Computer crime

Results: 9938



#Item
451Government / Security / Computer network security / Computer security / Crime prevention / Cryptography / Cyberwarfare / National security / Forensic science / Prosecutor / Hotspot / Telecommunications (Interception and Access) Amendment (Data Retention) Act

State of the States Cyber Crime Consortium 2014 Meeting Recap

Add to Reading List

Source URL: www.search.org

Language: English
452Computing / Government / National security / Crime prevention / Security / Computer security / Computer network security / Privacy / Internet privacy / Motivation / Social media / Password

The Effect of Social Influence on Security Sensitivity

Add to Reading List

Source URL: www.usenix.org

Language: English
453Computing / Cyberwarfare / Security / Computer network security / Humancomputer interaction / Crime prevention / National security / Salvatore J. Stolfo / Usability / Masquerade / Rootkit / Computer security

Modeling User Search Behavior for Masquerade Detection Malek Ben Salem and Salvatore J. Stolfo Computer Science Department Columbia University New York, USA

Add to Reading List

Source URL: ids.cs.columbia.edu

Language: English - Date: 2011-09-04 10:44:35
454Security / Cyberwarfare / Computer network security / Computer security / Crime prevention / Cryptography / National security

WWW.SMARTSIMPLE.COMThe Marine Institute of Ireland About The Marine Institute of Ireland

Add to Reading List

Source URL: www.smartsimple.com

Language: English - Date: 2015-10-14 09:52:58
455Secure communication / Data security / Computer security / Crime prevention / National security / Data breach / Data loss prevention software / Identity theft / Laptop theft / Security / Cloud computing / Insider threat

Report Grand Theft Data Data exfiltration study: Actors, tactics, and detection

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2015-09-22 16:22:57
456Security / Prevention / National security / Safety / Crime prevention / Cryptography / Information governance / Cyberwarfare / Computer security / Information security / Privacy / Medical privacy

Thank you for the opportunuty to submit evidence to inform the Royal Society’s Cybersecurity research project. I am writing today on my own behalf to draw attention to an easily overlooked set of problems in cybersecu

Add to Reading List

Source URL: adam.shostack.org

Language: English - Date: 2014-06-11 12:06:03
457Computing / Prevention / Information technology / Computer security / Crime prevention / Cryptography / Data security / Information security / National security / Copyright law of the United States / Internet privacy / Privacy

POLICY 7.4 Responsible Use of Information Technology Resources

Add to Reading List

Source URL: policy.nd.edu

Language: English - Date: 2015-11-19 14:36:56
458Security engineering / Safety / Security / Information appliances / Crime prevention / Alarms / National security / Security alarm / Touchscreen / Personal digital assistant / Smartphone / Computer security

RES-0694-1505_HSC-QuickStart.indd

Add to Reading List

Source URL: brighthouse.com

Language: English - Date: 2016-03-04 14:20:42
459Security / Prevention / Computing / Computer network security / Crime prevention / Cryptography / Information governance / National security / Virtual private network / ResNet / Information security / Computer security

INFORMATION TECHNOLOGY SERVICES Effective Date: May 5, 2015 Date Revised: May 5, 2015

Add to Reading List

Source URL: www.northeastern.edu

Language: English - Date: 2016-03-03 11:47:10
UPDATE