Computer crime

Results: 9938



#Item
981Computer programming / Barbara Jane Liskov / Crime prevention / National security / Cross-platform software / Computer / File system / C / Computing / Software engineering / Women in technology

A File System Design for the Aeolus Security Platform by Francis Peter McKee S.B., C.S. M.I.T., 2011 Submitted to the Department of Electrical Engineering and Computer Science

Add to Reading List

Source URL: www.pmg.lcs.mit.edu

Language: English - Date: 2012-03-20 16:20:12
982Cyberwarfare / Computer network security / Crime prevention / National security / Security Content Automation Protocol / Vulnerability / Information security / Security controls / ISO/IEC 27001 / Computer security / Security / Data security

Microsoft Word - Compliance -1 1

Add to Reading List

Source URL: www.secpod.com

Language: English - Date: 2015-03-27 09:58:01
983Electronic warfare / Hacking / Military technology / Identity theft / Organized crime / Industrial espionage / BAE Systems / Department of Defense Cyber Crime Center / Crime / Cyberwarfare / Computer crimes

Detica_Cybercrime_Summary_AW.indd

Add to Reading List

Source URL: www.iwar.org.uk

Language: English - Date: 2011-02-17 16:09:11
984Spamming / Deception / Decoy / Crime / Behavior / Computer network security / Honeypot

The Use of Deception Techniques: Honeypots and Decoys Fred Cohen 1. Backgroun d and History 1.1 Deception Funda me n t als

Add to Reading List

Source URL: all.net

Language: English - Date: 2008-02-12 17:08:23
985Grid computing / Public safety / Electric power transmission systems / Computing / Information security / Open Grid Services Architecture / Electrical grid / Computer security / Smart grid policy in the United States / Security / Crime prevention / National security

ims ISSN No. : Journal of Information Technology a bi-annual Journal

Add to Reading List

Source URL: www.iuu.ac

Language: English - Date: 2013-07-02 16:47:14
986Crime prevention / National security / Computer network security / Public safety / Decision making / Backup / Computer security / Security / Decision theory / Data security

Information at all.nethttp://all.net/

Add to Reading List

Source URL: all.net

Language: English - Date: 2013-11-02 01:04:32
987Surveillance / Privacy / Crime prevention / Face recognition / Automatic identification and data capture / Webcam / Face detection / Closed-circuit television / Facial recognition system / Computer vision / Security / National security

Microsoft Word - aaai-video-working.doc

Add to Reading List

Source URL: dataprivacylab.org

Language: English - Date: 2013-10-01 06:58:39
988Crime prevention / National security / Computer security / Data security / Computer virus / Password / Access control / Backup / Operating system / Security / Computer network security / Public safety

A Short Course on Information Protection in Personal Computers

Add to Reading List

Source URL: all.net

Language: English
989Computer network security / Politics / Computer security / Electronic commerce / Secure communication / BCH code / Policy / Public safety / Security / Crime prevention / National security

BCH Security Category: Physical Resource Management Policy and Procedure POLICY Ballarat Community Health (BCH) will ensure that adequate security arrangements are provided and

Add to Reading List

Source URL: www.bchc.org.au

Language: English
990Computer security / Crime prevention / Data security / National security / Information security management system / Managed security service / Security management / Information security / Security operations center / Security / Cyberwarfare / Computer network security

283 Hitachi Review Vol), No. 5 Featured Articles

Add to Reading List

Source URL: www.hitachi.com

Language: English - Date: 2015-03-31 01:09:08
UPDATE