Computer crime

Results: 9938



#Item
371Cybercrime / Spamming / Cyberspace / Misconduct / Crime / Social engineering / Identity theft / Phishing / Crimeware / Ransomware / Email spam / Computer virus

Phishing Activity Trends Report 1 Quarter 2016 st

Add to Reading List

Source URL: docs.apwg.org

Language: English
372Security / Safety / Prevention / Crime prevention / Clery Act / Murder of Jeanne Clery / Emergency communication system / Emergency management / Fire drill / Security guard / Computer security

      Annual  Security  Report  

Add to Reading List

Source URL: protect.iu.edu

Language: English - Date: 2015-09-29 22:05:00
373Crime prevention / Cryptography / Information governance / National security / Financial regulation / Money laundering / Information security / Political corruption / Educational technology / Corruption / Computer security

e-Learning ProgrammeCOMPLIANCE LIBRARY 60-MINUTE

Add to Reading List

Source URL: www.factors.org.uk

Language: English - Date: 2016-01-25 07:01:36
374Security / Prevention / Safety / Computer security / Identity management / Access control / Crime prevention / National security / NetIQ / Authentication / User Activity Monitoring / Password

IPS blue graphic white back final

Add to Reading List

Source URL: www.netiq.com

Language: English - Date: 2016-05-04 13:42:02
375Security / Computing / Prevention / Computer security / Crime prevention / Cryptography / Information governance / National security / Vulnerability / Application security / Software development process / Software development

The Days Before Zero Day: Investment Models for Secure Software Engineering Chad Heitzenrater∗‡ Rainer B¨ohme†

Add to Reading List

Source URL: weis2016.econinfosec.org

Language: English - Date: 2016-05-18 13:31:12
376Crime prevention / National security / Cryptography / Information governance / Cybercrime / Computer security / Security / Information security / Bring your own device / Mobile security

Cover Sheet Table of Contents Introduction

Add to Reading List

Source URL: webroot-cms-cdn.s3.amazonaws.com

Language: English - Date: 2016-04-01 16:27:16
377Security / Prevention / Computing / Crime prevention / Cryptography / Information governance / National security / Information security / Computer security / Usability / Vulnerability / Paul Dourish

International Journal of Human Computer Studies Special Issue on HCI Research in Privacy and Security, 63(1-2), In the Eye of the Beholder: A Visualization-based Approach to Information System Security Rogér

Add to Reading List

Source URL: www.dourish.com

Language: English - Date: 2008-06-14 12:49:25
378Security engineering / Security / Computing / Associated Locksmiths of America / Locksmithing / Crime prevention / Cryptography / Information governance / National security / Email / Computer security

Help SAVTA Reach New Heights in 2016 — and Win! We’re always looking for ways to improve your association. From adding member benefits to new classes, we work hard to give you the best value. But now we

Add to Reading List

Source URL: www.savta.org

Language: English - Date: 2016-03-01 16:34:44
379Security / Prevention / Safety / Computer security / Data security / Crime prevention / Cryptography / Information security / Security controls / Security guard / Security management / Federal Information Security Management Act

Montana Operations Manual Appendix Issuing Authority Category

Add to Reading List

Source URL: www.mdt.mt.gov

Language: English - Date: 2016-05-12 15:12:14
380Software engineering / Computing / Software / Crime prevention / Cryptography / National security / Information governance / Secure communication / Perl / Computer security / Web development

Secure Web Development In Perl Jonathan Worthington French Perl Workshop 2007

Add to Reading List

Source URL: jnthn.net

Language: English - Date: 2014-10-21 09:51:16
UPDATE