Computer crime

Results: 9938



#Item
291Information technology management / Crime prevention / Cryptography / Information governance / National security / Acceptable use policy / SharePoint / Computer security

IT ACCEPTABLE USE POLICY PURPOSE The purpose of the Acceptable Use Policy for Brock University’s Information Technology (IT) systems is to protect the University, our students and employees from potential harm resultin

Add to Reading List

Source URL: bufa.ca

Language: English - Date: 2016-07-11 09:00:53
292Computer network security / Crime prevention / Cryptography / Information governance / National security / Ubiquitous computing / Mobile computing / Computer security / Internet privacy / Authentication / Ambient intelligence / Wireless LAN

Approaches for Ensuring Security and Privacy in Unplanned Ubiquitous Computing Interactions V. Ramakrishna, Kevin Eustice and Matthew Schnaider Laboratory for Advanced Systems Research Computer Science Department Univers

Add to Reading List

Source URL: lasr.cs.ucla.edu

Language: English - Date: 2006-07-13 17:06:00
293Privacy of telecommunications / Mass surveillance / National security / Computer surveillance / Crime prevention / Lavabit / National Security Agency / Edward Snowden / Tailored Access Operations / PRISM / Qwest / Surveillance

Schneier on Security: More on the NSA Commandeering the Internet

Add to Reading List

Source URL: zoo.cs.yale.edu

Language: English - Date: 2013-09-11 13:58:48
294Information privacy / Data security / Crime prevention / Cryptography / National security / Personally identifiable information / Personal Information Protection and Electronic Documents Act / Information security / Computer security / Consumer protection / Personal Data Privacy and Security Act / Security breach notification laws

HB1633 Enrolled LRB094RXDb 1

Add to Reading List

Source URL: www.ilga.gov

Language: English - Date: 2005-05-18 11:45:39
295Law enforcement in the United States / Civil defense / National security / Crime prevention / Emergency management / Humanitarian aid / United States Department of Homeland Security / Transportation Security Administration / Homeland security / Computer security

Statement of Subcommittee Chairman Dan Donovan (R-NY) Emergency Preparedness, Response, and Communications Subcommittee Protecting Our Passengers: Perspectives on Securing Surface Transportation in New Jersey and New Yor

Add to Reading List

Source URL: homeland.house.gov

Language: English - Date: 2016-06-21 09:04:37
296Crime prevention / Cryptography / Information governance / National security / Computer security / Information security / Memory protection / Capability-based security / Protection ring / Operating system / Principle of least privilege / Process management

PROCEEDINGS OF THE IEEE, VOL. 63, NO. 9, SEPTEMBER] [Sa]

Add to Reading List

Source URL: ix.cs.uoregon.edu

Language: English - Date: 2010-10-08 02:30:09
297Crime prevention / Cryptography / Information governance / National security / Mobile phones / Mobile security / Computer security / Mobile device / Smartphone / Internet privacy / Mobile malware / Information security

An application to estimate the Cyber-risk Detection Skill of mobile device users. (Novel idea presentation) Guillaume Schaff itrust consulting (Luxembourg) Carlo Harpes

Add to Reading List

Source URL: iaria.org

Language: English - Date: 2013-12-10 21:37:25
298Crime prevention / Cryptography / Information governance / National security / Computer network security / Computer security / Cisco Systems / Security / Computer network / Internet / Windows / Competition

DOC Document

Add to Reading List

Source URL: nccdc.org

Language: English - Date: 2010-01-07 14:50:06
299Data security / Crime prevention / Cryptography / Information governance / National security / Personally identifiable information / Computer security / Medical privacy / Windows Registry / Putative father registry

Identification/Verification Form May 2015 Use this form to provide The Nevada Registry with information that will help to protect the confidentiality of the information contained within your Career Development file. Info

Add to Reading List

Source URL: www.nevadaregistry.org

Language: English - Date: 2015-05-19 21:50:03
300Computer security / National security / Security / Crime prevention / Cryptography / Tata Consultancy Services / Information security / Resilience / Chief information security officer / Threat / MasterCraft / Tata Research Development and Design Centre

TCS Enterprise Security and Risk Management Solutions and Services Enterprise Security and Risk Management The digital era has created unprecedented opportunities for organizations to conduct

Add to Reading List

Source URL: www.tcs.com

Language: English - Date: 2015-01-21 03:50:21
UPDATE