Computer crime

Results: 9938



#Item
181Security / Computer security / Crime prevention / Cryptography / Information governance / National security / Cybercrime / Vulnerability / Operating system / Computing / Authorization

MONTANA BOARD OF REGENTS OF HIGHER EDUCATION Policy and Procedures Manual SUBJECT: INFORMATION TECHNOLOGY Policy – User Responsibilities – Students Adopted: May 24, 2002 _______________________________________

Add to Reading List

Source URL: mus.edu

Language: English - Date: 2015-08-31 15:55:46
182Prevention / Security / Safety / Crime prevention / Cryptography / Information governance / National security / Risk / Computer security / Functional safety / Reliability engineering / Internet of things

IoT Safety/Security Design Tutorial - Important Points to be understood by Software Developers toward the Smart-society - The Software Reliability Enhancement Center, Technology Headquarters,

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2016-07-29 00:53:32
183Security / Prevention / National security / Computer security / Crime prevention / Cryptography / Information governance / Security clearance / Access token / Information assurance / Duty of confidentiality / Authorization

SYSTEM AUTHORIZATION ACCESS REQUEST (SAAR)

Add to Reading List

Source URL: www.med.navy.mil

Language: English
184Security / Prevention / Hacking / Military technology / Computer security / Cybercrime / National security / University of Hawaii / Cyberwarfare in the United States / Michigan Cyber Range / DoD Cyber Crime Center

NEWS RELEASE May 23, 2016 Media Contact: Julie Funasaki Yuen, (

Add to Reading List

Source URL: laulima.hawaii.edu

Language: English
185Security / Prevention / Safety / Crime prevention / Cyberwarfare / Event management / Logistics / Management / Emergency procedure / Security guard / Computer security

eGuide August 2015 Guidance for Events in UK Venues Security Sub-section

Add to Reading List

Source URL: www.aev.org.uk

Language: English - Date: 2016-03-10 10:40:44
186Security / Prevention / Computer security / Crime prevention / Cryptography / Information governance / National security / Privacy / Medical privacy / IT risk

Microsoft WordVPDSS Media Release.docx

Add to Reading List

Source URL: www.cpdp.vic.gov.au

Language: English - Date: 2016-07-26 01:24:00
187Security / Cyberwarfare / Computer security / Source / Crime prevention / Cryptography / Information governance / National security / Vulnerability / Internet privacy / Internet

This paper appears at the 24th USENIX Security SymposiumInvestigating the Computer Security Practices and Needs of Journalists Susan E. McGregor Tow Center for Digital Journalism Columbia Journalism School

Add to Reading List

Source URL: www.franziroesner.com

Language: English - Date: 2015-06-29 14:09:16
188Misconduct / Cybercrime / Security / Crime / Crime prevention / Computer security / Harassment / Computer forensics / High Technology Crime Investigation Association / Art Bowker

I’ve been a member of HTCIA since the early 90’s. I have greatly benefitted from this organization and I’d like to do all that I can to give back and see HTCIA thrive. I strongly believe we are all a team and need

Add to Reading List

Source URL: www.htcia.org

Language: English - Date: 2015-08-25 14:21:33
189Security / Prevention / Safety / Crime prevention / Security guards / Cryptography / Information governance / National security / United States Department of Homeland Security / Computer security / Job Corps

HOMELAND SECURITY C AREER PATHWAY C A REER TECHNIC A L T R A IN ING A RE A

Add to Reading List

Source URL: www.ajcn.state.ak.us

Language: English - Date: 2016-04-08 18:27:20
190Security / Prevention / Computer security / Safety / Crime prevention / National security / Computer network security / Cryptography / Vulnerability / Information security / San Jose State University / Attack

PDF Document

Add to Reading List

Source URL: its.sjsu.edu

Language: English - Date: 2015-12-07 11:37:38
UPDATE