Computer crime

Results: 9938



#Item
441Crime prevention / Cryptography / Information governance / National security / Computer file / Inter-process communication / Computer security / Cabinet / South African labour law

Best Practices for Maintaining Personnel Files July 16, 2014 Personnel Files

Add to Reading List

Source URL: hr.ucr.edu

Language: English - Date: 2014-07-16 13:20:46
442Crime prevention / Cryptography / National security / Automotive industry / European Network Exchange / Isse punctata / Isse / European Data Protection Supervisor / European Union Agency for Network and Information Security / Giovanni Buttarelli / Computer security / Cryptomathic

ISSE/2015/Press releases/Programme FINAL 15th July 2015 Europe’s Leading Independent Interdisciplinary Security Conference Unveils 2015 Programme ISSE 2015 takes place 10th and 11th November 2015, Hotel Palace Berlin,

Add to Reading List

Source URL: www.isse.eu.com

Language: English - Date: 2015-07-28 07:23:48
443Crime prevention / Cryptography / Information governance / National security / Computer security / Covert channel / Information flow / Program slicing / Mandatory access control / Alloy Analyzer / Domain-specific language / Information security

A Security Domain Model for Static Analysis and Verification of Software Programs Alan B. Shaffer Naval Postgraduate School Computer Science Dept Monterey, CA, USA

Add to Reading List

Source URL: cisr.nps.edu

Language: English - Date: 2008-08-18 13:41:06
444Security / Prevention / Safety / Data security / National security / Crime prevention / Cryptography / Information governance / Information security / Personally identifiable information / Computer security / Internet privacy

University of Hawai‘i (UH) General Confidentiality Notice for Non-UH Parties I understand that to fulfill my duties and responsibilities as a designated UH official or authorized representative, or as an approved recip

Add to Reading List

Source URL: www.hawaii.edu

Language: English - Date: 2015-02-27 13:51:17
445Computing / System software / Software / Computer network security / Computer security / Crime prevention / Cryptography / National security / Intrusion detection system / Bro / NetFlow / Internet privacy

Principles for Developing Comprehensive Network Visibility∗ Mark Allman, Christian Kreibich, Vern Paxson, Robin Sommer, Nicholas Weaver International Computer Science Institute Abstract

Add to Reading List

Source URL: www1.icsi.berkeley.edu

Language: English - Date: 2012-09-26 16:43:07
446Prevention / Security / Safety / National security / Crime prevention / Cryptography / Information governance / Computer security / Information security / Information system

Foothill-De Anza Community College District Board of Trustees Board Policy Manual Electronic Information Security

Add to Reading List

Source URL: ets.fhda.edu

Language: English - Date: 2015-03-12 18:57:54
447Cyberwarfare / Computer network security / Computer security / Crime prevention / Cryptography / National security / Cyber-attack / Cyber security standards

Roadmap to Secure Control Systems in the Water Sector

Add to Reading List

Source URL: www.awwa.org

Language: English - Date: 2013-03-29 15:26:12
448Security / Prevention / Computer security / Crime prevention / Cryptography / Information governance / National security / Codenomicon / Software testing / Cert / Information security / AbuseHelper

CERT-FI & Abuse Situation Awareness Case Study BACKGROUND CERT-FI is the Finnish national computer security incident response team whose task is to promote security in the information

Add to Reading List

Source URL: www.codenomicon.com

Language: English - Date: 2016-03-02 04:58:14
449Security / Cryptography / Cyberwarfare / Computer network security / Computer security / Crime prevention / National security

POSTER: Security By Mobility in Location and Track Verification Matthias Schäfer† † Daniel S. Berger†

Add to Reading List

Source URL: www.lenders.ch

Language: English - Date: 2015-08-08 10:29:40
450Security / Prevention / Computer security / National security / Crime prevention / Cryptography / Information governance / Vulnerability / Information security / Bromium / Cyber-attack / Attack

Report Black Hat 2015: State of Security Endpoint Risk Overshadows All Others

Add to Reading List

Source URL: www.bromium.com

Language: English
UPDATE