Computer crime

Results: 9938



#Item
611Crime prevention / Hacking / Cryptography / Cyberwarfare / SCADA / Vulnerability / Idaho National Laboratory / Malware / Computer insecurity / Security / Computer security / National security

CyberSafety: On the Interactions between CyberSecurity and the Software Engineering of Safety-Critical Systems C.W. Johnson, Department of Computing Science, University of Glasgow, Glasgow, Scotland, UK, G12 8RZ. johnson

Add to Reading List

Source URL: www.dcs.gla.ac.uk

Language: English - Date: 2011-06-02 08:43:05
612Computer security / Identity document / Credential / Door / Crime prevention / Security / Identity management / Access control

Policy Title: Secured Buildings Policy #: FC-1 Purpose: Policy:

Add to Reading List

Source URL: www.southdakotasafetycouncil.org

Language: English - Date: 2015-05-20 10:04:29
613Computer security / Secure communication / Crime prevention / National security / Malware / Crimeware / Phishing / Threat / Data breach / Security / Cyberwarfare / Computer network security

2015 DBIR Contributors (See Appendix C for a detailed list.) i

Add to Reading List

Source URL: www.ciosummits.com

Language: English - Date: 2015-05-26 10:55:19
614National security / Computer network security / Computer security / Data management / Data security / Internet privacy / Operating system / Privilege / Abilene Christian University / Security / Ethics / Crime prevention

Policy for the Responsible Use of Technology Resources

Add to Reading List

Source URL: www.acu.edu

Language: English - Date: 2009-12-16 23:05:58
615Crime prevention / Computer security / Computer network security / Information security / Security engineering / Physical security / Authentication / Access control / Vulnerability / Security / Public safety / National security

CHAPTER 1 What Is Security Engineering? Out of the crooked timber of humanity, no straight thing was ever made.

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2011-12-05 05:22:27
616Crime / Bullying / School bullying / Computer crimes / Social psychology / Cyber-bullying / Anti-bullying legislation / Harassment / Intimidation / Ethics / Abuse / Behavior

Microsoft WordOnline

Add to Reading List

Source URL: cdn.harvardlawreview.org

Language: English - Date: 2015-05-09 13:58:05
617National security / Public safety / Prevention / Computer security / Bruce Schneier / Information security / Information Systems Security Association / Privacy / Internet privacy / Security / Data security / Crime prevention

FOR IMMEDIATE RELEASE Jim Goyjer: (Email: Internationally Renowned Security Expert Bruce Schneier to Keynote the 2015 ISSA-LA Information Security Summit on Cybercrime Solutions

Add to Reading List

Source URL: summit.issala.org

Language: English - Date: 2014-09-22 19:07:54
618International Multilateral Partnership Against Cyber Threats / International Telecommunication Union / Terrorism / Cyberterrorism / Criminology / Computer crimes / Cyberwarfare / Crime

CAMINO is the Coordination and Support Action entitled ‘Comprehensive Approach to cyber roadMap coordINation and develOpment’, a European research project in the security

Add to Reading List

Source URL: www.fp7-camino.eu

Language: English - Date: 2015-05-15 08:07:01
619Computing / Standards organizations / Computer security / Public safety / Gaithersburg /  Maryland / National Institute of Standards and Technology / Metrology / Cloud computing / Smart grid / Security / Crime prevention / National security

Information Technology Laboratory Letter from the Director T

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2015-05-19 13:24:18
620Data security / Information security / National security / Public safety / Prevention / Security / Crime prevention / Computer security

Electronic Personnel Security - People Admin/EPAF ROUTING New Mexico State University Information & Communication Technologies

Add to Reading List

Source URL: af.nmsu.edu

Language: English - Date: 2014-01-09 11:38:58
UPDATE