Computer crime

Results: 9938



#Item
231Crime prevention / National security / Cryptography / Information governance / Cybercrime / Computer security / Internet privacy / National Security Agency / Network security

Network Security Activities Under the University’s Electronic Communications Policy This guidance is intended to assist the Campuses and Laboratories in undertaking additional network security efforts. This guidance sp

Add to Reading List

Source URL: security.ucop.edu

Language: English - Date: 2016-02-01 23:11:50
232Data security / Crime prevention / Cryptography / Information governance / National security / Internet of things / Privacy / Internet privacy / Computer security / Cloud computing / Information privacy / Information security

Microsoft WordJuly 12 online.docx

Add to Reading List

Source URL: www.eema.org

Language: English - Date: 2016-05-13 04:17:12
233Data security / Computer security / Security / Crime prevention / Cryptography / Common Criteria / Protection Profile / Security Target / Information security / Evaluation / Evaluation Assurance Level / Cryptographic Module Testing Laboratory

Microsoft Word - CCDevelopersSeminar-marketingOutline.doc

Add to Reading List

Source URL: www.atsec.com

Language: English - Date: 2015-09-15 04:42:46
234E-commerce / Crime prevention / Cryptography / Information governance / National security / LegalShield / Computer security / Jeff Bell / Public key certificate / Cloud computing / Application server

SOC 3 for Security, Availability, Processing Integrity, and Confidentiality Independent Practioner’s Trust Services Report For the Period January 1, 2015 through December 31, 2015 Independent SOC 3 Report for the Secu

Add to Reading List

Source URL: www.legalshield.com

Language: English - Date: 2016-04-08 14:26:23
235Computer security / Security / Crime prevention / Cryptography / National security / Clarizen / Password / Single sign-on / Application security / Access control / Information security

CLARIZEN SECURITY WHITE PAPERClarizen Security

Add to Reading List

Source URL: www.clarizen.com

Language: English - Date: 2016-01-28 15:47:56
236Information technology management / Crime prevention / Cryptography / Information governance / National security / Acceptable use policy / Computer security / Internet

Internet Account – Administrator/Faculty/Staff

Add to Reading List

Source URL: www.hfcsd.org

Language: English - Date: 2009-09-03 14:04:23
237Crime prevention / National security / Public safety / Physical security / Perimeter security / Security guard / Access control / Computer security / Identity document / Security

Introduction to Security Awareness Briefing Office of Security @ NOAA

Add to Reading List

Source URL: www.osec.doc.gov

Language: English - Date: 2009-04-21 13:38:08
238Cloud infrastructure / Cloud applications / Crime prevention / Cryptography / National security / Cloud computing / Shadow IT / Software as a service / Information security / Dropbox / Computer security / Cloud computing security

Thought Leadership Shining a light into Shadow IT The story of Corporate IT unsurprisingly mirrors the introduction of innovative and

Add to Reading List

Source URL: www.nttsecurity.com

Language: English - Date: 2016-07-26 13:05:28
239Security / Crime prevention / Cryptography / Information governance / National security / Password / Computer security / Email

Microsoft Word - LCTCS NETWORK ACCESS FORM

Add to Reading List

Source URL: www.lctcs.edu

Language: English - Date: 2013-01-25 15:02:00
240Information technology management / Data management / Crime prevention / Cryptography / National security / Database / Data warehouse / Computer security / Data analysis

UW DATA MANAGEMENT COMMITTEE (DMC) Security Access and Roles Privilege Matrix for READ-ONLY Access to Enterprise Data Warehouse Data – Version 21 Approved By: Modified By: DMC Access & Roles Task Force

Add to Reading List

Source URL: www.washington.edu

Language: English - Date: 2015-07-17 12:24:26
UPDATE