Computer crime

Results: 9938



#Item
651Forensic science / Digital forensics / Knowledge / Crime / Law enforcement / Department of Defense Cyber Crime Center / Computer forensics / Information technology audit / Federal Bureau of Investigation

The University of Alaska Fairbanks Advanced Systems Security Education, Research, and Training (ASSERT) Center presents Mark Pollitt

Add to Reading List

Source URL: assert.uaf.edu

Language: English - Date: 2008-12-30 11:58:23
652Data breach / Data security / Secure communication / Identity theft / Anthem / Cyberwarfare / Crime / Security / Computer security / Computer network security

55 Elm Street P.O. Box 120 Hartford, CTGEORGE JEPSEN ATTORNEY GENERAL

Add to Reading List

Source URL: www.ct.gov

Language: English - Date: 2015-02-10 14:51:33
653Data security / Information security / National security / Public safety / Password / Internet privacy / Transaction authentication number / Security / Computer security / Crime prevention

Microsoft Word - Confidentiality Policydocx

Add to Reading List

Source URL: isweb.fdu.edu

Language: English - Date: 2013-10-31 10:45:34
654Security / Software testing / Crime prevention / National security / Application firewall / Application security / Penetration test / Zero-day attack / Cross-site scripting / Computer network security / Cyberwarfare / Computer security

THE EVOLUTION OF ENTERPRISE APPLICATION SECURITY April 2015 THE EVOLUTION

Add to Reading List

Source URL: www.prevoty.com

Language: English - Date: 2015-06-04 23:45:16
655Public safety / National security / Electronic commerce / Surveillance / Computer security / Penetration test / Security guard / International Ship and Port Facility Security Code / Security / Crime prevention / Computer network security

Bernhards_Ungāriem_09

Add to Reading List

Source URL: www.cert.lv

Language: English - Date: 2013-05-17 04:03:43
656Computer security / Computer network security / Electronic commerce / Crime prevention / National security / Agile software development / Application security / Software development process / Vulnerability / Software development / Security / Computing

® ® Agile Software Security Every build,

Add to Reading List

Source URL: www.quotium.com

Language: English - Date: 2014-09-19 09:31:13
657National security / National Security Agency / Mandatory access control / Multilevel security / Access Control Matrix / Information security / Trusted Computer System Evaluation Criteria / Access control / Trusted computing base / Computer security / Security / Crime prevention

Microsoft Word - 1995_CRC_Handbook_Article MSWord.doc

Add to Reading List

Source URL: www.landwehr.org

Language: English - Date: 2014-08-18 19:00:38
658Crime prevention / National security / United States Department of Homeland Security / National Telecommunications and Information Administration / Digital Opportunity Investment Trust / Computer security / Government / Security / Public safety

PDF Document

Add to Reading List

Source URL: www.doit.state.nm.us

Language: English - Date: 2010-04-23 11:46:16
659Public safety / Data security / Prevention / Computer security / Information security / Security engineering / Security policy / Information systems / Security / Crime prevention / National security

Chapter 24: Conclusions C H A P TE R 24 Conclusions

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2006-08-25 10:25:28
660Crime prevention / Data security / Bell–LaPadula model / Multilevel security / Mandatory access control / Trusted system / Information security / Classified information / Security policy / Computer security / Security / National security

CHAPTER 8 Multilevel Security Most high assurance work has been done in the area of kinetic devices and infernal machines that are controlled by stupid robots. As

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2011-12-05 05:30:52
UPDATE