Computer crime

Results: 9938



#Item
871Ethics / Crime prevention / United States government secrecy / Computer security / Security clearance / Network security / Internet privacy / Privacy / Security / National security / Computer network security

company information © aql 2007 E&OE PRIVACY & SECURITY When choosing a partner to handle your communications requirements, including sensitive data sent via voice, SMS, fax or email, a prime

Add to Reading List

Source URL: www.aql.com

Language: English - Date: 2007-05-31 07:51:18
872Computer network security / Crime prevention / Computer crimes / International Multilateral Partnership Against Cyber Threats / Access control / Cyber security standards / Critical infrastructure protection / Security / Computer security / National security

Securing The Human for Utilities (STH.Utility): Version 5 Coming Soon! Securing The Human is currently in the process of finalizing STH.Utility Version 5 training. We plan to have Version 5 available this summer but wan

Add to Reading List

Source URL: www.securingthehuman.org

Language: English - Date: 2015-04-17 12:03:23
873Ethics / Crime prevention / National security / Evaluation / Electronic commerce / Integrity / Formal verification / Trusted Computer System Evaluation Criteria / Computer security / Security / Computer network security

ARSPA 2004 Preliminary Version Believing the Integrity of a System (Invited Talk) Simon N. Foley 1,2 Department of Computer Science

Add to Reading List

Source URL: www.cs.ucc.ie

Language: English - Date: 2004-10-08 09:12:34
874Electronic commerce / Ethics / Confidentiality / Journalism sourcing / Secrecy / Social Security number / Computer security / Information security / Security / Crime prevention / National security

Microsoft Word - Security and Confidentiality Checklist for University Offices

Add to Reading List

Source URL: registrar.sc.edu

Language: English - Date: 2009-10-26 16:30:59
875Computer law / Government / Consumer protection / Corporate crime / Federal Trade Commission

Case: Document: Page: 1

Add to Reading List

Source URL: www.epic.org

Language: English - Date: 2015-03-30 09:35:14
876Internet standards / Data security / Crime prevention / National security / Secure communication / Backup / Computer security / File Transfer Protocol / Server / Financial economics / Computing / Internet

Policy Overview CCR Data Ltd is comprised of management, staff, temporary workers, contractors, investors, shareholders, business partners and will herein be referred to as “CCR”. CCR takes very seriously our Data Se

Add to Reading List

Source URL: www.ccr.co.uk

Language: English - Date: 2014-10-27 13:08:04
877Crime prevention / Computer network security / Surveillance / Video / Cyberoam / Application firewall / IP camera / Closed-circuit television / Cross-site scripting / Security / National security / Public safety

PDF Document

Add to Reading List

Source URL: www.cyberoam.com

Language: English - Date: 2013-08-02 04:54:11
878United States Department of Homeland Security / Privacy / Automated Targeting System / Computer law / Crime prevention / Privacy Act / Electronic Privacy Information Center / Passenger name record / Internet privacy / Security / Ethics / National security

COMMENTS OF THE ELECTRONIC PRIVACY INFORMATION CENTER to THE U.S. CUSTOMS and BORDER PROTECTION of the DEPARTMENT OF HOMELAND SECURITY [DHS Docket NosandAutomated Targeting System

Add to Reading List

Source URL: www.epic.org

Language: English - Date: 2012-07-10 11:24:18
879Cyberwarfare / Software testing / Crime prevention / National security / Penetration test / Application security / Vulnerability / Information security / Code audit / Computer security / Computer network security / Security

U.S. Public Sector HP Vulnerability Assessment Services Increase awareness of growing security threats At-A-Glance

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-01-10 00:55:15
880Computer network security / Crime prevention / National security / Password / Information security / Vulnerability / Malware / Attack / Security / Cyberwarfare / Computer security

Yearly Report for Unauthorized Computer Access for 2011 This is the yearly report for the unauthorized computer access from January to December 2011, compiled by Information-technology Promotion Agency, Japan (IPA). 1.

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2013-05-23 07:51:49
UPDATE