Inicio Nosotros Búsquedas
Buscar en nuestra Base de Datos:     
Autor: =Bashir, Imran
Sólo un registro cumplió la condición especificada en la base de información BIBCYT.
Publicación seriada
Referencias AnalíticasReferencias Analíticas
Autor: Bashir, Imran imran.bashir@qwest.com
Oprima aquí para enviar un correo electrónico a esta dirección ; Serafini , Enrico enrico.serafini@qwest.com
Oprima aquí para enviar un correo electrónico a esta dirección; Wall , Kevin kevin.wall@qwest.com
Oprima aquí para enviar un correo electrónico a esta dirección
Título: Securing network software applications: introduction
Páginas/Colación: pp.28-30.; 28cm.; il.
Communications of the ACM Vol. 44, no. 2 February 2001
Información de existenciaInformación de existencia

Resumen
The impact of the ubiquitous World Wide Web, the fastest growing element of the Internet, is mind-boggling. The debate about its social and economic impacts will go on for ages, but one fact remains-the Internet is here to stay. Today one have the ability to conduct online shopping, talking, dating and even smelling. Similarly, businesses can share and exchange information for more efficient business practices. And in the same vein, individuals-most of the time complete strangers exchange useful and sometimes profitable information with each other. Information sharing over the Internet has become a prevailing practice in every segment of e-society. While extremely useful for conducting day-to-day business operations, the proliferation of e-commerce over the Internet has provided a perfect target for computer crackers, script-kiddies and other such bad guys. Since the Web is being utilized by both small and large corporations and by governments for conducting their business electronically, people with malicious intent do not have to leave their computers to bring a business to its knees. Although it is a little more difficult to take down a government's computer networks, it can be done. Recent cyber-warfare attacks between the Palestinians and Israelis in the Middle East conflicts indicate this is probably likely to become more common in the future. The reliance of a business on the Internet makes it extremely vulnerable to all sorts of attacks.

 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

UCLA - Biblioteca de Ciencias y Tecnologia Felix Morales Bueno

Generados por el servidor 'bibcyt.ucla.edu.ve' (18.223.206.84)
Adaptive Server Anywhere (07.00.0000)
ODBC
Sesión="" Sesión anterior=""
ejecutando Back-end Alejandría BE 7.0.7b0 ** * *
18.223.206.84 (NTM) bajo el ambiente Apache/2.2.4 (Win32) PHP/5.2.2.
usando una conexión ODBC (RowCount) al manejador de bases de datos..
Versión de la base de información BIBCYT: 7.0.0 (con listas invertidas [2.0])

Cliente: 18.223.206.84
Salida con Javascript


** Back-end Alejandría BE 7.0.7b0 *