Crime prevention

Results: 24851



#Item
151Prevention / Human rights / Safety / Security / Crime prevention / Law enforcement / National security / Internet privacy / Privacy / Medical privacy / Mass surveillance / Surveillance

PDF Document

Add to Reading List

Source URL: www.eblocker.com

Language: English - Date: 2016-01-08 11:15:28
152Computing / Security / Policy / Crime prevention / Cryptography / Information governance / National security / Internet privacy / Privacy policy / Privacy / Computer security / Cloud computing

Embracing Policy Engineering Kathi Fisler Shriram Krishnamurthi Daniel J. Dougherty

Add to Reading List

Source URL: web.cs.wpi.edu

Language: English - Date: 2010-10-21 09:43:59
153Security / National security / Prevention / Crime prevention / Cryptography / Information governance / Cyberwarfare / Computer security / Internal control / Information security / Cyber-security regulation

JH2015/005 2nd September 2015 JHC Cyber Risk Assessment Guidance Background checks: 1

Add to Reading List

Source URL: www.comitemaritime.org

Language: English - Date: 2015-09-14 04:38:33
154Prevention / Safety / Security / Public safety / Law enforcement / National security / Crime prevention / Surveillance / Closed-circuit television / Counter-terrorism

Mass Transportation What should I consider suspicious? Suspicious Appearance What should I do? Be part of the solution.

Add to Reading List

Source URL: www.homelandsecurity.ohio.gov

Language: English - Date: 2013-01-30 08:13:50
155Security / Computer security / Prevention / Crime prevention / Cryptography / Information governance / National security / CompTIA / Information technology specialist / Information security / EMASS / Information assurance

IT Linux Network Security Specialist - DL1203 Technology Service Corporation (TSC), an Engineering Services Provider with concentration providing Radar & Sensor technology, Algorithm & Software development, Modeling & Si

Add to Reading List

Source URL: www.tsc.com

Language: English - Date: 2015-10-14 13:33:57
156Security / Computer security / Cyberwarfare / Computer network security / Crime prevention / Cryptography / National security / Government procurement in the United States / Critical infrastructure protection / NIST Cybersecurity Framework

DEFENSE CYBERSECURITY REQUIREMENTS: WHAT SMALL BUSINESSES NEED TO KNOW Office of Small Business Programs, U.S. Department of Defense 3600 Defense Pentagon, Room 3E185, Washington, DCWhy is cybersecurity impor

Add to Reading List

Source URL: www.acq.osd.mil

Language: English
157Security / Prevention / Safety / National security / Crime prevention / Cryptography / Information governance / Computer security / Information security / Outline of computer security / Cyber security standards

Industrial & Research Challenges arising from User Requirements in Trustworthy ICT Building a European Security Environment among regions Prof. Norbert Pohlmann

Add to Reading List

Source URL: norbert-pohlmann.com

Language: English - Date: 2015-12-06 08:01:09
158Behavior / Crime / Deviance sociology) / Misconduct / Violence / Criminology / Ethics / Social conflict / International Physicians for the Prevention of Nuclear War / Global health / World Health Organization / Gun violence

__________________________________________ Prescriptions for Prevention: A Public Health, Human-Centered Approach to Reducing Firearm Violence, Promoting Health and Development Policy Paper to the United Nations Programm

Add to Reading List

Source URL: ippnw.org

Language: English - Date: 2015-07-07 15:23:23
159Security / Prevention / Computer security / Safety / Computer network security / Crime prevention / National security / Insider threat / Threat / Risk management / Information security audit / Information security awareness

Opinion Managing Insider Threats Is a Key Component to Cyber Security June 13, 2016 Most directors recognize the growing importance of cyber security,

Add to Reading List

Source URL: www.raytheon.com

Language: English - Date: 2016-06-13 10:31:11
160Computing / Security / Cryptography / Crime prevention / Information governance / National security / Disk encryption / Computer security / Encryption / Android / Information security / USB flash drive

Desktop, Laptop, and Portable Device DRAFT - Data Classification System Requirements September 12, 2013 Purpose of this document This document outlines and provides an explanation for some of the most important and possi

Add to Reading List

Source URL: facultysenate.mst.edu

Language: English - Date: 2014-01-22 04:21:56
UPDATE