Computer crime

Results: 9938



#Item
561Electronic warfare / Hacking / Computer security / Advanced persistent threat / SCADA / Stuxnet / Malware / Operation Aurora / Computer crime / Cybercrime / Technology / Cyberwarfare

ThetaRay_Logo_Options_Draft7

Add to Reading List

Source URL: www.thetaray.com

Language: English - Date: 2014-12-06 20:04:03
562Counterfeit consumer goods / Monopoly / United Kingdom copyright law / Anti-Counterfeiting Trade Agreement / Copyright infringement / Agreement on Trade-Related Aspects of Intellectual Property Rights / Organized crime / Digital Economy Act / Copyright / Law / Intellectual property law / Computer law

Book Reviews Christophe Geiger (ed.), Criminal Enforcement of Intellectual Property. A Handbook of Contemporary Research Edward Elgar 2012, 416 pages, ISBN1

Add to Reading List

Source URL: www.jipitec.eu

Language: English - Date: 2013-04-19 12:10:22
563Data security / Computer network security / Computer security / Public safety / Information security / Internet privacy / Cloud computing / NIST Special Publication 800-53 / Department of Defense Strategy for Operating in Cyberspace / Security / Crime prevention / National security

How TMT organizations perceive their security 88% 68%

Add to Reading List

Source URL: deloitte.wsj.com

Language: English
564Computer security / Security guard / Surveillance / Vulnerability / Event management / Safety / Emergency procedure / Ethics / Security / Crime prevention

eGuide July 2014 Guidance for Events in UK Venues SECURITY Sub-section

Add to Reading List

Source URL: www.aeo.org.uk

Language: English - Date: 2014-08-19 05:18:44
565Cyberwarfare / Crime prevention / National security / Computer network security / Information security / Asset / Information Lifecycle Management / Security controls / Vulnerability / Data security / Security / Computer security

Microsoft Word - HuddersfieldUniversityI T SecurityPolicy UTLC approved 0707 upd 0309.doc

Add to Reading List

Source URL: www.hud.ac.uk

Language: English - Date: 2015-03-06 11:27:17
566Evaluation / Computing / Security / Common Criteria / Crime prevention / Security Target / Smart card / Security service / Ring / ISO standards / Computer security / Computer network security

Supporting Document Guidance Security Architecture requirements (ADV_ARC) for smart cards and similar devices - Appendix 1

Add to Reading List

Source URL: www.commoncriteriaportal.org

Language: English - Date: 2012-04-03 19:57:50
567ISO standards / Crime prevention / National security / Computing / Security Target / Security service / Ring / Common Criteria / Computer security / Computer network security / Security

Security Architecture requirements (ADV_ARC) for smart cards and similar devices Appendix 1 Version 2.0 January 2012

Add to Reading List

Source URL: sogis.eu

Language: English - Date: 2013-02-14 10:21:06
568National security / Montgomery County /  Pennsylvania / Unisys / Public safety / Computer security / Computer network / Internet security / Virtual LAN / Information security / Computer network security / Security / Crime prevention

Unisys Stealth Solution Suite You Can’t Hack What You Can’t See Introduction Changing the Security Paradigm

Add to Reading List

Source URL: www.prianto.at

Language: English - Date: 2013-12-03 06:43:40
569National security / Boulder /  Colorado / Public safety / Internet privacy / Computer security / Security policy / Prevention / Password strength / Password policy / Security / Password / Crime prevention

CITY OF BOULDER *** POLICIES AND PROCEDURES CONNECTED PARTNER EFFECTIVE DATE:

Add to Reading List

Source URL: www-static.bouldercolorado.gov

Language: English - Date: 2013-07-19 17:58:29
570Crime prevention / Law enforcement / Computer network security / Vulnerability / Counter-terrorism / Computer security / Threat / Privacy / Capability-based security / Security / National security / Public safety

TACTICS PROJECT DELIVERABLE SEVENTH FRAMEWORK PROGRAMME Collaborative project Small or medium-scale focused research project FP7-SEC

Add to Reading List

Source URL: www.fp7-tactics.eu

Language: English - Date: 2014-10-14 05:31:18
UPDATE