Computer crime

Results: 9938



#Item
691Crime prevention / National security / Public safety / Cognitive science / Economics of security / Information security / Privacy / Cryptography / Radio-frequency identification / Security / Ethics / Computer security

Microsoft Word - Specialisations_S&P.doc

Add to Reading List

Source URL: www.masterschool.eitictlabs.eu

Language: English - Date: 2013-01-18 05:11:19
692Public safety / Rural community development / Biosecurity / Physical security / Cooperative extension service / Farm / Computer security / Security / Crime prevention / National security

The University of Georgia Cooperative Extension Service College of Agricultural and Environmental Sciences / Athens, GeorgiaNOVEMBER 2006

Add to Reading List

Source URL: www.poultry.uga.edu

Language: English - Date: 2010-01-20 08:17:57
693Cyberwarfare / Public safety / War / Fusion center / National Cyber Security Division / Department of Defense Cyber Crime Center / Computer crimes / United States Department of Homeland Security / National security

global logo with tex black centeredt

Add to Reading List

Source URL: www.cisecurity.org

Language: English - Date: 2015-05-29 10:24:25
694Confidence tricks / Spamming / Theft / Phishing / Social engineering / Identity theft / Ethics / Password / Internet privacy / Crime / Security / Computer crimes

Cybersecurity Commissioner Adam Hamm Types of Cyber Crime Identity Theft

Add to Reading List

Source URL: ereg.naic.org

Language: English - Date: 2015-05-01 12:36:29
695Spamming / Cyberwarfare / Botnets / Computer security / Malware / Internet privacy / Denial-of-service attack / Search warrant / Computer crime / Computer network security / Computing / Multi-agent systems

Comments on Proposed Remote Search Rules Steven M. Bellovin Columbia University∗ Matt Blaze University of Pennsylvania*

Add to Reading List

Source URL: privacyink.org

Language: English - Date: 2014-10-31 18:13:12
696Crime / Violence / Domestic violence / Behavior / Computer literacy / Email / Computing / Dispute resolution / Ethics

Position Available: Non-Profit Development & Communications Coordinator National Network to End Domestic Violence Looking for an organization that is making a difference in the world? Come join our high-impact team at th

Add to Reading List

Source URL: nnedv.org

Language: English - Date: 2015-05-15 10:10:49
697National security / Public safety / Crime prevention / Information security / Health Insurance Portability and Accountability Act / Standards for Security Categorization of Federal Information and Information Systems / Classified information in the United States / Security / Computer security / Data security

State of North Carolina Statewide Information Security Manual Prepared by the Enterprise Security and Risk Management Office

Add to Reading List

Source URL: www.scio.nc.gov

Language: English - Date: 2015-02-11 13:10:14
698Computer network security / Computer security / Crime prevention / National security / Secure communication / Government / United States Department of Homeland Security / Cyber-security regulation / National Cyber Security Division / Security / Public safety / Cyberwarfare

HOMELAND SECURITY Team Leaders: Larry Davis, Deputy Executive Director, California Fire and Rescue Training Authority, (

Add to Reading List

Source URL: www.metrochamber.org

Language: English - Date: 2015-04-06 17:21:01
699Child welfare / Crime prevention / Full body scanner / Privacy / Kinect / Full-body CT scan / Human–computer interaction / Computer hardware / Computing

CALL FOR SUBMISSIONS: BODY SCAN ASSET JAM by CODAME ABOUT CODAME: Inspired by the global network of creative coders, designers artists that Bruno Fonzi andJordan Gray knew from around the world, CODAME was founded in 20

Add to Reading List

Source URL: losangelesartresource.files.wordpress.com

Language: English - Date: 2015-05-03 10:42:42
700Public safety / National security / Computer security / Information Systems Security Association / Information security / Security guard / Security / Data security / Crime prevention

FOR IMMEDIATE RELEASE Jim Goyjer: (Email: Jeremiah Grossman, Founder and iCEO of WhiteHat Security. to Speak at ISSA-LA Sixth Annual Information Security Summit on Cybercrime So

Add to Reading List

Source URL: summit.issala.org

Language: English - Date: 2014-05-06 13:43:24
UPDATE