Computer crime

Results: 9938



#Item
581Crime / Electronic warfare / Military technology / Criminology / Military science / Cyber-security regulation / Department of Defense Strategy for Operating in Cyberspace / Computer crimes / Cyberwarfare / Hacking

Cyber Security WeekApril Showcasing the Strength of Dutch Cyber Security Innovations and Knowledge In the same week as the Global Conference on Cyber Space 2015 and the NCSC One Conference, a unique ‘Cyber Secur

Add to Reading List

Source URL: www.westholland.cn

Language: English - Date: 2015-03-31 09:09:36
582Crime / Abuse / Child abuse / Child sexual abuse / Bullying / Victimisation / Child pornography / Youth Internet Safety Survey / Cyberstalking / Cybercrime / Computer crimes / Criminology

Online Victimization of Youth: Five Years Later Online Victimization of Youth: Five Years Later

Add to Reading List

Source URL: www.meldpunt-kinderporno.nl

Language: English - Date: 2015-02-23 08:07:12
583Computer network security / Crime prevention / National security / Hacking / Phishing / Threat / Information security / Advanced persistent threat / Asset / Computer security / Security / Cyberwarfare

For the YearMajor Security Threats ~ Changing and Growing Threats! ~ IT SECURITY CENTER (ISEC)

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2015-05-15 00:59:23
584Common Criteria / Security Target / Crime prevention / National security / Protection Profile / Evaluation Assurance Level / Federal Office for Information Security / BSI / Evaluation / Computer security / Security

Guidelines for Developer Documentation

Add to Reading List

Source URL: www.commoncriteriaportal.org

Language: English - Date: 2011-10-31 18:15:01
585Cyberwarfare / Computer network security / Public safety / Computer security / Information security / Vulnerability / Cryptography / Security / Crime prevention / National security

Security I Markus Kuhn Computer Laboratory, University of Cambridge http://www.cl.cam.ac.uk/teaching/1314/SecurityI/

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2014-04-22 13:24:10
586Classical cipher / Index of agriculture articles / Computer programming / Computing / Software engineering

Page 1 Victims of Crime Table 1 Q1 In the last 3 years, have you been the victim of a crime - whether you reported it to the police or not?

Add to Reading List

Source URL: lordashcroftpolls.com

Language: English - Date: 2014-02-20 07:16:11
587Crime prevention / Computer network security / Security guard / Surveillance / Academi / Attack / Information security / Private security industry in South Africa / Security / Public safety / Computer security

Microsoft Word - PSC Policy SPM.doc

Add to Reading List

Source URL: psm.du.edu

Language: English - Date: 2012-12-18 17:52:46
588Computer security / Crime prevention / Electronic commerce / National security / Secure communication / Malware / Threat / Computer network security / Security / Cyberwarfare

Modules offered by experts in the information and computer security industry.

Add to Reading List

Source URL: www.cput.ac.za

Language: English - Date: 2014-09-12 09:41:07
589National security / Public safety / Human rights / Privacy / Law enforcement / Identity management / Internet privacy / Cloud computing / Computer security / Security / Ethics / Crime prevention

Fire Workshop Presentation- Atta Badii- 13-Oct-2014

Add to Reading List

Source URL: www.trustworthyictonfire.com

Language: English - Date: 2014-11-08 09:04:29
590National security / Security guard / Surveillance / Social Security / Computer security / Job security / Private security industry in South Africa / UNI Global Union / Crime prevention / Security / Public safety

Draft: “Code of conduct and ethics for the private security sector”

Add to Reading List

Source URL: psm.du.edu

Language: English - Date: 2012-08-14 17:33:45
UPDATE