Computer crime

Results: 9938



#Item
511National security / Computer security / HMS Impregnable / Public safety / Doors / Security / Crime prevention

Security & great design from Impregnable Securty. Our range of security doors cover all needs, from very cheap simple

Add to Reading List

Source URL: www.impregnablesecurity.co.uk

Language: English - Date: 2014-06-24 19:26:16
512Information technology management / Data management / Crime prevention / National security / Backup / Off-site data protection / Data remanence / Computer security / Data center / Computing / Security / Data security

OFFSITE DATA PROTECTION FIVE BEST PRACTICES FOR PROTECTING BACKUP DATA Backup encryption should be one of many activities that formulate a comprehensive security strategy. In many environments, storage has operated outs

Add to Reading List

Source URL: www.ironmountain.ro

Language: English
513Crime prevention / Actuarial science / National security / Computer network security / Security guard / Risk / Emergency management / Computer security / IT risk management / Security / Public safety / Management

GW_IPS_Infographic_FullMatrix_v6

Add to Reading List

Source URL: www.garda-world.com

Language: English - Date: 2014-08-31 08:09:47
514Crime prevention / National security / Computer network security / Software testing / Vulnerability / Computer worm / Peer-to-peer / Malware / Information security / Security / Computer security / Cyberwarfare

DRAFT DRAFT Peer Production of Privacy and Security Information L Jean Camp*

Add to Reading List

Source URL: www.ljean.com

Language: English - Date: 2013-08-22 12:18:46
515Technology / Financial cryptography / Crime prevention / National security / RSA / Micropayment / Electronic money / Computer security / Electronic commerce / Cryptography / Payment systems

Call for Papers Financial Cryptography and Data Security 2007 February 12-15, 2007 Lowlands, Scarborough, Trinidad and Tobago http://fc07.ifca.ai/

Add to Reading List

Source URL: www.ifca.ai

Language: English - Date: 2006-10-06 17:40:38
516Computing / Programming language theory / Information flow / Information theory / Crime prevention / National security / Data-flow analysis / Static single assignment form / Computer security / Data types / Type theory / Software engineering

Enforcing information flow policies by a three-valued analysis Jos´ee Desharnais Erwanne P. Kanyabwero

Add to Reading List

Source URL: csf2012.seas.harvard.edu

Language: English - Date: 2012-07-05 18:15:10
517Internet / Crime prevention / National security / Email / Computer network security / Internet privacy / Information security / Acceptable use policy / Privacy / Computer security / Computing / Security

Updated as of June 29, 2011 Framingham State University’s computing and electronic communication resources are the property of the University and are made available to authorized users for teaching, learning, research,

Add to Reading List

Source URL: www.framingham.edu

Language: English - Date: 2015-04-29 11:51:11
518Institute for Security and Development Policy / Cyberspace / Crime / Computer security / Sino-American relations / Cyberpunk / Department of Defense Strategy for Operating in Cyberspace / U.S. Department of Defense Strategy for Operating in Cyberspace / Computer crimes / Security / National security

Policy Brief No. 156 June 19, 2014 Tensions in Cyberspace: Toward a Code of Conduct

Add to Reading List

Source URL: www.isdp.eu

Language: English - Date: 2014-06-19 09:11:43
519Law enforcement / Phishing / Malware / Computer security / Department of Defense Cyber Crime Center / Internet safety / Computer crimes / Crime / Security

Cyber Safety Awareness Training Cyber Safety Awareness Training protects your organization from the latest Internet threats and reduces the high costs associated with incident remediation by providing computer-based trai

Add to Reading List

Source URL: info.cyveillance.com

Language: English - Date: 2015-07-18 15:59:45
520Ethics / Crime / Security / Hacking / Military technology / Legal aspects of computing / Cyberwarfare / International Multilateral Partnership Against Cyber Threats / Cyberethics / Computer crimes / Computer law / Cyberspace

ECONOMIC COMMISSION FOR AFRICA AFRICAN UNION COMMISSION

Add to Reading List

Source URL: www.cio.co.ke

Language: English - Date: 2015-07-19 09:52:38
UPDATE