Computer crimes

Results: 5188



#Item
511Computer crimes / National security / Cyberwarfare / International Multilateral Partnership Against Cyber Threats / Risk management / Computer security / Privacy / National Cyber Security Division / IT risk management / Security / Ethics / Public safety

Cybersecurity Framework - Applying Framework to Mobile & BYOD, March 2015

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2015-03-18 16:57:46
512Abuse / Computer crimes / Bullying / Persecution / Parry Aftab / Online predator / Cyberbully / Social networking service / Netsafe / Cybercrime / Cyber-bullying / Ethics

T oday’s teens use technology more than ever. Most have high-speed Internet access, which they use to send instant messages to their friends, create blogs and online videos, keep personal profiles on social networking

Add to Reading List

Source URL: www.ncpc.org

Language: English - Date: 2011-12-08 11:15:24
513United States Department of Homeland Security / Computer crimes / Critical infrastructure protection / Infrastructure / Security engineering / International Multilateral Partnership Against Cyber Threats / Computer security / Cyber-security regulation / Internet kill switch / National security / Security / Public safety

PDF Document

Add to Reading List

Source URL: cmhinfragard.org

Language: English - Date: 2013-10-31 15:29:59
514Computer crimes / Knowledge / Berry Street / Internet safety / E-learning

Microsoft WordBeNetWise - Joint Select Committee submission - V1 FINAL

Add to Reading List

Source URL: www.berrystreet.org.au

Language: English - Date: 2010-12-22 20:12:32
515Computer law / Criminal law of Singapore / Hacking / Traffic law / Criminal Law (Temporary Provisions) Act / Criminal code section 342 / Reckless driving / Law / Crimes / Criminal law

[Brought into force by appointed day notice on 16th JuneAN ACT TO MAKE PROVISIONS SECURING COMPUTER MATERIAL AGAINST UNAUTHORISED ACCESS OR MODIFICATION AND FOR CONNECTED PURPOSES Enacted by the Parliament of the

Add to Reading List

Source URL: www.lexbahamas.com

Language: English - Date: 2009-02-17 19:55:48
516Human development / Sex crimes / Child abuse / Fertility / Computer crimes / Child sexual abuse / Online predator / Social networking service / Adolescent sexuality / Human sexuality / Human behavior / Adolescence

Academic Exchange Quarterly Spring 2014 ISSNVolume 18, Issue 1 To cite, use print source rather than this online version which does not reflect print copy format. Anyone may view, reproduce or store copy of th

Add to Reading List

Source URL: www.rapidintellect.com

Language: English - Date: 2014-11-01 18:29:10
517Cyberwarfare / United States Department of Homeland Security / Security / Computer crimes / Military technology / InfraGard / International Multilateral Partnership Against Cyber Threats / Consensus audit guidelines / National Cyber Security Division / National security / Computer security / Hacking

State of Ohio Cyber Security Strategy

Add to Reading List

Source URL: cmhinfragard.org

Language: English - Date: 2012-11-27 15:56:19
518Cryptography / Security / Computer security / Computer crimes / Password notification email / Password / University of Queensland / Cryptographic software

The University of Queensland School of Social Work and Human Services: Field Education Interactive Database Information for Students

Add to Reading List

Source URL: www.uq.edu.au

Language: English - Date: 2011-08-15 15:42:19
519Public safety / Computer crimes / Cyber-security regulation / International Multilateral Partnership Against Cyber Threats / United States Department of Homeland Security / Computer security / 111th United States Congress / 112th United States Congress / Congressional Research Service / Government / Cyberwarfare / Security

Cybersecurity: Authoritative Reports and Resources

Add to Reading List

Source URL: fpc.state.gov

Language: English - Date: 2015-05-03 01:24:08
520Hacking / Military technology / Security / War / Military science / International Multilateral Partnership Against Cyber Threats / Booz Allen Hamilton / Computer security / Department of Defense Strategy for Operating in Cyberspace / Computer crimes / Cyberwarfare / Electronic warfare

Open Source Threat Monitoring: Mitigating Risk with Innovative Cyber Intelligence Solutions

Add to Reading List

Source URL: mena.boozallen.com

Language: English - Date: 2015-04-24 16:54:43
UPDATE