Computer crime

Results: 9938



#Item
921Security engineering / United States Department of Homeland Security / Crime prevention / Critical infrastructure protection / Infrastructure / Computer security / Situation awareness / Risk / National security / Security / Public safety

Information at all.nethttp://all.net/

Add to Reading List

Source URL: all.net

Language: English - Date: 2013-07-10 14:09:31
922Technology / Online chat / Crime prevention / Data security / Information security / National security / Instant messaging / Records management / EGovernment in Europe / Computing / Computer-mediated communication / Email

Policies & Procedures Information and Communication Technology Services Curtin University of Technology Sarawak Campus POLICIES AND PROCEDURES Version 1.0

Add to Reading List

Source URL: www.curtin.edu.my

Language: English - Date: 2008-06-09 22:57:23
923Software testing / Computer network security / Crime prevention / National security / Application security / Threat model / Penetration test / Information security / Vulnerability / Computer security / Security / Cyberwarfare

Cigital SDL Case Study Outline – Insurance Vertical Cigital, IncRidgetop Circle Suite 400 Dulles, VA

Add to Reading List

Source URL: www.cigital.com

Language: English - Date: 2013-11-26 20:44:24
924Crime / Crime prevention / National security / Computing / Computer security / Electronic commerce / Network security / Phishing / Mail / Computer crimes / Computer network security / Security

Don’t Invite Strangers Into Your Home How to Protect Your Think Tank’s Information Technology

Add to Reading List

Source URL: www.insideronline.org

Language: English - Date: 2013-01-28 11:49:45
925Cyberwarfare / Computer security / Privacy / Crime prevention / National security / Malware / Advanced persistent threat / Threat / Surveillance / Security / Computer network security / Espionage

European Parliament Hearing Human rights and technologies: the impact of digital surveillance and intrusion systems on human rights in third countries January 21, 2015 Prepared by Sarah A. McKune

Add to Reading List

Source URL: www.europarl.europa.eu

Language: English - Date: 2015-02-05 10:24:29
926Crime prevention / Data security / Information security / National security / Computer file / Portable Document Format / Filesystem permissions / File system / Email client / Computing / Security / Computer security

AirZip® FileSECURE™ White Paper Communicate with Confidence™ Introduction Keeping personal or sensitive information confidential is an essential aspect when doing business today. The disclosure of confidential infor

Add to Reading List

Source URL: www.airzip.com

Language: English - Date: 2009-02-03 18:32:31
927Cyberwarfare / Software testing / Hacking / Crime prevention / National security / Exploit / Vulnerability / Malware / Threat / Computer security / Computer network security / Computing

OPINION Why Offensive Security Needs Engineering Textbooks Or, How to Avoid a Replay of “Crypto Wars” in Security Research

Add to Reading List

Source URL: www.syssec-project.eu

Language: English - Date: 2014-09-11 05:58:33
928National security / Ethics / Cryptography / Trusted Computing Group / Trusted Computing / Privacy / Intel / European Network and Information Security Agency / Information security / Security / Computer security / Crime prevention

Claire Vishik Trust & Security Technology & Policy Manager Intel Corporation Dr. Claire Vishik works at Intel Corporation focuses on hardware security, trusted computing, privacy enhancing technologies, some aspects of e

Add to Reading List

Source URL: www.trustindigitallife.eu

Language: English - Date: 2015-03-19 08:36:15
929Military technology / Cyberwarfare / Military science / War / Internet-related prefixes / Cyberspace / Crime / Legal aspects of computing / Cyberwarfare in the United States / Computer crimes / Electronic warfare / Hacking

A Call to Cyber Norms Discussions at the Harvard-MIT–University of Toronto Cyber Norms Workshops, 2O11 and 2O12 Belfer Center for Science and International Affairs Kennedy School of Government

Add to Reading List

Source URL: www.americanbar.org

Language: English - Date: 2015-04-15 13:36:38
930Data security / Information security / National security / Public safety / Prevention / Security / Computer security / Crime prevention

Naval Postgraduate School Department of Computer Science Graduation Checklist for MSCS Degree 6203P Subspecialty Code (Revised: Fall AY14) Name/Rank/Service: ____________________________________________________________

Add to Reading List

Source URL: www.nps.edu

Language: English - Date: 2013-11-12 15:13:26
UPDATE