First Page | Document Content | |
---|---|---|
![]() Date: 2015-03-04 06:47:01Rogue software Spyware Computer network security Computer crimes Adware Keystroke logging Sanford Wallace Center for Democracy and Technology Privacy-invasive software Espionage Malware System software | Add to Reading List |
![]() | Comments on Spyware March 2004 WRITTEN COMMENTS OF DR. JOHN R. LEVINE It is my honor and privilege to submit these comments to the Subcommittee on Communications of the Senate Committee on Commerce, Science, and TransporDocID: 18PuX - View Document |
![]() | http://www.latimes.com/technology/la-na-spyware26nov26,1,267008DocID: 18grN - View Document |
![]() | Invasive Browser Sniffing and Countermeasures Markus Jakobsson Sid Stamm Indiana UniversityDocID: 13tCc - View Document |
![]() | Microsoft Word - Appendix JDocID: 132oy - View Document |
![]() | 9 Spyware: An Emerging Threat Brent A. Atchley and Allen R. Lee Spyware Overview The year is 2004, and the United States Government has enactedDocID: 121Pt - View Document |