Computer crime

Results: 9938



#Item
831United States Department of Homeland Security / Privacy / Automated Targeting System / Computer law / Crime prevention / Privacy Act / Electronic Privacy Information Center / Passenger name record / Internet privacy / Security / Ethics / National security

COMMENTS OF THE ELECTRONIC PRIVACY INFORMATION CENTER to THE U.S. CUSTOMS and BORDER PROTECTION of the DEPARTMENT OF HOMELAND SECURITY [DHS Docket NosandAutomated Targeting System

Add to Reading List

Source URL: epic.org

Language: English - Date: 2012-06-22 16:26:13
832Computer network security / Computing / Crime prevention / National security / Email / Password / Transaction authentication number / Fax / Computer security / Technology / Security / Electronic commerce

Data Transmission Procedures OctoberBackground and general principles This document sets out the security issues that BAPAM personnel (staff, clinicians, volunteers)

Add to Reading List

Source URL: www.bapam.org.uk

Language: English - Date: 2014-12-17 07:31:40
833Organized crime / Tort law / Copyright law of the United States / Common law / File sharing / Computer law / Law / Copyright infringement / Crimes

Case 3:15-cvST Document 1 Filed

Add to Reading List

Source URL: torrentfreak.com

Language: English - Date: 2015-02-17 05:44:08
834National security / Database management systems / Public safety / Computing / Computer security / Backup / Audit trail / Information security / Database / Security / Data security / Crime prevention

INTOSAI EDP COMMITTEE INTOSAI EDP Information Systems Auditing

Add to Reading List

Source URL: www.intosaiitaudit.org

Language: English - Date: 2013-01-31 00:02:04
835Computer network security / Data security / Crime prevention / National security / Information security / Vulnerability / Security management / Countermeasure / Security controls / Security / Computer security / Cyberwarfare

Information Security Management Benchmark - The Self-Assessment Tool for Security Measures - In this self-assessment site you will be asked 27 questions about information security measures in part I and 19 questions rega

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2014-10-27 01:00:18
836Electronic commerce / Computer network security / Authorization / Internet privacy / Password / Public safety / Computer security / Data security / Information security / Security / Crime prevention / National security

Faculty Records Security Authorization Form

Add to Reading List

Source URL: www.obia.utah.edu

Language: English - Date: 2015-04-24 17:20:59
837Computer network security / Computer security / Crime prevention / Electronic commerce / National security / Secure communication / Cyberwarfare / Vale Limited / Waterford / Technology / Security / Geography of Ireland

BIC session on Building a long-term INCO strategy in Trustworthy ICT System Security and Cyber-Defence: Requirements For An International Approach To Technological Challenges And Open Issues 6th July 2011 Vrije Universit

Add to Reading List

Source URL: www.syssec-project.eu

Language: English - Date: 2011-07-14 13:46:13
838Computer network security / Computer security / Cryptography standards / Secure communication / CRYPTREC / Cryptography / Information security / Network security / National Security Agency / Security / Crime prevention / National security

Network Security Research Institute Organization of the Network Security Research Institute, NICT NICT

Add to Reading List

Source URL: nict.go.jp

Language: English - Date: 2014-08-13 01:28:32
839Computer security / Crime prevention / National security / Secure communication / Lookout / Public safety / Computer network security / Electronic commerce / Security

COMPANY PROFILE SECURITY FOR THE POST-PC ERA Computing has changed forever. Mobile devices are only the beginning of a

Add to Reading List

Source URL: www.lookout.com

Language: English - Date: 2015-05-14 19:29:26
840Security / Software testing / Crime prevention / National security / Penetration test / Vulnerability / Social engineering / Application security / Attack / Computer security / Computer network security / Cyberwarfare

ACROS Security: ACROS Penetration Test, Frequently Asked Questions ACROS Penetration Test A Friendly “Advanced Persistent Threat” Simulation Frequently Asked Questions 1.

Add to Reading List

Source URL: www.acrossecurity.com

Language: English - Date: 2014-07-21 13:42:09
UPDATE