Computer crimes

Results: 5188



#Item
371Computer crime / Convention on Cybercrime / Computer fraud / Cyberterrorism / Hacker / Organized crime / Cyberstalking / Computer security / International Cybercrime / Cybercrime / Computer crimes / Crime

A Critical Look at the Regulation of Cybercrime ___________________________________________

Add to Reading List

Source URL: www.crime-research.org

Language: English - Date: 2005-09-13 11:14:47
372Computer crimes / Crimes / Social engineering / Spam / Identity theft / Phishing / Credit card fraud / Email spam / Organized crime / Cybercrime / Spamming / Internet

Measuring the Cost of Cybercrime Ross Anderson 1 Chris Barton 2 Rainer B¨ohme 3 Richard Clayton 4 Michel J.G. van Eeten 5

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2012-06-08 17:16:25
373Social engineering / Antivirus software / Computer crimes / Password / Two-factor authentication / Zeus / LastPass Password Manager / Man-in-the-browser / Phishing / Malware / Software / System software

THE BANKING MALWARE MESS A Ciphers By Ritter Page Terry Ritter A = ritter B = ciphersby

Add to Reading List

Source URL: www.ciphersbyritter.com

Language: English - Date: 2010-11-22 14:36:21
374Computer network security / Malware / Social engineering / Computer crimes / Spyware / Phishing / Password / Computer virus / Trojan horse / Espionage / Cybercrime / Security

The NoAH project http://www.fp6-noah.org NoAH: A Network of Affined Honeypots: Current State and Collaboration Opportunities

Add to Reading List

Source URL: www.fp6-noah.org

Language: English - Date: 2007-12-14 13:40:05
375Access control / Email / Login / Federated identity / Computer crimes / Computing / Password / Security

researchmap User Manual researchmap User Manual April 1, 2014 Japan Science and Technology Agency

Add to Reading List

Source URL: researchmap.jp

Language: English - Date: 2014-06-04 02:46:01
376Electronic warfare / Computer crimes / Security / Hacking / Cyberterrorism / Military technology / Electromagnetic pulse / Critical infrastructure protection / Computer security / Cybercrime / Cyberwarfare / National security

Computer Attack and Cyberterrorism: Vulnerabilities and Policy Issues for Congress

Add to Reading List

Source URL: www.iwar.org.uk

Language: English - Date: 2008-11-19 06:31:43
377Cyberwarfare / Crime / Computer law / Electronics / Computer Misuse Act / Legal aspects of computing / Hacker / Cyberterrorism / Computer security / Computer crimes / Computing / Hacking

black hat briefings Cyber-crime Assoc Professor Harry SK Tan Director, CAPTEL

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:21
378United States Department of Homeland Security / National security / Cyberwarfare / International Multilateral Partnership Against Cyber Threats / Computer security / National Cyber Security Division / U.S. Department of Defense Strategy for Operating in Cyberspace / Computer crimes / Security / Public safety

HOMELAND SECURITY ADVISORY COUNCIL CYBERSKILLS TASK FORCE REPORT FALL 2012 PREFACE

Add to Reading List

Source URL: cdn.govexec.com

Language: English - Date: 2012-10-11 08:35:07
379Law / Computer crimes / Information technology / Internet / Computer security / Acceptable use policy / Information and communications technology / Internet privacy / Data Protection Act / Computing / Computer law / Technology

London Metropolitan University ICT Acceptable Usage Policy March 2009 Version 2

Add to Reading List

Source URL: metranet.londonmet.ac.uk

Language: English - Date: 2013-07-01 09:31:56
380International Multilateral Partnership Against Cyber Threats / International Telecommunication Union / Computer security / United States Department of Homeland Security / Government / National Cyber Security Division / Computer crimes / Security / Public safety

C:rs7108Dataalp19es

Add to Reading List

Source URL: www.gpo.gov

Language: English - Date: 2015-01-16 11:36:57
UPDATE