Computer crime

Results: 9938



#Item
111Security / Computing / Prevention / Automatic identification and data capture / User interface techniques / Crime prevention / Cryptography / National security / Internet privacy / Speech recognition / Computer security / Speaker recognition

Proceedings of the International MultiConference of Engineers and Computer Scientists 2014 Vol II, IMECS 2014, March, 2014, Hong Kong Business Buddy: Connecting You and Your Business Partners Kenneth Kin Pong Kwo

Add to Reading List

Source URL: www.bpti.lt

Language: English - Date: 2014-04-10 12:20:58
112Security / Prevention / Cybercrime / Computer security / Cyberwarfare / National security / Military technology / E-commerce / Cyber-attack / International Traffic in Arms Regulations / Cyberwarfare in the United States / DoD Cyber Crime Center

Defense Trade Advisory Group (DTAG) Cyber Working Group White Paper October 29, 2015 DTAG Working Group Members Co-chairs: Rebecca Conover & Larry Fink

Add to Reading List

Source URL: www.pmddtc.state.gov

Language: English - Date: 2016-03-02 15:03:40
113Security / Cyberwarfare / Computer network security / Computer security / Crime prevention / National security / Cyber threat intelligence / Threat / SCADA

Leveraging Threat Intelligence in an Active Defense 2016 Erick Mandt Intelligence Analyst

Add to Reading List

Source URL: files.sans.org

Language: English - Date: 2016-07-11 10:53:35
114Security / Prevention / Safety / Crime prevention / Cryptography / Information governance / National security / Data security / Information security / San Jose State University / Computer security

DOCX Document

Add to Reading List

Source URL: its.sjsu.edu

Language: English - Date: 2015-12-07 11:37:39
115Computer security / Security / Computing / Computer network security / Crime prevention / Cryptography / National security / FireEye / Digital Guardian / Cloud computing security / Forcepoint / Threat

SCAWARDS2014_honor_Horizontal

Add to Reading List

Source URL: static.webvid.co.uk

Language: English - Date: 2016-06-09 13:10:01
116Business / Security / Computing / Computer network security / Computer security / Crime prevention / Cryptography / Cyberwarfare / National security / Telecommuting / Technical support

IT Specialist – 8035 Page 1 City and Borough Sitka, Alaska

Add to Reading List

Source URL: cityofsitka.com

Language: English - Date: 2015-12-02 20:55:30
117Security / Prevention / Safety / Government procurement in the United States / Computer security / Crime prevention / Contract law / Systems engineering / General contractor / Performance work statement / Statement of work / Subcontractor

NLKNPO NOAALink_Peformance_Work_Statement(PWS)Template.docx

Add to Reading List

Source URL: cio.noaa.gov

Language: English - Date: 2014-11-18 14:50:21
118Jewish surnames / Security / Surname / Simson Garfinkel / Cryptography / Crime prevention / Information governance / National security / Garfinkel / Simson / Computer security

Introduction to Computer Security and Privacy Simson L. Garfinkel, Ph.D. http://www.simson.net/

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2005-06-21 11:48:48
119Security / Prevention / Safety / Data security / Crime prevention / Cryptography / Information governance / National security / Information security / Vulnerability / Computer security

lead security analyst reporting to – head of information security direct reports – IT security analyst working hours – full time is 35 hours a week. You’ll agree your working pattern with your manager. the purpo

Add to Reading List

Source URL: www.financialombudsman.org.uk

Language: English - Date: 2016-02-24 11:29:57
120Security / Prevention / Cyberwarfare / Safety / Crime prevention / Cryptography / Information governance / National security / Cyber-security regulation / Computer security / Information security / Security guard

Microsoft Word - FINAL CISO Exempt JOB_2016 06 v1

Add to Reading List

Source URL: www.cio.ca.gov

Language: English - Date: 2016-06-23 17:40:14
UPDATE