Computer crime

Results: 9938



#Item
201Security / Computing / Prevention / Computer network security / Crime prevention / Cryptography / Information governance / National security / Capture the flag / Information security / Vulnerability / Computer security

Experiences In Cyber Security Education: The MIT Lincoln Laboratory Capture-the-Flag Exercise ∗ Joseph Werther, Michael Zhivich, Tim Leek MIT Lincoln Laboratory POC:

Add to Reading List

Source URL: static.usenix.org

Language: English - Date: 2011-07-08 13:42:25
202Security / Crime prevention / Cyberwarfare / Computer network security / Computer security / Cryptography / National security / National Health Service

Security Policy Category Summary

Add to Reading List

Source URL: www.bapam.org.uk

Language: English - Date: 2016-04-07 10:06:24
203Computing / Security / Prevention / Crime prevention / Cryptography / Information governance / National security / Computer security / Artificial immune system / Autonomic computing / Information security / System administrator

Panel: The Future of Biologically-Inspired Security: Is There Anything Left to Learn? Anil Somayaji Michael Locasto

Add to Reading List

Source URL: www.nspw.org

Language: English - Date: 2009-11-29 16:13:31
204Security / Prevention / Safety / Crime prevention / Criminal records / Computer security / Cryptography / FBI Criminal Justice Information Services Division / National Crime Information Center / Security awareness / Federal Bureau of Investigation / Information security

U. S. Department of Justice Federal Bureau of Investigation Criminal Justice Information Services Division Criminal Justice Information Services (CJIS) Security Policy

Add to Reading List

Source URL: kentuckystatepolice.org

Language: English - Date: 2016-06-22 13:33:27
205Security / Prevention / Crime prevention / Cryptography / Information governance / National security / Computer security / Medical privacy / Internet privacy / Privacy / Health Insurance Portability and Accountability Act / Information security

Privacy and Security Protecting your privacy and personal information is a priority for Impact Interactive. Our experience in dealing with sensitive information has allowed us to develop a comprehensive privacy and secur

Add to Reading List

Source URL: www.mywecarebenefits.net

Language: English - Date: 2012-06-29 14:11:07
206Security / Identity management / Crime prevention / Cryptography / Information governance / National security / Prevention / Privacy / Internet privacy / Computer security

GMOC and GENI Security Architecture – Joint Effort  The  team   currently  plans to implement  attribute­based credential  mechanisms  to enforce   the  policies for sharing operational data w

Add to Reading List

Source URL: groups.geni.net

Language: English - Date: 2009-07-15 10:58:06
207Misconduct / Spamming / Crime / Computing / Cybercrime / Social engineering / Identity theft / Phishing / Computer virus / Computer security / Email spam / Email

THE FACTS: PHISHING AND SPEARPHISHING What is “phishing?” Email attack is the preferred method for many hackers. Verizon’s 2013 Data Breach Investigations Report found that “more than 95% of all attacks tied to s

Add to Reading List

Source URL: www.arcyber.army.mil

Language: English - Date: 2016-03-15 15:31:42
208Security / Prevention / Safety / National security / Crime prevention / Background check / Employment / Law enforcement / Recruitment / Chancellor / Computer security

Security Sensitive and/or Critical Positions The University of Illinois requires that all individuals, who are offered employment positions deemed by the University to be security sensitive and/or critical, undergo backg

Add to Reading List

Source URL: www.hr.uic.edu

Language: English - Date: 2016-03-09 17:57:02
209Security / Prevention / Safety / Crime prevention / Mass media / Cybercrime / Cryptography / Password / International Federation of Journalists / Email / Computer security / Internet privacy

Safer, Smarter Journalism: Survey on Digital Security in South Asia’s Media Executive Summary

Add to Reading List

Source URL: samsn.ifj.org

Language: English - Date: 2016-05-25 02:25:11
210Security / Computing / Crime prevention / Cinematic techniques / Witness / Computer security / Evidence / Computer file / Filmmaking / YouTube

WITNESS Silhoed Filmers 1

Add to Reading List

Source URL: librarywebfiles.s3.amazonaws.com

Language: English - Date: 2016-03-29 17:36:25
UPDATE