Cybercrime

Results: 3090



#Item
211Cybercrime / Security / Misconduct / Cyberwarfare / Computer security / Phishing / Internet security / Supply chain attack / Cyber-Insurance

Information Technology Services & Health Systems IT Cyber Security – Case Studies • • •

Add to Reading List

Source URL: senate.ucsd.edu

Language: English - Date: 2016-05-26 13:04:30
212Misconduct / Cybercrime / Security / Crime / Crime prevention / Computer security / Harassment / Computer forensics / High Technology Crime Investigation Association / Art Bowker

I’ve been a member of HTCIA since the early 90’s. I have greatly benefitted from this organization and I’d like to do all that I can to give back and see HTCIA thrive. I strongly believe we are all a team and need

Add to Reading List

Source URL: www.htcia.org

Language: English - Date: 2015-08-25 14:21:33
213Computer hardware / Computing / Cybercrime / Computer storage devices / USB flash drive / Non-volatile memory / USB / Computer virus / AutoRun / Drive letter assignment / Social engineering / Personal computer

1 Users Really Do Plug in USB Drives They Find Matthew Tischer† Zakir Durumeric‡† Sam Foster† Sunny Duan† Alec Mori† Elie Bursztein3 Michael Bailey† †

Add to Reading List

Source URL: mdbailey.ece.illinois.edu

Language: English - Date: 2016-06-03 14:20:06
214Computing / World Wide Web / Security / Cybercrime / Employment compensation / Expense / Payroll / Form / Computer security / Hypertext Transfer Protocol

Microsoft Word - PS Security Access instructions Dec 2013

Add to Reading List

Source URL: hrs.missouri.edu

Language: English - Date: 2016-01-04 01:30:44
215Security / Cybercrime / Cyberwarfare / Military science / Computing / Hacking / Military technology / National security / International Multilateral Partnership Against Cyber Threats / Computer security / Cyberterrorism / Cyber-attack

UNIDIR Cyber Stability Seminar 2015: Regime Coherence UNIDIR RESOURCES

Add to Reading List

Source URL: www.unidir.org

Language: English - Date: 2015-09-18 04:25:35
216Security / Prevention / Biometrics / Cybercrime / E-commerce / Secure communication / Speaker recognition / Speech processing / Authentication / Password / Computer security / Transmission Control Protocol

Voice Authentication Using Short Phrases: Examining Accuracy, Security and Privacy Issues R.C. Johnson, Terrance E. Boult University of Colorado, Colorado Springs Colorado Springs, CO, USA rjohnso9 | tboult

Add to Reading List

Source URL: vast.uccs.edu

Language: English - Date: 2013-12-13 11:59:39
217Misconduct / Behavior / Human behavior / Abuse / Crimes / Harassment / Cybercrime / Stalking / Cyberstalking / Restraining order / Stalker / Domestic violence

STALKING AND HARASSMENT ADVICE LEAFLET facilitate the behaviour), threats, property damage and violence.

Add to Reading List

Source URL: paladinservice.co.uk

Language: English - Date: 2015-03-05 06:21:29
218Computing / Security / Cyberwarfare / Computer security / Cybercrime / National security / Emerging technologies / Computer network security / Cloud computing / Smart grid / Cyber security standards / Cyber-physical system

Applied Cyber Security  ........................................................................................................................................... Overview  The    transformation    of    physi

Add to Reading List

Source URL: www.gian.iitkgp.ac.in

Language: English - Date: 2016-05-31 02:57:24
219Security / Computing / Privacy / Cybercrime / Internet privacy / Privacy policy / Medical privacy / Personally identifiable information / Terms of service / Computer security

TERMS OF USE .............................................................................................................................................. 1 PRIVACY ......................................................

Add to Reading List

Source URL: www.mcleboard.org

Language: English - Date: 2013-04-02 01:08:47
220Security / Prevention / Safety / National security / Computer security / Cybercrime / Cyberwarfare / Cryptography / Denial-of-service attack / Information security

Corero Network Security plc Corero Network Security plc 169 High Street Rickmansworth Hertfordshire WD3 1AY

Add to Reading List

Source URL: www.corero.com

Language: English - Date: 2012-04-10 09:15:59
UPDATE