Computer crime

Results: 9938



#Item
571Computer network security / Excise / Single-window system / Computer security / Business / Public safety / Security / Crime prevention / National security

THE NEW MINISTRY: STRATEGY AND INNOVATION

Add to Reading List

Source URL: unnext.unescap.org

Language: English - Date: 2014-01-16 02:25:23
572Crime prevention / National security / Forschungszentrum Informatik / CeBIT / Software protection dongle / Vulnerability / Application security / Security / Cyberwarfare / Computer security

Press Release No. 024 | kes | March 05, 2015 CeBIT: Security in a Smart World Cameras Compliant with Data Protection Legislation/ Privacy-respecting Smart Meters/ Simultaneous Translator/ Safe without Emergency Button/ S

Add to Reading List

Source URL: www.kit.edu

Language: English - Date: 2015-03-05 04:34:20
573Identity theft / Internet-related prefixes / International Cybercrime / Computer crimes / Crime / Anthony Giddens /  Baron Giddens

Information Communication Technologies’ Time-Space Distanciation and Crime in Lagos A.S. Oyenuga, B.A. Odunaike & M.F. Olaitan Department of Sociology

Add to Reading List

Source URL: nasanigeria.org

Language: English - Date: 2013-12-01 10:47:11
574Crime prevention / Data security / Information security / National security / Due diligence / Public safety / Law / Security / Computer security

(Provisional Translation) Main Points of the Inspection Policy and Inspection Program for FY2015(1) Basic Direction Role of inspections Ensure investor confidence in the markets by ensuring the integrity of capita

Add to Reading List

Source URL: www.fsa.go.jp

Language: English - Date: 2015-05-22 03:01:21
575Crime prevention / United States government secrecy / Computer security / Data security / National Security Agency / Cyberwarfare / Information security / United States Cyber Command / United States Department of Homeland Security / Security / National security / Public safety

Can We Ever Have Technological Security? Thomas Keenan | October 2013 Strategic Studies Working Group Papers Can We Ever Have Technological Security?

Add to Reading List

Source URL: 2glspd2t2a9zr20ie1z7bx8zbb.wpengine.netdna-cdn.com

Language: English - Date: 2014-05-15 14:14:48
576Security studies / Crime prevention / International relations theory / International security / Computer security / Human security / ISO/TC 223 / Security / International relations / National security

The Value of Cooperation The Value of Cooperation Innovation in Dutch Security in Perspective The Value of Cooperation

Add to Reading List

Source URL: thehaguesecuritydelta.com

Language: English - Date: 2015-04-17 04:28:10
577Public safety / United States Department of Homeland Security / Cyberwarfare / Security engineering / Computer security / Critical infrastructure protection / Information security / National Cyber Security Division / International Cybercrime / Security / National security / Crime prevention

COUNTRY: FRANCE France has had a national cybersecurity strategy in place since 2011, although it has a strong focus on defence and national security issues. The National Agency for the Security of Information Systems (A

Add to Reading List

Source URL: cybersecurity.bsa.org

Language: English - Date: 2015-02-26 18:16:02
578Computer network security / Crime prevention / National security / SCADA / Telemetry / Automation / Siemens / Stuxnet / Technology / Security / Computer security

TIEA_Security innen_E.indd

Add to Reading List

Source URL: www.siemens.com

Language: English - Date: 2013-07-12 07:33:57
579Computer security / Crime prevention / Identification / Biometric passport / Biometrics / Identity document / Smart card / Authentication / British passport / Security / National security / Data security

9th EDITION The Global Hub For Next-Generation Citizen and Government ID Solutions QEII CENTRE, WESTMINSTER, LONDON, UK CONFERENCE: 9-11 JUNE 2015 EXHIBITION: 10-11 JUNE 2015

Add to Reading List

Source URL: www.sdw2015.com

Language: English - Date: 2015-05-13 09:37:54
580Computer security / Crime prevention / National security / Information technology management / Vulnerability / Information security / Attack / Procurement / Multifunction printer / Security / Cyberwarfare / Computer network security

Vulnerability-centric assurance activities for MFP PP as a candidate for cPP Fumiaki Manabe JISEC / IPA, Japan

Add to Reading List

Source URL: www.commoncriteriaportal.org

Language: English - Date: 2013-08-02 03:54:36
UPDATE