Computer crime

Results: 9938



#Item
31Thomas Belfiore, Chief Security Officer The Port Authority of New York and New Jersey Testimony for the House Emergency Preparedness, Response and Communications Subcommittee on “Protecting our Passengers: Perspectives

Thomas Belfiore, Chief Security Officer The Port Authority of New York and New Jersey Testimony for the House Emergency Preparedness, Response and Communications Subcommittee on “Protecting our Passengers: Perspectives

Add to Reading List

Source URL: docs.house.gov

Language: English
32Information Technology Solutions  Portable OmniWatch® ISR Video Kit P o rt a b l e I S R V i d e o K i t DESIGN

Information Technology Solutions Portable OmniWatch® ISR Video Kit P o rt a b l e I S R V i d e o K i t DESIGN

Add to Reading List

Source URL: insitupacific.com.au

Language: English - Date: 2015-08-09 23:36:27
33Cyber security guide for boardroom members 2 | Cyber security guide for boardroom members

Cyber security guide for boardroom members 2 | Cyber security guide for boardroom members

Add to Reading List

Source URL: www.cybersecurityraad.nl

Language: English - Date: 2016-08-20 14:48:32
34Texas Department of Public Safety Regulatory Services Division  PRINT CLEARLY IN BLACK INK  EXAMPLE:

Texas Department of Public Safety Regulatory Services Division  PRINT CLEARLY IN BLACK INK EXAMPLE:

Add to Reading List

Source URL: www.txdps.state.tx.us

Language: English - Date: 2016-08-01 15:34:46
35Sertifiseringsmyndigheten for IT-sikkerhet Norwegian Certification Authority for IT Security  SERTIT-012 CR Certification Report IssueMarchThales Operator Terminal Adapter

Sertifiseringsmyndigheten for IT-sikkerhet Norwegian Certification Authority for IT Security SERTIT-012 CR Certification Report IssueMarchThales Operator Terminal Adapter

Add to Reading List

Source URL: sertit.no

Language: English - Date: 2013-09-19 06:43:32
36Assessing Police Perceptions of Cybercrime and the Law Enforcement Response in England and Wales Adam M. Bossler, Georgia Southern University George W. Burruss, University of South Florida Thomas J. Holt, Michigan State

Assessing Police Perceptions of Cybercrime and the Law Enforcement Response in England and Wales Adam M. Bossler, Georgia Southern University George W. Burruss, University of South Florida Thomas J. Holt, Michigan State

Add to Reading List

Source URL: www.cambridgecybercrime.uk

Language: English - Date: 2016-08-05 10:26:39
37Security as a Practical Problem: Some Preliminary Observations of Everyday Mental Models Paul Dourish, Jessica Delgado de la Flor, and Melissa Joseph School of Information and Computer Science University of California, I

Security as a Practical Problem: Some Preliminary Observations of Everyday Mental Models Paul Dourish, Jessica Delgado de la Flor, and Melissa Joseph School of Information and Computer Science University of California, I

Add to Reading List

Source URL: www.andrewpatrick.ca

Language: English - Date: 2003-01-16 18:02:06
38Microsoft Word - PSD040_Security Designee.doc

Microsoft Word - PSD040_Security Designee.doc

Add to Reading List

Source URL: www.sco.ca.gov

Language: English - Date: 2016-08-23 19:48:19
39Security / Espionage / Prevention / National security / Intelligence analysis / Military intelligence / Crime prevention / Cryptography / Counterintelligence / Computer security / International Traffic in Arms Regulations / Central Intelligence Agency

DOC Document

Add to Reading List

Source URL: www.wrc.noaa.gov

Language: English - Date: 2006-12-26 13:04:28
40Ministry of Lands& Natural Resources  INFORMATION & COMMUNICATION TECHNOLOGY (ICT) POLICYICT POLICY DOCUMENT

Ministry of Lands& Natural Resources INFORMATION & COMMUNICATION TECHNOLOGY (ICT) POLICYICT POLICY DOCUMENT

Add to Reading List

Source URL: mlnr.gov.gh

Language: English - Date: 2015-06-02 10:15:24