Computer crime

Results: 9938



#Item
631Computing / Crime prevention / National security / Computer network security / Information technology management / Cloud computing / Application security / Data security / Payment Card Industry Data Security Standard / Security / Computer security / Electronic commerce

  Security Policy LearnSprout Products & Services  

Add to Reading List

Source URL: learnsprout-static.s3.amazonaws.com

Language: English - Date: 2014-12-23 18:35:24
632National security / Human rights / Public safety / Computer network security / Science and Technology Options Assessment / Internet privacy / Open-source software / Cloud computing / Computer security / Security / Ethics / Crime prevention

Mass Surveillance Mass Surveillance What are the risks for citizens and the opportunities for the European Information Society? What are the possible mitigation strategies?

Add to Reading List

Source URL: www.europarl.europa.eu

Language: English - Date: 2015-02-12 15:10:03
633Crime prevention / United States government secrecy / Data security / Computer security / Security clearance / Security guard / Information security / United States Department of Homeland Security / Security / National security / Public safety

Initial Security Indoctrination Briefing Office of Homeland Security and Emergency Coordination Personnel and Document Security Division Classified National Security Programs Branch

Add to Reading List

Source URL: www.dm.usda.gov

Language: English - Date: 2015-02-24 09:11:12
634Actuarial science / Data security / Crime prevention / National security / Information security / Vulnerability / Internal control / Value at risk / Computer security / Security / Public safety / Risk

CHAPTER 25 Managing the Development of Secure Systems My own experience is that developers with a clean, expressive set of specific security

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2011-12-05 05:55:02
635Crime prevention / National security / Computing / Public safety / Data security / Penetration test / Information security / Cloud computing security / Cloud computing / Security / Computer security / Computer network security

TECHNICAL LEVEL DESIGNATIONS CONFERENCE AT-A-GLANCE Wednesday, March 25

Add to Reading List

Source URL: www.infosec-world.com

Language: English - Date: 2015-02-06 12:03:44
636Computer network security / Crime prevention / National security / Vulnerability / Threat / IT risk / Managed security service / Security / Computer security / Cyberwarfare

FEATURE MINDANAOIndustrial Security Management BY LACHLAN MCCONNELL T

Add to Reading List

Source URL: www.osi.com.ph

Language: English - Date: 2014-01-11 04:16:42
637Crime prevention / Data security / Information security / National security / Central Intelligence Agency / Government procurement in the United States / Public safety / Security / United States administrative law / Computer security

A.1 SIMM 19A Preparation Instructions

Add to Reading List

Source URL: www.cio.ca.gov

Language: English - Date: 2014-12-30 16:23:23
638Public safety / National security / Computer crimes / Information Systems Security Association / International Multilateral Partnership Against Cyber Threats / Information security / Computer security / Security guard / Marc Maiffret / Security / Crime prevention / Data security

FOR IMMEDIATE RELEASE Jim Goyjer: (Email: ISSA-LA Sixth Annual Information Security Summit on Cybercrime Solutions Cybersecurity Expert Richard A. Clarke and Los Angeles County

Add to Reading List

Source URL: summit.issala.org

Language: English - Date: 2014-11-11 23:51:40
639Public safety / Computer security / Crime prevention / Information security / National security / Strategic planning / Business continuity / Continuity of Operations Plan / Business / Data security / Security

Continuity Multi-Year Strategy and Program Management Plan (MYSPMP)

Add to Reading List

Source URL: www.fema.gov

Language: English - Date: 2014-03-04 10:38:24
640Computer security / Crime prevention / Data security / Information security / National security / Purchasing / Business / Technology / Security

SAM – INFORMATION TECHNOLOGY DISPOSAL OF IT EQUIPMENT CHAPTER 5900 INDEX PURPOSE 5901

Add to Reading List

Source URL: www.documents.dgs.ca.gov

Language: English - Date: 2015-02-25 13:26:34
UPDATE