Computer crime

Results: 9938



#Item
771Cryptography / Year of birth missing / Public safety / Computer network security / Computer security / Secure communication / Lance Hoffman / Information security / Gene Spafford / Security / Crime prevention / National security

President Barack Obama The White House 1600 Pennsylvania Avenue NW Washington, DCMay 19, 2015 Dear President Obama,

Add to Reading List

Source URL: static.newamerica.org

Language: English - Date: 2015-05-18 16:52:50
772Cyberwarfare / Crime prevention / National security / Computing / Network security / Malware / Cloud computing / Threat / Information security / Computer network security / Security / Computer security

ESG Lab Spotlight ProtectWise: Shifting Network Security to the Cloud Date: March 2015 Author: Tony Palmer, Senior Lab Analyst and Aviv Kaufmann, Lab Analyst Abstract: This ESG Lab Spotlight examines the ProtectWise Clo

Add to Reading List

Source URL: www.protectwise.com

Language: English - Date: 2015-06-03 12:28:43
773National security / Computer security / Data security / Information security / International Multilateral Partnership Against Cyber Threats / Security guard / Security / Crime prevention / Public safety

Guideline to Determine Information Security Professionals Requirements for the CNII Agencies / Organisations Date: Guideline to Determine Information Security Professionals Requirements

Add to Reading List

Source URL: www.cyberguru.my

Language: English - Date: 2013-07-11 01:43:58
774Computer security / Public safety / Education / Computer network security / Secure communication / Application security / Scholarship / Information security / Security / Crime prevention / National security

Join our team of winners. Abisola Togunde, Eastern Michigan University, SWSIS 2014

Add to Reading List

Source URL: swsis.files.wordpress.com

Language: English - Date: 2014-12-05 12:41:57
775Identifiers / Military technology / United States Department of Commerce / Export Control Classification Number / Public safety / Computer security / Cyber-security regulation / Information security / Source code / Security / Crime prevention / National security

This document is scheduled to be published in the Federal Register onand available online at http://federalregister.gov/a, and on FDsys.gov Billing Code: P

Add to Reading List

Source URL: s3.amazonaws.com

Language: English - Date: 2015-05-19 08:45:21
776Computer security / Data security / Crime prevention / Information security / National security / Emergency management / Risk management / Security / Public safety / Prevention

The Basic Policy of Critical Information Infrastructure Protection (3rd Edition) (Tentative Translation)

Add to Reading List

Source URL: www.nisc.go.jp

Language: English - Date: 2015-05-26 00:08:44
777Security / Malware / Computing / Computer security / Hacker / Crime / Computer crimes / McAfee / Antivirus software

Tech and TaxesFebruary 2015 Issue DELAWARE DEPARTMENT OF TECHNOLOGY & INFORMATION DTI

Add to Reading List

Source URL: dti.delaware.gov

Language: English - Date: 2015-02-25 17:00:08
778Computer security / Crime prevention / National security / Identity assurance / Federated identity management / OpenID / Defense Information Systems Agency / Transglobal Secure Collaboration Project / Security / Identity management / Identity

TSCP_logo_cmyk_Participation_whitetext.eps

Add to Reading List

Source URL: www.tscp.org

Language: English - Date: 2015-05-26 17:06:02
779Crime prevention / Actuarial science / National security / Security guard / Risk / Emergency management / Computer security / Crisis management / Security controls / Security / Public safety / Management

ORION SUPPORT INCORPORATED Security Risk Management Profile “Proactive Security in a Reactive Environment”

Add to Reading List

Source URL: www.osi.com.ph

Language: English - Date: 2014-01-11 04:17:00
780Military technology / Cyberwarfare / Military science / War / Crime / Cyberspace / Internet governance / Internet-related prefixes / International Multilateral Partnership Against Cyber Threats / Computer crimes / Electronic warfare / Hacking

CYFY 2014 16th & 17th October VOLUME II ISSUE 11

Add to Reading List

Source URL: cyfy.org

Language: English - Date: 2014-11-06 00:27:27
UPDATE