Computer crime

Results: 9938



#Item
681Crime prevention / Data security / Information security / National security / Internet privacy / Privacy / Public safety / Ethics / Security / Computer security

MayThe Research Foundation for The State University of New York Acceptable Use and Security of RF Data and Information Technology

Add to Reading List

Source URL: www.rfsuny.org

Language: English - Date: 2015-05-06 09:21:31
682Crime prevention / National security / Computer security / Computer crimes / Carnegie Mellon University / Computer emergency response team / Information security / Pretty Good Privacy / Password / Security / Public safety / Computing

CERT.LV Description Version 3.6 Document OID: About this document 1.1 Date of Last Update

Add to Reading List

Source URL: www.cert.lv

Language: English - Date: 2015-01-19 08:50:38
683Public safety / Crime prevention / Data security / Bell–LaPadula model / Multilevel security / Mandatory access control / Information security / Classified information / Information sensitivity / Computer security / Security / National security

Security Engineering: A Guide to Building Dependable Distributed Systems PART Two

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2006-08-24 16:21:33
684Cyberterrorism / Internet-related prefixes / Computer crimes / Crime / International Multilateral Partnership Against Cyber Threats

Project CAMINO “Comprehensive Approach to cyber roadMap coordINation and develOpment" INVITATION TO AN EXPERT’S WORKSHOP June 15th and 16th 2015 Project CAMINO (http://www.fp7-camino.eu/) partners invite you to an Ex

Add to Reading List

Source URL: www.fp7-camino.eu

Language: English - Date: 2015-05-22 03:29:16
685Crime in the United States / Federal Bureau of Investigation / Internet Crime Complaint Center / Rail transport / Law enforcement / IC3 / Social engineering / Internet fraud / National White Collar Crime Center / Crime / Cybercrime / Computer crimes

2013 Internet Crime Report 1 Table of Contents Executive Summary ....................................................................................................................................................3

Add to Reading List

Source URL: www.victimvoice.org

Language: English - Date: 2015-01-16 10:43:10
686National security / Nevada System of Higher Education / Internet privacy / Cyberwarfare / Computer security / Group / Denial-of-service attack / Computer network security / Security / Crime prevention

Page 1 of 3 (Revised 17 NovSYSTEM ACCOUNTS APPLICATION First Name______________________ Middle Initial ______ Last Name________________________ Home Address_____________________________________Birthdate__________

Add to Reading List

Source URL: gbcnv.edu

Language: English - Date: 2014-12-01 13:28:07
687Data / Copyright infringement / Crimes / Organized crime / Tort law / Copyright / Peer-to-peer file sharing / Internet / Legal aspects of file sharing / Law / Intellectual property law / Information

SCC Student Handbook and College Catalog Computer Usage Policy: COMPUTER USAGE Computers are available for student use at each campus. Computers are located in the computer labs, classrooms, and Learning Resource Center

Add to Reading List

Source URL: helpdesk.southeast.edu

Language: English - Date: 2013-02-19 16:16:07
688Computer security / Crime prevention / Information security / Public safety / Intranet / National security / Security / Data security

State of New Mexico Statewide Architectural Configuration Requirements Title: Personnel Security Standard S-STD011.001 Effective Date: June 2, 2005 1.

Add to Reading List

Source URL: www.doit.state.nm.us

Language: English - Date: 2013-09-24 10:13:37
689National security / Public safety / Data security / International Multilateral Partnership Against Cyber Threats / Information security / National Cyber Security Division / Security / Computer security / Crime prevention

Microsoft PowerPointNIST-Framework.pptx

Add to Reading List

Source URL: www.n-b-f.org

Language: English - Date: 2015-02-25 15:51:11
690Cyberwarfare / International Multilateral Partnership Against Cyber Threats / International Telecommunication Union / European Network and Information Security Agency / Computer security / Computer emergency response team / Crime / Government / International Cybercrime / Computer crimes / Security / National security

Cybersecurity Strategy of the Republic of Cyprus Antonis Antoniades Office of the Commissioner of Electronic Communications and Postal Regulation http://www.ocecpr.org.cy

Add to Reading List

Source URL: resilience.enisa.europa.eu

Language: English - Date: 2015-05-18 07:23:29
UPDATE