Computer crime

Results: 9938



#Item
491Phishing / Employment compensation / Payroll / Crime / Business / Ethics / Computer crimes / Social engineering / Spamming

Date: To: From: Re: November 13, 2014

Add to Reading List

Source URL: payroll.uconn.edu

Language: English - Date: 2014-11-14 12:12:37
492Crime prevention / Electronic commerce / National security / Secure communication / Common Criteria / Avionics / Technology / Public safety / Security / Computer network security / Computer security

Michael DULUCQ_CC convergence with Safety Standards in Aeronautics &慭瀻 Space industries

Add to Reading List

Source URL: www.yourcreativesolutions.nl

Language: English - Date: 2011-09-09 11:25:00
493Security Target / Evaluation Assurance Level / Common Criteria / Crime prevention / National security / Unidirectional network / Protection Profile / Computer security / Bartek / Evaluation / Security / Networking hardware

FORT FOX HARDWARE DATA DIODE Security Target Common Criteria FFHDD – EAL4+ Classification INTERNAL

Add to Reading List

Source URL: www.commoncriteria-india.gov.in

Language: English - Date: 2013-01-03 08:44:03
494System software / Crime prevention / National security / Password / Data security / Identity management / Information security / One-time password / Self-service password reset / Security / Computer security / Identity management systems

White Paper ENTERPRISE www.novell.com Enabling Retail Banks to

Add to Reading List

Source URL: www.tentonmarketing.com

Language: English - Date: 2014-12-17 12:32:00
495

Dr. Frank Law, CISSP Chief Inspector of Police, Computer Forensics, Technology Crime Division, Commercial Crime Bureau, Hong Kong Police Force

Add to Reading List

Source URL: www.informationsecurityasia.com

Language: English - Date: 2012-07-20 02:59:40
    496Crime / Cyberterrorism / Computer security / SCADA / Automated teller machine / International Cybercrime / Computer crimes / Technology / Business

    Cybercrime Exposures in a new Digital Society 4th ICTET week ADDIS ABABA - June, 2011 To show variety of cyber-risks, knowing that once aware of them you

    Add to Reading List

    Source URL: www.clusif.fr

    Language: English - Date: 2011-07-08 07:22:46
    497Crime prevention / National security / Computer network security / Electronic commerce / Secure communication / Vulnerability / Security / Cyberwarfare / Computer security

    Secure Provision and Consumption in the Internet of Services FP7-ICT, ICTTrustworthy ICT) Project Nowww.spacios.eu

    Add to Reading List

    Source URL: www.spacios.eu

    Language: English - Date: 2012-10-11 06:23:09
    498Crime / National security / Electronic warfare / Hacking / Military technology / Computer security / International Multilateral Partnership Against Cyber Threats / Cyberterrorism / Legal aspects of computing / Computer crimes / Cyberwarfare / Security

    KENYA CYBER SECURITY REPORT 2014 Rethinking Cyber Security – “An Integrated Approach: Processes, Intelligence and Monitoring.”

    Add to Reading List

    Source URL: www.usalama.co.ke

    Language: English - Date: 2014-06-09 08:57:31
    499Computer security / Crime prevention / National security / Secure communication / Certification / Cyberwarfare / Computer network security / Security / Electronic commerce

    ISA Security Compliance Institute and Wurldtech Partnership October 25, 2010 From ISA Press Release Research Triangle Park, North Carolina, USA (25 October 2010) –The ISA Security Compliance Institute (ISCI) and Wurldt

    Add to Reading List

    Source URL: www.wurldtech.com

    Language: English - Date: 2015-07-15 01:28:14
    500Computer crimes / Cyberwarfare / Melissa Hathaway / Internet-related prefixes / Cyberspace / War / Military science / Crime / Electronic warfare / Hacking / Military technology

    Understanding the Dynamics of Cyber International Relations Project Team Nazli Choucri (PI), David D. Clark, Roger Hurwitz, Daniel Goldsmith, Stuart Madnick, John C. Mallery, Silvio Micali, Michael Siegel, Patrick H. Win

    Add to Reading List

    Source URL: web.mit.edu

    Language: English - Date: 2010-10-07 14:21:20
    UPDATE