Computer crime

Results: 9938



#Item
251Crime prevention / Cryptography / Information governance / National security / Cyberwarfare / Computer security / Vulnerability / Security

Microsoft Word - CISL WPdoc

Add to Reading List

Source URL: mitiq.mit.edu

Language: English - Date: 2011-12-27 12:38:14
252National security / Computer network security / Computer security / Crime prevention / Cryptography / Cyberwarfare / Document / Email

Applies To: UNMCC Component(s): Responsible Department: Title:

Add to Reading List

Source URL: cancer.unm-intranet.com

Language: English - Date: 2014-01-06 15:55:57
253Crime prevention / Norwich / Security guard / Computer security / Alcohol education / Virginia Tech shooting

2016 ANNUAL SECURITY AND FIRE SAFETY

Add to Reading List

Source URL: about.norwich.edu

Language: English - Date: 2016-08-10 08:52:21
254Crime prevention / Cryptography / Information governance / National security / California State University / Information security / Humboldt State University / California State Polytechnic University /  Pomona / Vulnerability / Computer security / California State Student Association / Charles B. Reed

| Responsible Use Policy Effective Date: | Revised Date: POLICY OBJECTIVE The CSU Information Security policy provides defines user, including faculty, staff, students, third parties, and CS

Add to Reading List

Source URL: security.sdsu.edu

Language: English - Date: 2015-09-16 14:23:03
255Cryptography / Security / Crime prevention / Information governance / National security / Password / Challengeresponse authentication / Information security / Computer security / Password policy / Password strength

Human Factors Considerations for User Identification on Air Traffic Control Systems Kenneth Allendoerfer Shantanu Pai

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2005-06-21 09:58:19
256Cryptography / Crime prevention / Information governance / National security / Data management / Information security / Data steward / Database / Computer security

ENTERPRISE IT STANDARDS AND PROCEDURES DATA STEWARDSHIP STANDARDS Policy: Enterprise Data Stewardship Policy

Add to Reading List

Source URL: www.montana.edu

Language: English - Date: 2016-01-19 13:45:51
257Crime prevention / Cryptography / Information governance / National security / Computer security / Information security / FIPS 140-2 / Consultant / Professional certification / Common Criteria / Application security / Open Trusted Technology Provider Standard

Introducing atsec information security Chief Executive Officer, Director of Strategy and Business Devlopment Who are we?

Add to Reading List

Source URL: www.atsec.com

Language: English - Date: 2015-09-15 04:09:42
258Industrial Internet Consortium / Cyberwarfare / Crime prevention / Cryptography / National security / IIC / Computer security / Object Management Group

Engineering Update November 2014 PURPOSE AND AUDIENCE This document provides an update to Engineering: The First Steps published in JulyThis document has the same audiences: Members:

Add to Reading List

Source URL: www.iiconsortium.org

Language: English - Date: 2016-07-25 11:57:07
259Computer security / National security / Crime prevention / Cryptography / Information governance / Intel / Triage / Computer forensics / Computer security incident management / Information security / Security / Global Information Assurance Certification

Collecting and Hunting for Indications of Compromise with Gusto and Style! SANS Threat Hunting & IR Summit – New Orleans, April 12, 2016 Ismael Valenzuela, GSE #132

Add to Reading List

Source URL: files.sans.org

Language: English - Date: 2016-04-15 13:43:25
UPDATE