Computer crime

Results: 9938



#Item
261Crime prevention / Cryptography / Information governance / National security / Data Security Council of India / VirtusaPolaris / Computer security / Information security / NASSCOM

Polaris Wins the Data Security Council of India Excellence Award 2013 Awarded the DSCI Excellence Award for Security in IT Services Chennai (India), January 6, 2014: Polaris Financial Technology Limited, a leader in prod

Add to Reading List

Source URL: www.intellectdesign.com

Language: English - Date: 2014-01-05 23:40:58
262Computer security / National security / Crime prevention / Cryptography / Information governance / Reliability engineering / Access control

WECC Low Impact Workshop Slides

Add to Reading List

Source URL: www.rfirst.org

Language: English - Date: 2016-04-18 09:35:35
263Videotelephony / National security / E-commerce / Crime prevention / Mobile telecommunications / Mobile phone / Computer security / Voice over IP

Electronic Stores What should I consider suspicious? Suspicious People What should I do? Be part of the solution.

Add to Reading List

Source URL: homelandsecurity.ohio.gov

Language: English - Date: 2013-01-30 08:13:52
264Auditing / Crime prevention / Cryptography / Information governance / National security / Internal audit / Internal control / Audit / Risk assessment / Information security / Computer security / Control self-assessment

State Leadership Accountability Act Report 2015

Add to Reading List

Source URL: www.cio.ca.gov

Language: English - Date: 2016-03-02 12:06:48
265Cybercrime / Crime prevention / National security / Computer network security / Computer security / Cryptography

SLCC Partnership Form This form is for non-employees that need an S# and/or computer access because of the nature of their relationship with SLCC. Partners usually are employed by another entity but provides service to

Add to Reading List

Source URL: i.slcc.edu

Language: English - Date: 2016-08-19 18:15:43
266Crime prevention / Cryptography / Information governance / National security / Abuse / Computer security

BLAZE A TRAIL TO SECURE REVIEW

Add to Reading List

Source URL: www.eciaaa.org

Language: English - Date: 2016-04-18 16:56:46
267Computer security / Data security / Crime prevention / Cryptography / National security / Government procurement in the United States / Information security / Security controls / Defense Technical Information Center

Safeguarding of Unclassified Controlled Technical Information (UCTI) Understanding and Complying with the Defense Federal Acquisition Regulation Supplement Clause Cybersecurity attacks continue to increase

Add to Reading List

Source URL: www.boeingsuppliers.com

Language: English - Date: 2014-10-24 21:08:52
268Cybercrime / Antivirus software / Crime prevention / Computer network security / Identity theft / Internet safety / Spyware / Computer worm / Computer security / Avira / Spamming / Phishing

www.staysafe.org The Internet = A World of Opportunities Look what’s at your fingertips

Add to Reading List

Source URL: www.holmdelschools.org

Language: English - Date: 2008-02-05 10:10:39
269Crime prevention / Cryptography / Information governance / National security / Computer security / Privacy / Internet privacy / Gene Spafford / Information security / Association for Computing Machinery / Barbara Simons

Association for Computing Machinery (ACM) ACM US Public Policy Council (USACM) usacm.acm.org facebook.com/usacm twitter.com/usacm

Add to Reading List

Source URL: usacm.acm.org

Language: English - Date: 2015-12-04 20:11:48
270Crime prevention / Cryptography / Information governance / National security / E-commerce / Data management / Information security / Computer security / Information privacy / Public key certificate

Information Technology Procedures CCC Data Users Procedures Identifier: IT-PROC-AT – 003 Revision Date:

Add to Reading List

Source URL: supportcenter.ct.edu

Language: English - Date: 2014-12-11 15:46:29
UPDATE