Computer crime

Results: 9938



#Item
81Prevention / Computing / Security / Crime prevention / Cryptography / Information governance / National security / Password / Internet privacy / Information security / Computer security / Email

Acceptable use of university technology resources. Previous Policy Number: Responsible Division/Office: Information Technology Services Responsible Officer: VP for Finance and Business Operations

Add to Reading List

Source URL: cms.ysu.edu

Language: English - Date: 2016-04-07 08:57:13
82Security / Clery Act / Prevention / Crime prevention / Computer security / Murder of Jeanne Clery

Clara Chapman From: Sent: To: Subject:

Add to Reading List

Source URL: mp84e1c1k7z1e4nhfo24nnf7-wpengine.netdna-ssl.com

Language: English - Date: 2016-06-22 10:34:14
83Security / Prevention / Safety / Crime prevention / Cryptography / Information governance / National security / Computer security / Information security / West Texas A&M University / Security guard / Regulatory compliance

W1 1. Security of Electronic Information Resources Approved March 8, 2005

Add to Reading List

Source URL: www.wtamu.edu

Language: English - Date: 2010-07-20 15:34:17
84Computing / Security / Cyberwarfare / Computer security / Crime prevention / Cryptography / Information governance / National security / Application security / Cross-site request forgery / Software development kit / Vulnerability

#1 GLOBAL PAYMENTS COMPANY OPTIMIZES SECURE DEVELOPMENT PROCESS WITH PREVOTY Trusted payments provider with deeply embedded secure development culture partners with Prevoty for standardized, real-time application protect

Add to Reading List

Source URL: prevoty.com

Language: English - Date: 2016-08-18 22:09:36
85Cybercrime / Security / Crime / Computing / Identity theft / Social engineering / Spamming / Phishing / Computer security / Email

JPCERT/CC Incident Handling Report[January 1, March 31, 2016]

Add to Reading List

Source URL: www.jpcert.or.jp

Language: English - Date: 2016-06-21 01:58:27
86Security / Prevention / Crime prevention / Cryptography / Information governance / National security / Computer security / Password / Authorization

University Of Pennsylvania PennERS Access Request Form PART 1 IDENTIFICATION INFORMATION (To be completed by requestor) Check one: New Change Add Suspend Delete Name: ___________________________________________

Add to Reading List

Source URL: www.finance.upenn.edu

Language: English - Date: 2006-03-14 20:50:33
87Cryptography / Security / Prevention / E-commerce / Crime prevention / Information governance / National security / Computer security / Certificate authority / Public key certificate / Information security / Password

PEXA Subscriber Security Policy Increment 3 PEXA System Security Policy VersionNovember 2014

Add to Reading List

Source URL: www.pexa.com.au

Language: English - Date: 2016-07-20 01:39:45
88Security / Prevention / Safety / National security / Computer security / Crime prevention / Cryptography / Information governance / Information security / Continuous auditing / IT risk

Microsoft Word - Information Resource Activity Review Policy.docx

Add to Reading List

Source URL: it.ouhsc.edu

Language: English - Date: 2014-12-11 11:30:27
89Security engineering / Security / Prevention / Access control / National security / Crime prevention / Airport security / Homeland security / Transportation Security Administration / Computer security

IB Union Calendar No. 505 114TH CONGRESS 2D SESSION

Add to Reading List

Source URL: docs.house.gov

Language: English
90Security / Prevention / Computer security / Crime prevention / Cryptography / Information governance / National security / Information security / FIPS 140-2 / Consultant / Professional certification / Common Criteria

Introducing atsec information security Chief Executive Officer, Director of Strategy and Business Devlopment Who are we?

Add to Reading List

Source URL: www.atsec.com

Language: English - Date: 2015-09-14 08:15:52
UPDATE