicalId":100673,"journal":{"name":"Infosecurity Today","volume":"3 3","pages":"Page 4"},"PeriodicalIF":0.0,"publicationDate":"2006-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1742-6847(06)70399-8","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75178436","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Infosecurity Today
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1