Computer crime

Results: 9938



#Item
61Prevention / Security / Espionage / Crime prevention / Law enforcement / National security / Signals intelligence / Mass surveillance / RAF Menwith Hill / Surveillance / National Security Agency

Mass Surveillance and the Crisis of Social Responsibility Phillip Rogaway Department of Computer Science

Add to Reading List

Source URL: web.cs.ucdavis.edu

Language: English - Date: 2015-12-10 07:24:36
62Computer security / Security / Prevention / Crime prevention / Data security / National Security Agency / National Information Assurance Partnership / Common Criteria Evaluation and Validation Scheme / Common Criteria Testing Laboratory / Common Criteria / Protection Profile / Evaluation Assurance Level

Microsoft Word - scheme-differences-2013.docx

Add to Reading List

Source URL: www.atsec.com

Language: English - Date: 2015-09-10 07:41:12
63Security / Prevention / Computer security / Crime prevention / Cryptography / Information governance / National security / Information security / FIPS 140-2 / Consultant / Professional certification / Common Criteria

Introducing atsec information security Chief Executive Officer, Director of Strategy and Business Devlopment Who are we?

Add to Reading List

Source URL: www.atsec.com

Language: English - Date: 2015-09-15 04:21:34
64Security / Prevention / Safety / Computer security / Data security / Crime prevention / Cryptography / National security / Information security / Health Insurance Portability and Accountability Act / Access control / Security controls

Microsoft Word - original policy template.docx

Add to Reading List

Source URL: it.ouhsc.edu

Language: English - Date: 2014-11-14 16:36:30
65Cybercrime / Computing / Security / Crime / Identity theft / Social engineering / Cryptography / Crime prevention / Phishing / Password / Computer security / Security hacker

Defending Against Phishing & Social Engineering Attacks A Resource Guide from the PCI Security Standards Council Hackers use phishing and other social engineering methods to target organisations with legitimate-looking e

Add to Reading List

Source URL: www.pcisecuritystandards.org

Language: English - Date: 2015-10-27 10:54:34
66Computing / Security / Policy / Crime prevention / Cryptography / Information governance / National security / Internet privacy / Privacy policy / Privacy / Computer security / Cloud computing

Embracing Policy Engineering Kathi Fisler Shriram Krishnamurthi Daniel J. Dougherty

Add to Reading List

Source URL: web.cs.wpi.edu

Language: English - Date: 2010-10-21 09:43:59
67Security / National security / Prevention / Crime prevention / Cryptography / Information governance / Cyberwarfare / Computer security / Internal control / Information security / Cyber-security regulation

JH2015/005 2nd September 2015 JHC Cyber Risk Assessment Guidance Background checks: 1

Add to Reading List

Source URL: www.comitemaritime.org

Language: English - Date: 2015-09-14 04:38:33
68Security / Computer network security / Cyberwarfare / Computer security / Cryptography / National security / Public-order crime / Threat / Political faction / Classified information in the United Kingdom

VICTORIAN PROTECTIVE DATA SECURITY FRAMEWORK (VPDSF) VPDSF BUSINESS IMPACT LEVEL (BIL) TABLE

Add to Reading List

Source URL: www.cpdp.vic.gov.au

Language: English - Date: 2016-08-09 01:19:38
69Security / Computer security / Prevention / Crime prevention / Cryptography / Information governance / National security / CompTIA / Information technology specialist / Information security / EMASS / Information assurance

IT Linux Network Security Specialist - DL1203 Technology Service Corporation (TSC), an Engineering Services Provider with concentration providing Radar & Sensor technology, Algorithm & Software development, Modeling & Si

Add to Reading List

Source URL: www.tsc.com

Language: English - Date: 2015-10-14 13:33:57
70Security / Computer security / Cyberwarfare / Computer network security / Crime prevention / Cryptography / National security / Government procurement in the United States / Critical infrastructure protection / NIST Cybersecurity Framework

DEFENSE CYBERSECURITY REQUIREMENTS: WHAT SMALL BUSINESSES NEED TO KNOW Office of Small Business Programs, U.S. Department of Defense 3600 Defense Pentagon, Room 3E185, Washington, DCWhy is cybersecurity impor

Add to Reading List

Source URL: www.acq.osd.mil

Language: English
UPDATE