1. SC Magazine
SC Magazine arms information security professionals with the in-depth, unbiased business and technical information they need to tackle the countless security challenges they face and establish risk management and compliance postures that underpin overall business strategies.
SC Magazine arms information security professionals with the in-depth, unbiased business and technical information they need to tackle the countless security challenges they face and establish risk management and compliance postures that underpin overall business strategies.
"Each month, we deliver up-to-date news, comprehensive analysis, cutting-edge features, contributions from thought leaders, and the best, most extensive collection of product reviews in the business. Whether through our monthly magazine, comprehensive website, in-depth Spotlight editions, eBooks, newsletters, or regularly scheduled digital and live events - such as our SC Awards program, SC Magazine Roundtables or SC Congress Canada - our readers gain all the relevant information they need to safeguard their organizations and, ultimately, contribute to their longevity and success."
2. CSO online
2. CSO online
CSO provides news, analysis and research on a broad range of security and risk management topics. Areas of focus include information security, physical security, business continuity, identity and access management, loss prevention and more.
CSO magazine and CSOonline.com are published by CXO Media Inc., which is an IDG (International Data Group) company.
3. IEEE Security & Privacy
3. IEEE Security & Privacy
IEEE Security & Privacy's primary objective is to stimulate and track advances in security, privacy, and dependability and present these advances in a form that can be useful to a broad cross-section of the professional community--ranging from academic researchers to industry practitioners.
IEEE Security & Privacy aims to provide a unique combination of research articles, case studies, tutorials, and regular departments covering diverse aspects of security and dependability of computer-based systems, including legal and ethical issues, privacy concerns, tools to help secure information, methods for development and assessment of trustworthy systems, analysis of vulnerabilities and attacks, trends and new developments, pedagogical and curricular issues in educating the next generation of security professionals, secure operating systems and applications, security issues in wireless networks, design and test strategies for secure and survivable systems, and cryptology, and other topics of interest to a general, technically oriented readership.
All submissions in the magazine's scope will be peer-reviewed, and accepted manuscripts will be professionally copy-edited to ensure a common style and level of content for the magazine.
All submissions in the magazine's scope will be peer-reviewed, and accepted manuscripts will be professionally copy-edited to ensure a common style and level of content for the magazine.
No comments:
Post a Comment