Computer crime

Results: 9938



#Item
851Electronic warfare / Hacking / Military technology / Financial adviser / Finance / International Multilateral Partnership Against Cyber Threats / Crime / Electronics / Technology / Computer crimes / Investment / Cyberwarfare

C. L. “BUTCH” OTTER Governor GAVIN M. GEE

Add to Reading List

Source URL: www.finance.idaho.gov

Language: English - Date: 2015-01-28 09:45:53
852Security / Crime prevention / Data security / Information security / National security / Network security / Routing / Cisco IOS / Data mining / Computing / Network architecture / Computer security

Using Hierarchal Change Mining to Manage Network Security Policy Evolution Gabriel A. Weaver, Nick Foti, Sergey Bratus, Dan Rockmore, Sean W. Smith Deparment of Computer Science Dartmouth College, Hanover, New Hampshire

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2011-04-01 14:57:36
853Crime prevention / National security / Computer network security / Data security / Information security / Vulnerability / Password / Information security audit / Software security assurance / Security / Computer security / Cyberwarfare

What is Information Security? Information Security is simply the process of keeping information secure: protecting its availability, integrity, and privacy. Information has been valuable since the dawn of mankind: e.g.

Add to Reading List

Source URL: demop.com

Language: English - Date: 2007-11-14 09:08:46
854Crime prevention / National security / Hacking / Computer network security / Computer security / Hacker / Information security / Hacker ethic / Computing / Electronics / Security

Microsoft PowerPoint - RecurityLabs_Academia_vs_Hackers_5.ppt

Add to Reading List

Source URL: www.recurity-labs.com

Language: English - Date: 2008-08-18 12:04:47
855Computer crimes / Criminal investigation / 6th arrondissement of Lyon / Interpol / Criminal intelligence / Police / National security / Law enforcement / Law

Interpol’s Role Fighting Cyber Crime Santiago Tellado González Interpol IPSG

Add to Reading List

Source URL: ispa.maz24.com

Language: English - Date: 2012-01-11 03:01:15
856Computer security / Public safety / Computer network security / Data security / Operating system / Information security / Password / IBM System i / Security / Crime prevention / National security

TESTBED AS400 SekChek for OS/400 Security Report System: S65E570C 9 NovemberSekChek IPS

Add to Reading List

Source URL: www.sekchek.com

Language: English - Date: 2013-11-13 07:32:22
857Network flow / Computer network security / Crime prevention / Electronic commerce / National security / Flow network / Vulnerability / Multilevel security / Constraint satisfaction / Computer security / Security / Cyberwarfare

A Soft Constraint-based Approach to the Cascade Vulnerability Problem Stefano Bistarelli Istituto di Informatica e Telematica, CNR, Pisa, Italy

Add to Reading List

Source URL: www.cs.ucc.ie

Language: English - Date: 2006-08-23 05:01:39
858Internet / Spamming / Computing / Multi-agent systems / Phishing / Social engineering / Malware / Internet Society / Internet security / Computer network security / Computer crimes / Crime

Internet Society of Australia A Chapter of the Internet Society ABNC/- Maddocks, Level 7, 140 William Street Melbourne, Victoria 3000 Accounts: P.O. Box 351, Glenorie NSW Australia 2157

Add to Reading List

Source URL: www.internetsociety.org.au

Language: English - Date: 2009-07-26 04:15:45
859Computer network security / National security / Computer security / Burglar alarm / Door / Safety / Access control / Online shopping / Security / Electronic commerce / Crime prevention

Security and Portering Services Personal Safety A guide to staying safe and secure at Cardiff University.

Add to Reading List

Source URL: www.cardiff.ac.uk

Language: English - Date: 2013-04-03 10:35:36
860Public safety / Crime prevention / National security / Information security / Asset / Vulnerability / IT risk management / Information security audit / Security / Data security / Computer security

The Recommended Information Security Approaches.

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2014-10-27 01:00:18
UPDATE