Computer crime

Results: 9938



#Item
361Crime prevention / Cryptography / Information governance / National security / Copyright law / Copyright infringement / Copyright law of the United States / Copyright / Digital Millennium Copyright Act / Information security / Fair use / Computer security

Student-Patron Acceptable Use Agreement Information Technology Student/Patron Acceptable Use Agreement Version: 3.1 Status: Approved

Add to Reading List

Source URL: 78bbm3rv7ks4b6i8j3cuklc1.wpengine.netdna-cdn.com

Language: English - Date: 2016-01-12 22:33:53
362National security / Crime prevention / Computer security / Cybercrime / Cyberwarfare / Kill chain / Cyber-attack / Malware

USING AN EXPANDED CYBER KILL CHAIN MODEL TO INCREASE ATTACK RESILIENCY

Add to Reading List

Source URL: www.seantmalone.com

Language: English - Date: 2016-08-04 16:29:49
363Data security / Crime prevention / Cryptography / Information governance / National security / Regulatory compliance / Audit / Computer security / Internal audit / Business process management / Vulnerability / Security information and event management

A FORESITE WHITE PAPER THE ART AND SCIENCE OF COMPLIANCE INTRODUCTION Today, regulatory and legislative compliance obligations seem endless and ever-changing. Corporations are faced with enormous challenges

Add to Reading List

Source URL: foresite.com

Language: English - Date: 2016-02-17 15:35:27
364Crime prevention / National security / Cyberwarfare / Computer network security / Malware / Computer security / Mobile security

MAIK MORGENSTERN / CTO AV-TEST AVAR CONFRENCE 2015 YOU ARE THE TARGET IN THE IOT

Add to Reading List

Source URL: www.av-test.org

Language: English - Date: 2016-04-18 07:40:14
365Data security / Computer security / Crime prevention / Cryptography / National security / San Jose State University / Information security / Vulnerability / Asset / Security / Security controls / IT risk

PDF Document

Add to Reading List

Source URL: its.sjsu.edu

Language: English - Date: 2015-12-07 11:36:11
366Computer network security / Crime prevention / National security / E-commerce / Secure communication / Computer security / Vulnerability / Software

Microsoft PowerPoint - DenimGroup_RollingOutAnEnterpriseSourceCodeReviewProgram_Content.pptx

Add to Reading List

Source URL: denimgroup.com

Language: English - Date: 2014-01-13 18:18:49
367Crime prevention / Cryptography / Information governance / National security / Security guard / Surveillance / Computer security / Email

How to Manage ePermitting Security

Add to Reading List

Source URL: apps.dep.wv.gov

Language: English - Date: 2014-04-22 11:10:39
368Computer security / Crime prevention / Cryptography / Information governance / National security / Application security / Application firewall / Information security / Web application firewall / Michigan State University / SQL injection / Vulnerability

CASE STUDY Michigan State University implements language security technology to address runtime threat gap In recent years, Michigan State University (MSU) set out to make information security a critical priority, invit

Add to Reading List

Source URL: prevoty.com

Language: English - Date: 2016-08-02 12:16:23
369Crime prevention / Cryptography / Information governance / National security / Data security / Internet privacy / EIDAS / Privacy / Information security / Computer security / Facebook / Internet security

EEMA online January 2016 Issue 2 Diary dates 2016 Below are some of the events that we are holding next year. Be sure to bookmark them now! For further information visit www.eema.org/events. 23 February

Add to Reading List

Source URL: www.eema.org

Language: English - Date: 2016-05-13 04:17:09
370Theft / Crime prevention / Fraud / Identity theft / Motor vehicle theft / Insurance / Computer security / Pharmaceutical industry in China

Marchvigilant THE MONTHLY CARGO CRIME UPDATE FOR MEMBERS OF TAPA EMEA LOST

Add to Reading List

Source URL: www.tapaemea.org

Language: English - Date: 2015-04-01 05:03:06
UPDATE