Computer crime

Results: 9938



#Item
901National security / Public safety / Computer security / Information security / Backup / Internet privacy / Audit trail / Vulnerability / Cloud computing security / Security / Data security / Crime prevention

Privacy Impact Assessment

Add to Reading List

Source URL: cio.noaa.gov

Language: English - Date: 2013-08-29 09:51:39
902University of Maryland /  Baltimore County / Security / International Multilateral Partnership Against Cyber Threats / Computer security / Crime / Public safety / American Association of State Colleges and Universities / Association of Public and Land-Grant Universities / Middle States Association of Colleges and Schools

  CSEE  News SPRING  2013 ISSUE  04

Add to Reading List

Source URL: www.csee.umbc.edu

Language: English - Date: 2013-02-10 12:53:44
903Computer security / Crime prevention / Electronic commerce / Secure communication / Critical infrastructure protection / National Security Agency / National security / Security / Computer network security

Microsoft Word - ConferenceProgram2012.doc

Add to Reading List

Source URL: www.ifip1110.org

Language: English - Date: 2012-03-28 09:18:39
904Computer security / Crime prevention / National security / Secure communication / Computer emergency response team / Crime / Public safety / National Cyber Security Division / Cyber security and countermeasure / Computer crimes / Security / Computer network security

TACKLING CYBER THREATS THROUGH COLLABORATION Surevine specialise in real-time secure information sharing. We design, build and support secure, scalable collaboration environments for the National, Homeland and Cyber Secu

Add to Reading List

Source URL: www.surevine.com

Language: English
905Criminology / Forensic science / Heuristics / Crime reconstruction / Forensic identification / Apache Subversion / Computer security / File system / Computer forensics / Software / Free software / Security

Forensic Methods for Detecting Insider Turning Behaviors Fred Cohen – CEO – Fred Cohen & Associates Abstract—This paper focuses on the use of forensic methodologies and methods for detecting subversions, an approac

Add to Reading List

Source URL: all.net

Language: English - Date: 2012-04-24 03:26:11
906Information technology management / Data management / Data security / Crime prevention / National security / Backup / Database / Computer security / Encryption / Security / Computer network security / Computing

PDF Document

Add to Reading List

Source URL: www.vsysone.com

Language: English
907Cybercrime / Malware / Attack / Botnet / Computer worm / Vulnerability / Computer crime / Shadowserver / Computer network security / Cyberwarfare / Computer security

European Cyber-Security Research and Innovation by Federico Maggi, Stefano Zanero, and Evangelos Markatos Looking back at the evolution of cyber criminal activities, from the nineties to the present day, we

Add to Reading List

Source URL: www.syssec-project.eu

Language: English - Date: 2015-01-22 10:52:19
908Social issues / Law / Computer law / Cybercrime / Data security / Lawful interception / Convention on Cybercrime / Internet privacy / Organized crime / Ethics / Computer crimes / Crime

EN COMMISSION OF THE EUROPEAN COMMUNITIES Brussels, xxx COMfinal

Add to Reading List

Source URL: www.statewatch.org

Language: English - Date: 2006-07-12 08:07:43
909Computer network security / Security / Computing / Technology / Personal computer / Systems management / Computer security / Operating system / Computer systems / Crime prevention / National security

REPORT # OLA OFFICE OF THE LEGISLATIVE AUDITOR STATE OF MINNESOTA

Add to Reading List

Source URL: www.auditor.leg.state.mn.us

Language: English - Date: 2002-04-26 09:23:08
910Computer network security / Ethics / Crime prevention / National security / Vehicular ad-hoc network / On-board diagnostics / Computer security / Privacy / Vehicular communication systems / Technology / Wireless networking / Security

SEVENTH FRAMEWORK PROGRAMME Information & Communication Technologies Trustworthy ICT NETWORK OF EXCELLENCE A European Network of Excellence in Managing Threats and

Add to Reading List

Source URL: www.syssec-project.eu

Language: English - Date: 2012-09-10 09:52:31
UPDATE