Computer crime

Results: 9938



#Item
731Computer security / Crime prevention / National security / Database security / Vulnerability / Application security / Network security / Cisco Career Certifications / Information security audit / Security / Cyberwarfare / Computer network security

Senior Security Engineer Location: Burlington, VT or Denver, CO or Boston, MA or Washington DC Term: Permanent Travel Required: Yes – up to 50% Telecommute: Occasionally

Add to Reading List

Source URL: www.nuharborsecurity.com

Language: English - Date: 2015-05-04 21:34:25
732Ethics / Technology / Electronic commerce / Law / Privacy / Internet privacy / Framework Programmes for Research and Technological Development / Computer security / Information security / Security / Crime prevention / National security

Information and Technology Visioning Sessions Raw Data from Spring 2012 Twenty groups totaling more than seven hundred individuals gathered for focus group sessions over the Spring 2012 semester. Represented in these gro

Add to Reading List

Source URL: oc.illinois.edu

Language: English - Date: 2012-10-15 14:24:01
733National security / Electronic commerce / Cryptographic protocols / Password / Computer security / HTTP Secure / Two-factor authentication / Single sign-on / Password manager / Security / Secure communication / Crime prevention

Security Overview Who owns the data I put on my Dozuki site? You do! Dozuki has no claim of ownership on your site’s content. Will you (Dozuki) access my private content? Not unless you specifically ask us to, or if we

Add to Reading List

Source URL: f.cl.ly

Language: English - Date: 2014-03-04 19:48:33
734Crime prevention / National security / Computer network security / Electronic commerce / Password / Phishing / Public-key cryptography / Kerberos / Cryptographic hash function / Cryptography / Security / Computer security

Contents Preface to the Second Edition xxv

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2011-12-05 05:58:34
735National security / Privileged password management / Principle of least privilege / Malware / Password / Information security / Privilege / Identity theft / Superuser / Security / Computer security / Crime prevention

Microsoft Word - WP_PrivilegeGoneWild_FINAL(1).docx

Add to Reading List

Source URL: www.beyondtrust.com

Language: English - Date: 2015-03-24 19:01:36
736National security / Public safety / National Security Agency / Multilevel security / Trusted computing base / Trusted Computer System Evaluation Criteria / Ring / Information security / Database security / Computer security / Security / Crime prevention

To Appear, IFIP World Congress ‘94 Link 3, Issue 5: How Much is Safety Worth? Sess. L-29.2, 1 Sept 94 Hidden safety requirements in large-scale systems Carl E. Landwehr

Add to Reading List

Source URL: www.landwehr.org

Language: English - Date: 2014-08-18 19:31:33
737Ethics / Cyber-bullying / Behavior / Crime / Harassment / Cyberstalking / Parry Aftab / Sexual harassment / Cyberbully / Abuse / Computer crimes / Bullying

www.stopcyberbullying.org ______________________________________________________________________________ What is cyberbullying, exactly? "Cyberbullying" is when a child, preteen or teen is tormented, threatened, harassed

Add to Reading List

Source URL: www.stopcyberbullying.org

Language: English - Date: 2005-04-16 10:28:14
738Computer network security / Data synchronization / Crime prevention / National security / Computer security / Data loss prevention software / Dropbox / .mobi / Google / Cloud computing / Computing / Software

Top 3 data security threats Roman Foeckl, CEO and founder of CoSoSys, offers his insights on how to mitigate threats through a sound data security plan Sometimes we feel like we keep repeating ourselves and then we reali

Add to Reading List

Source URL: www.endpointprotector.com

Language: English - Date: 2015-05-25 06:33:07
739Cyberwarfare / Computer security / Computer network security / Electronic commerce / Stuxnet / Vulnerability / Internet privacy / Security engineering / Software engineering / Security / Crime prevention / National security

From the Editors Sailing Away! F

Add to Reading List

Source URL: www.landwehr.org

Language: English - Date: 2014-08-18 19:01:47
740Secure communication / Cyberwarfare / Crime / Computer security / National security / Identity theft / Data breach / Data security / Laptop theft / Security / Computer network security / Theft

Notification to Inspira Patients of Potential Data Breach After Computer Theft Inspira Health Network notified 1,411 patients in February, 2014 of a potential data breach. Two computers were stolen from the radiology dep

Add to Reading List

Source URL: www.inspirahealthnetwork.org

Language: English - Date: 2014-03-26 10:37:48
UPDATE