Computer crimes

Results: 5188



#Item
781Computer security / Mac OS X / Computer law / Crimes / Password cracking / Password / System software / FileVault / Cryptography / Disk encryption / Cryptographic software

Contact: Nataly Koukoushkina Passware Inc. +1 (650) 472­3716 ext. 101 [removed]

Add to Reading List

Source URL: www.lostpassword.com

Language: English - Date: 2013-12-17 08:44:18
782Computer crimes / Computer network security / Social information processing / Web 2.0 / Malware / Computer security / Phishing / Internet security / Myspace / Computing / World Wide Web / Cybercrime

Web 2 and Web 3, and legal issues for cyberspace Cyberspace Law Notes Oct 2011 Contents

Add to Reading List

Source URL: www.bakercyberlawcentre.org

Language: English - Date: 2011-10-17 21:58:30
783Public administration / Criminology / Identity theft / Phishing / E-Government / Cybercrime and countermeasures / EGovernment in Europe / Computer crimes / Crime / Open government

INFORMATION TECHNOLOGY IN DEVELOPING COUNTRIES A Newsletter of the International Federation for Information Processing Working Group 9.4 and

Add to Reading List

Source URL: www.iimahd.ernet.in

Language: English - Date: 2012-11-29 07:57:26
784Law / Computer security / Criminal law / Isambard Kingdom Brunel / Brunel University / Brunel / Acceptable use policy / Software copyright / Data Protection Act / Computer law / Computer crimes / Computing

Information Strategy Brunel Acceptable Computer Use Policy (BACUP) The purpose of this document is to lay forth the rules for computer use by Brunel

Add to Reading List

Source URL: www.brunel.ac.uk

Language: English - Date: 2014-08-28 05:16:44
785Computer crimes / Spamming / Social engineering / Malware / Email / Phishing / Spam / Email spam / Internet fraud / Cybercrime / Computing / Internet

security_shield_white_trans_4c

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2015-02-17 17:56:52
786Computer crimes / Espionage / Malware / GFI Software / Alex Eckelberry / Sunbelt Software / Social engineering / Email spam / Phishing / Computing / Internet / Spamming

GULF COAST REPRINTED FROM August 19 – august 25, 2011 Business Review Companies • Trends • Entrepreneurs • CEOs

Add to Reading List

Source URL: s3.amazonaws.com

Language: English - Date: 2012-01-17 14:15:03
787National security / Electronic commerce / Crimes / Data security / Password / Phishing / Identity theft / Malware / Internet privacy / Security / Computer security / Crime prevention

Learning from Early Attempts to Measure Information Security Performance Jing Zhang1 , Robin Berthier2 , Will Rhee3 , Michael Bailey1 , Partha Pal4 , Farnam Jahanian1 , and William H. Sanders2 1 Dept. of Computer Scienc

Add to Reading List

Source URL: mdbailey.ece.illinois.edu

Language: English - Date: 2014-08-05 13:28:18
788War / Electronic warfare / Computer crimes / Federal Security Service of the Russian Federation / Government of Russia / United States Cyber Command / FAPSI / Information warfare / Armed Forces of the Russian Federation / Military science / Cyberwarfare / Military

2011 3rd International Conference on Cyber Conflict C. Czosseck, E. Tyugu, T. Wingfield (Eds.) Tallinn, Estonia, 2011 © CCD COE Publications Permission to make digital or hard copies of this publication for internal use

Add to Reading List

Source URL: ccdcoe.org

Language: English - Date: 2011-06-22 03:59:38
789Cyberwarfare / Computer crimes

***DEADLINE EXTENDED*** Call for Presenters SANS Institute is pleased to announce a Call for Presenters for the 2nd annual Cyber Defense Summit, to be held August 11-12, 2015 in Nashville, TN. We are looking for present

Add to Reading List

Source URL: www.sans.org

Language: English - Date: 2015-03-31 16:12:06
790Computer crimes / Spamming / Social engineering / Malware / Email / Phishing / Spam / Email spam / Internet fraud / Cybercrime / Computing / Internet

security_shield_white_trans_4c

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2015-02-17 17:56:52
UPDATE