Computer crime

Results: 9938



#Item
481Computing / Security / Prevention / Data management / Computer security / Crime prevention / Cryptography / National security / Data center / Password / Cloud computing / Personal /  Inc.

PDF Document

Add to Reading List

Source URL: www.circuit.com

Language: English - Date: 2015-11-18 02:00:30
482Computer security / Security / Malware / Computer forensics / Prevention / Digital forensics / Crime prevention / National security / Stochastic forensics

PDF Document

Add to Reading List

Source URL: cis.uab.edu

Language: English - Date: 2012-03-13 00:54:59
483Computing / Software / Computer security / Computer network security / Cyberwarfare / Antivirus software / Crime prevention / Proprietary software / OpenDNS / Comodo Group / Internet privacy / Firewall

PDF Document

Add to Reading List

Source URL: www.nebraskacert.org

Language: English - Date: 2010-01-20 17:04:31
484Sociology / Ethics / French words and phrases / Civil disobedience / Crime prevention / Sousveillance / Steve Mann / Opportunism / Closed-circuit television / Surveillance / National security / Security

The inevitability of the transition from a surveillance-society to a veillance-society: Moral and economic grounding for sousveillance Mir Adnan Ali and Steve Mann Department of Electrical and Computer Engineering Univer

Add to Reading List

Source URL: eyetap.org

Language: English - Date: 2013-10-12 01:11:24
485Phishing / Social engineering / Crime / Crimeware / Computing / Internet / Email spam / Anti-Phishing Working Group / Avalanche / Spamming / Computer crimes / Malware

apwg_trends_report_q2_2012_release_candidate_three

Add to Reading List

Source URL: docs.apwg.org

Language: English - Date: 2012-11-19 20:54:17
486Public safety / Email / Computer security / Communications protocol / Logic / Physical security / Security / Crime prevention / National security

Formalizing Physical Security Procedures Catherine Meadows1 and Dusko Pavlovic2 1 Naval Research Laboratory, Washington, DC, USA Email:

Add to Reading List

Source URL: csf2012.seas.harvard.edu

Language: English - Date: 2012-07-05 18:15:10
487Cyberwarfare / Trusted computing / Crime prevention / National security / Trusted Platform Module / IF-MAP / Trusted Computing Group / Trusted Network Connect / Network security / Computer security / Security / Computer network security

ARCHITECT’S GUIDE: CYBERSECURITY October 2013 Trusted Computing Group 3855 SW 153rd Drive Beaverton, OR 97006

Add to Reading List

Source URL: www.trustedcomputinggroup.org

Language: English - Date: 2013-12-06 18:21:27
488Data privacy / Crime prevention / National security / Cyberwarfare / Application firewall / Health Insurance Portability and Accountability Act / Check Point / HITRUST / Security / Computer network security / Computer security

CareHubs HIPAA/HITECH Compliance Technical Security Measures Summary Updated: Jan 24th, 2014

Add to Reading List

Source URL: www.hivestrategies.com

Language: English - Date: 2014-10-17 11:23:09
489Cyber security standards / Cyberwarfare / Control system security / Professional certification / Department of Defense Cyber Crime Center / Computer security / Security / Computing

Wurldtech and Exida Announce Global Partnership March 17, 2009 Leading Industrial Cyber Security & Functional Safety Experts Partner to Deliver the Achilles Cyber Security Certification Program to Vendors & Operators of

Add to Reading List

Source URL: www.wurldtech.com

Language: English - Date: 2015-07-20 17:08:51
490Surveillance / Multimodal interaction / Crime prevention / French words and phrases / Sociology / Sousveillance / EyeTap / Steve Mann / Wearable computer / Human–computer interaction / Security / National security

FreeGlass for developers, “haccessibility”, and Digital Eye Glass + Lifeglogging Research in a (Sur/Sous)Veillance Society Steve Mann, Mir Adnan Ali, Raymond Lo, Han Wu University of Toronto, Dept. Electrical and Com

Add to Reading List

Source URL: eyetap.org

Language: English - Date: 2013-07-12 16:38:45
UPDATE