Computer crime

Results: 9938



#Item
841Crime prevention / National security / Information technology audit / Computer-aided audit tools / SekChek Local / Information security / Password / Vulnerability / Email / Security / Computer security / Computing

 Product and Service Overview What is SekChek? SekChek® is a family of automated security analysis and benchmarking tools initially designed for use by audit firms and their clients. It measures computer security ag

Add to Reading List

Source URL: www.sekchek.com

Language: English - Date: 2013-02-01 07:39:47
842Technology / Crime prevention / National security / Hacking / Software testing / Vulnerability / Computer security / Personal computer / System administrator / Computing / Security / Information technology management

Best Practices Review Summary #02-09a O L AA OFFICE OF THE LEGISLATIVE AUDITOR

Add to Reading List

Source URL: www.auditor.leg.state.mn.us

Language: English - Date: 2002-04-25 14:55:24
843Public safety / Computer network security / Law enforcement / Surveillance / F-Secure / Computer security / Internet of Things / Security / Crime prevention / National security

SWITCH ON FREEDOM F-Secure Corporation’s Annual General Meeting CEO’s review 8 April, 2015

Add to Reading List

Source URL: www.f-secure.com

Language: English - Date: 2015-04-09 05:13:50
844National security / Honeynet Project / Computer security / Public safety / Computer network security / Security / Crime prevention

Know Thy Friends Revisiting white-list security where black lists fail Introduction n

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2015-05-28 15:51:23
845Science / White-collar crime / Corporate crime / Organized crime / Computer crime / Criminology / Crime / Law enforcement

Stephen M. Rosoff, Stephen M. Rosoff, professor of criminology at the University of Houston – Clear Lake, passed away after a sudden heart attack on March 27th at the age of 64. He had undergone esophageal su

Add to Reading List

Source URL: www.asc41.com

Language: English - Date: 2010-04-09 10:25:50
846Computing / Internet / Computer network security / Crime prevention / National security / Password / Internet privacy / Privacy / HTTP Secure / Security / Email / Secure communication

CareerStorm Navigator™ Privacy statement This document describes the privacy practices concerning individuals’ use of the CareerStorm NavigatorTM (CS Navigator), a web-based career tool. Security in CareerStorm Navig

Add to Reading List

Source URL: www.careerstorm.com

Language: English - Date: 2014-08-14 04:54:50
847Computer security / Computer network security / Crime prevention / Data security / Information security / Government Accountability Office / Critical infrastructure protection / Threat / Vulnerability / Security / National security / Public safety

T-AIMDComputer Security: Critical Federal Operations and Assets Remain at Risk

Add to Reading List

Source URL: www.gao.gov

Language: English - Date: 2005-09-14 09:14:15
848Law enforcement / Security / Sins / Theft / Police National Computer / Caterpillar Inc. / Computer security / Grand Theft Auto IV / Crime / Crimes / Crime prevention

Security Guidance Document for Agricultural and Construction Plant Publication NoJames Gregory

Add to Reading List

Source URL: www.cesarscheme.org

Language: English - Date: 2012-11-05 08:19:31
849Data / Information / Copyright infringement / Crimes / Organized crime / Tort law / Copyright / The Pirate Bay / Digital Economy Act / Law / Intellectual property law / Computer law

Advocacy Report APRIL 2015 ASTRA ACTIVITY ▪ Digital Television Regulation Consultation Paper – The Department of Communications

Add to Reading List

Source URL: astra.org.au

Language: English - Date: 2015-04-23 20:11:26
850Computing / Aeolus / Cloud computing / Red Hat / Audit trail / Computer security / Event Viewer / Database / Public safety / Security / Crime prevention / National security

Analyzing Audit Trails in the Aeolus Security Platform by Aaron Blankstein S.B., C.S. M.I.T., 2010 S.B., Mathematics M.I.T., 2010

Add to Reading List

Source URL: www.pmg.lcs.mit.edu

Language: English - Date: 2011-06-01 15:48:26
UPDATE