Cyberspace

Results: 2446



#Item
681Information technology audit / Criminal law / Computer crimes / Cyberspace / Legal aspects of computing / Abuse / Fraud / Computer fraud / Computer Fraud and Abuse Act / Computer law / Law / Crimes

PDF Document

Add to Reading List

Source URL: www.lgt.polyu.edu.hk

Language: English - Date: 2014-07-16 02:47:41
682Cyberwarfare / Computer network security / National security / Information security / ISO/IEC 27001 / Security controls / Vulnerability / National Strategy to Secure Cyberspace / Risk / Security / Computer security / Data security

PDF Document

Add to Reading List

Source URL: kauppakamari.fi

Language: English - Date: 2015-04-15 02:44:37
683Military science / War / Electronic warfare / Military technology / United States Department of Homeland Security / United States Cyber Command / Department of Defense Strategy for Operating in Cyberspace / Cyberterrorism / National Cyber Security Division / Cyberwarfare / Hacking / Computer security

PDF Document

Add to Reading List

Source URL: www.globalsecurity.org

Language: English
684Cyberspace Law and Policy Centre / Spam filtering / Internet / Content-control software / Content filtering / Internet privacy / Arc @ UNSW Limited / Computing / Internet censorship in Australia / University of New South Wales / Internet ethics / Internet censorship

PDF Document

Add to Reading List

Source URL: www.cyberlawcentre.org

Language: English - Date: 2009-03-31 21:21:51
685Computer law / Electronic Privacy Information Center / Internet privacy / Personally identifiable information / Computer security / Freedom of Information Act / Privacy / U.S. Department of Defense Strategy for Operating in Cyberspace / Department of Defense Strategy for Operating in Cyberspace / Ethics / Security / Government

PDF Document

Add to Reading List

Source URL: www.epic.org

Language: English - Date: 2012-07-11 12:09:35
686Stuxnet / Computer security / Malware / United States Cyber Command / Department of Defense Strategy for Operating in Cyberspace / Cyber-security regulation / SCADA / Computer virus / Cyberspace / Cyberwarfare / Technology / War

PDF Document

Add to Reading List

Source URL: www.aulawreview.org

Language: English - Date: 2013-09-10 20:51:35
687Information / Computing / Google Books / Library 2.0 / Google Book Search Settlement Agreement / Book Rights Registry / Authors Guild / E-book / Copyright law of the United States / Library science / Google / Digital libraries

Google Book Search and the Future of Books in Cyberspace Pamela Samuelson† INTRODUCTION One of the most significant developments in the history of books, as well perhaps in the history of copyright, is the massive digi

Add to Reading List

Source URL: people.ischool.berkeley.edu

Language: English - Date: 2010-01-08 21:29:07
688Computer law / Internet ethics / Information technology management / Marketing / Cyberspace / Cyberspace Law and Policy Centre / Legal aspects of computing / Internet privacy / Consumer protection / Internet / Computing / Ethics

PDF Document

Add to Reading List

Source URL: www.bakercyberlawcentre.org

Language: English - Date: 2013-12-13 02:40:40
689Denial-of-service attack / Internet Relay Chat / Cyberspace / Computing / War / Denial-of-service attacks / Cyberwarfare / Computer network security

PDF Document

Add to Reading List

Source URL: www.nsfocus.com

Language: English - Date: 2014-04-09 01:35:15
690Crime / Electronic warfare / Military technology / Criminology / Military science / Cyber-security regulation / Department of Defense Strategy for Operating in Cyberspace / Computer crimes / Cyberwarfare / Hacking

Cyber Security WeekApril Showcasing the Strength of Dutch Cyber Security Innovations and Knowledge In the same week as the Global Conference on Cyber Space 2015 and the NCSC One Conference, a unique ‘Cyber Secur

Add to Reading List

Source URL: www.westholland.nl

Language: English - Date: 2015-03-31 09:09:36
UPDATE