Computer crime

Results: 9938



#Item
881Crime prevention / National security / Electronic commerce / Secure communication / Computer security / Information security / Password / Transport Layer Security / Smart card / Security / Cryptography / Cryptographic protocols

Hitachi Review Vol), NoFeatured Articles

Add to Reading List

Source URL: www.hitachi.com

Language: English - Date: 2015-03-31 01:09:08
882National security / Security guard / Surveillance / Computer security / Crime prevention / Security / Public safety

ENTERPRISE SERVICES to help keep rates down. Security officers on patrol also scan a barcode on a PDA at each stop, which tells them if there is anything in particular that they should check in that room. Such as, if a p

Add to Reading List

Source URL: www.digitalallyinc.com

Language: English - Date: 2015-03-23 10:12:43
883Crime prevention / National security / Software quality / Computer network security / Threat model / Software security assurance / Vulnerability / Software development process / Software assurance / Security / Computer security / Cyberwarfare

Fundamental Practices for Secure Software Development 2ND EDITION A Guide to the Most Effective Secure Development Practices in Use Today

Add to Reading List

Source URL: www.safecode.org

Language: English - Date: 2014-09-29 14:24:44
884Security / Hacking / Crime prevention / Malware / Threat / Targeted threat / Vulnerability / International Cybercrime / Cyberwarfare / Computer network security / Computer security

SEVENTH FRAMEWORK PROGRAMME Information & Communication Technologies Secure, dependable and trusted Infrastructures COORDINATION ACTION Grant Agreement no

Add to Reading List

Source URL: www.ict-forward.eu

Language: English - Date: 2010-03-09 14:07:06
885Data security / Computer network security / Crime prevention / National security / Information security management system / Information security / Threat / Vulnerability / FIPS 140-2 / Security / Computer security / Cyberwarfare

The ISM-Benchmark and its effects on secure business environment (ISM-Benchmark = Information Security Management Benchmark) January 09, 2009

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2013-06-13 01:10:15
886Law / Penal Code / Crime / Criminal law / Hacking / Canadian criminal law / Criminal code section 342 / LGBT rights in Tanzania / Criminal law of Singapore / Computer crimes / Computer law

ISSN035X THE UNITED REPUBLIC OF TANZANIA BILL SUPPLEMENT 20th February, 2015

Add to Reading List

Source URL: www.parliament.go.tz

Language: English - Date: 2015-04-27 06:38:38
887Management / Public safety / Crime prevention / Risk management / Federal Information Security Management Act / Information security / Chief information security officer / Health Insurance Portability and Accountability Act / Security risk / Computer security / Security / Data security

Privacy Awareness Training - Managers

Add to Reading List

Source URL: www.hhs.gov

Language: English - Date: 2015-05-31 00:33:59
888Crime / Data / Copyright infringement of software / Copyright / Anti-piracy / CNET / Business Software Alliance / Motion Picture Association of America / Law / Copyright law / Computer law

GrayZone - February 1997 Digest

Add to Reading List

Source URL: grayzone.com

Language: English - Date: 2015-01-04 14:53:09
889Government / Data security / Information Security Oversight Office / National Archives and Records Administration / Crime prevention / Computer security / Declassification / National Industrial Security Program / Classified information / National security / Security / United States government secrecy

Report on Cost Estimates for Security Classification Activities for 2004

Add to Reading List

Source URL: fas.org

Language: English - Date: 2014-05-06 14:40:32
890Cyberwarfare / National security / Computer network security / Software testing / Application security / Information security / Software security assurance / Penetration test / E-learning / Security / Computer security / Crime prevention

2012-CBTEducation-Appsecure

Add to Reading List

Source URL: www.appsecure.com

Language: English - Date: 2012-03-07 22:36:34
UPDATE