Computer crimes

Results: 5188



#Item
21Hacking / Military technology / Crime / War / Criminology / International Multilateral Partnership Against Cyber Threats / European Network and Information Security Agency / Cyber-security regulation / Department of Defense Cyber Crime Center / Computer crimes / Cyberwarfare / Electronic warfare

Microsoft Wordcyber-security.docx

Add to Reading List

Source URL: www.statewatch.org

Language: English - Date: 2012-08-06 10:59:27
22Computing / Phishing / Social engineering / Email / Computer-mediated communication / Verb / Gmail / Spamming / Internet / Computer crimes

Poster: Syntactic Element Similarity for Phishing Detection Gilchan Park Julia M. Taylor

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2015-05-11 16:42:27
23Intellectual property law / Phishing / Social engineering / Spamming / Threat / Malware / Trademark / Cybercrime / Computer crimes / Brand management

Brand Protection Cyveillance Brand Protection™ looks beyond the buzz to find trademark and copyright abuses, traffic diversion, and other misuse of your brand online. Many times these misuses are subtle and undetectabl

Add to Reading List

Source URL: info.cyveillance.com

Language: English - Date: 2015-07-18 17:24:43
24Institute for Security and Development Policy / Cyberspace / Crime / Computer security / Sino-American relations / Cyberpunk / Department of Defense Strategy for Operating in Cyberspace / U.S. Department of Defense Strategy for Operating in Cyberspace / Computer crimes / Security / National security

Policy Brief No. 156 June 19, 2014 Tensions in Cyberspace: Toward a Code of Conduct

Add to Reading List

Source URL: www.isdp.eu

Language: English - Date: 2014-06-19 09:11:43
25Law enforcement / Phishing / Malware / Computer security / Department of Defense Cyber Crime Center / Internet safety / Computer crimes / Crime / Security

Cyber Safety Awareness Training Cyber Safety Awareness Training protects your organization from the latest Internet threats and reduces the high costs associated with incident remediation by providing computer-based trai

Add to Reading List

Source URL: info.cyveillance.com

Language: English - Date: 2015-07-18 15:59:45
26Ethics / Crime / Security / Hacking / Military technology / Legal aspects of computing / Cyberwarfare / International Multilateral Partnership Against Cyber Threats / Cyberethics / Computer crimes / Computer law / Cyberspace

ECONOMIC COMMISSION FOR AFRICA AFRICAN UNION COMMISSION

Add to Reading List

Source URL: www.cio.co.ke

Language: English - Date: 2015-07-19 09:52:38
27Graphic design / Defense Intelligence Agency / Social networking service / International Multilateral Partnership Against Cyber Threats / National security / Technology / Structure / Department of Defense Cyber Crime Center / Critical infrastructure protection / Computer crimes / Brand / Communication design

Brand Intelligence Cyveillance Brand IntelligenceTM reports connect your team to the pulse of your business’ brands, products, and services by monitoring for inflammatory language, key fan opinions, and overall brand s

Add to Reading List

Source URL: info.cyveillance.com

Language: English - Date: 2015-07-18 15:14:39
28Computing / Computer crimes / Computer network security / Multi-agent systems / Malware / Botnet / Phishing / Anti-spam techniques / Social engineering / Spamming / Cybercrime / Internet

PDF Document

Add to Reading List

Source URL: londonactionplan.org

Language: English - Date: 2015-06-16 12:09:17
29Threat / Computer crimes / Electronic warfare / Hacking / Computing / Department of Defense Cyber Crime Center / Computer security / Cyberwarfare / Computer network security

Information Protection Protecting your customer and business data in today’s online environment requires an intelligence-led approach that focuses on identifying risks early for effective prevention and mitigation. Cyv

Add to Reading List

Source URL: info.cyveillance.com

Language: English - Date: 2015-07-18 12:57:19
30Cyberwarfare / Crime prevention / National security / Computer crimes / DShield / Phishing / Password / Malware / Vulnerability / Cybercrime / Computer security / Computer network security

  Reconceptualizing the Role of Security User L. Jean Camp Abstract: The Internet is not the only critical infrastructure that relies on the participation of

Add to Reading List

Source URL: www.ljean.com

Language: English - Date: 2014-06-07 19:18:24
UPDATE