Computer crime

Results: 9938



#Item
221National security / Crime prevention / Cryptography / Information governance / Cyberwarfare / Computer security / Privacy / Internet privacy / Information security

EEMA online May 2015 Issue 9 EEMA news eID: The business case for the banking and finance community 5 June 2015, Department for Business, Innovation and Skills, London If you are interested in attending this workshop, pl

Add to Reading List

Source URL: www.eema.org

Language: English - Date: 2016-05-13 04:17:11
222Computer security / Crime prevention / Cryptography / Data security / Information security / National security

ROSSENDALES LIMITED ROSSENDALES COLLECT LIMITED NNDR Recovery & Enforcement Course Outline DOCUMENT NO : TRE1DOCUMENT DATE:

Add to Reading List

Source URL: www.rossendalestraining.com

Language: English - Date: 2013-01-29 11:08:31
223Information technology management / Identity management / Crime prevention / Cryptography / National security / IDM / IT service management / Computer security / Heuristic / Intelligent dance music

A Multi-method Approach for User-centered Design of Identity Management Systems Pooya Jaferian, David Botta, Kirstie Hawkey, Konstantin Beznosov University of British Columbia, Vancouver, Canada {pooya,botta,hawkey,bezn

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2009-07-08 23:35:07
224Crime prevention / Computer network security / Computer security / Cryptography / Cyberwarfare / National security / Marietta /  Georgia

PPBAC Priority DIVISION PRIORITY Unit/College/Dept.

Add to Reading List

Source URL: ppbac.kennesaw.edu

Language: English - Date: 2015-11-12 09:46:15
225Crime prevention / Cryptography / Information governance / National security / Human rights / Privacy / Internet privacy / Information privacy / Computer security / Information security / Ubiquitous computing / Biometrics

2nd Workshop on Security and Privacy in Systems and Communication Networks SecureSysComm 2016 September 7-9, 2016, Ostrava, Czech Republic http://wpage.unina.it/ficco/SecureSysComm2016/home.html

Add to Reading List

Source URL: wpage.unina.it

Language: English - Date: 2016-04-27 02:07:04
226Cybercrime / Crime prevention / Cryptography / Information governance / National security / Computer security / Password

The ITU Security and Project Management Office provides guidance, coordination, leadership, and expertise in the areas of IT security, project management, and technology products to meet the needs of faculty, staff, and

Add to Reading List

Source URL: itu.gmu.edu

Language: English - Date: 2013-11-15 08:35:05
227National security / Crime prevention / Cryptography / Information governance / Cyberwarfare / Computer security / Information security / System administrator

White Paper: Why We Need Veterans for Critical Infrastructure Security Published By: SkillBridge, LLC November 8, 2013

Add to Reading List

Source URL: www.skillbridgetraining.com

Language: English - Date: 2014-01-24 11:40:09
228Crime prevention / Cryptography / Information governance / National security / Criminal record / Confidentiality / Privacy / Homelessness / Computer security

Providing Homeless Families with Children the Hope and Opportunity for Self-Sufficiency Through Supportive Services and Transitional Housing 455 Gold Pass Heights, Colorado Springs, CO5830 Volunteer Appl

Add to Reading List

Source URL: partnersinhousing.org

Language: English - Date: 2016-03-15 17:04:28
229OpenVAS / Crime prevention / Cryptography / Information governance / National security / Computer security / Vulnerability / Free software / Munich

Greenbone Case Study Vulnerability Management German Armed Forces University, Munich (Universität der Bundeswehr München) Greenbone Security Manager:

Add to Reading List

Source URL: greenbone.net

Language: English - Date: 2016-08-19 11:06:48
230Cyberwarfare / Crime prevention / Computer security / Cryptography / National security / Information security / Malware / National Cyber Security Centre / Threat / United States Computer Emergency Readiness Team

Classification TLP:WHITE Information Sharing and Cyber Security The Benefits of the Malware Information Sharing Platform (MISP) CIRCL Computer Incident Response Center Luxembourg

Add to Reading List

Source URL: www.circl.lu

Language: English - Date: 2016-02-16 06:09:03
UPDATE