Cyberspace

Results: 2446



#Item
481Internet privacy / Computing / Hypertext Transfer Protocol / Spyware / Internet advertising / Cyberspace / World Wide Web / Phorm / Rootkits / HTTP cookie / Phishing / HTTPS

The Phorm “Webwise” System Richard Clayton, 4th April 2008 Introduction On Wednesday 26th March 2008 I put on my “hat” as Treasurer of FIPR and accompanied Becky Hogge, Director of the Open Rights Group, to a mee

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2008-04-27 11:29:15
482

Microsoft WordDoD Strategy for Operating in Cyberspace July 2011 FINAL PDUSDP APPROVED_FOR WEB.docx

Add to Reading List

Source URL: www.aipsi.org

Language: English - Date: 2012-06-07 04:17:23
    483Computing / Cyberspace / Social information processing / Economy / Recommender system / Spamming / Reputation system / Email spam / Information filtering system / Simulation

    QLectives – Socially Intelligent Systems for Quality Project noInstrument: Large-scale integrating project (IP) Programme: FP7-ICT Deliverable DSimulations of quality emergence

    Add to Reading List

    Source URL: qlectives.eu

    Language: English - Date: 2010-05-06 06:29:13
    484Spamming / Cyberspace / Computing / Confidence tricks / Identity theft / Microsoft / Email / Social engineering / Phishing / Internet fraud / Outlook.com / Email spam

    Important Information About Internet Fraud “Phishing” is an online scam involving fraudulent email messages asking for confidential information such as passwords or account numbers. These emails, which are disguised

    Add to Reading List

    Source URL: lonestar529.com

    Language: English - Date: 2014-09-03 16:06:44
    485

    The Return of the State in Cyberspace: The Hybrid Regulation of Global Data Protection Ralf Bendrath

    Add to Reading List

    Source URL: bendrath.userpage.fu-berlin.de

    Language: English - Date: 2007-05-01 19:53:00
      486

      MAPPING THE UNFATHOMABLE FRONTIERS OF INDIGENOUS CYBERSPACE: A Survey of the Expanding/Contracting Boundaries of Going Native on the Net Kyra Landzelius

      Add to Reading List

      Source URL: publications.uu.se

      Language: English - Date: 2008-12-09 08:55:50
        487Virtual reality / Computing / Technology / Digital media / Cyberspace / Computer network / Big data / Information society / Cloud computing / Virtual world / Internet / Internet of things

        From Information Society to CPS/IoT Society IT & Electronics Supporting the Future

        Add to Reading List

        Source URL: www.jeita.or.jp

        Language: English - Date: 2015-09-07 04:27:00
        488Cyberwarfare / Internet censorship in China / Computing / Denial-of-service attacks / Internet activism / Human rights in China / Internet in China / Cyberspace / GreatFire / Baidu / Denial-of-service attack / GFW

        An Analysis of China’s “Great Cannon” Bill Marczak Nicholas Weaver Jakub Dalek Roya Ensafi UC Berkeley, Citizen Lab

        Add to Reading List

        Source URL: www.usenix.org

        Language: English
        489

        Formation in cyberspace: concepts, models and methodologies in the Latino/Hispanic context Dra. Omayra Caraballo Pagán May 31, 2013 E-Formation 2013

        Add to Reading List

        Source URL: ponce.inter.edu

        Language: English - Date: 2013-05-31 10:39:14
          490Microsoft / Computing / Webmail / Cyberspace / Email / Letter / Outlook.com / Mail / Anti-spam techniques

          PorLolio Help  for  Le*er  Writers   Help  for  Members  or  Fileholders  

          Add to Reading List

          Source URL: apo.ucsc.edu

          Language: English - Date: 2014-08-30 01:16:51
          UPDATE