Cyberspace

Results: 2446



#Item
781Criminal law / Cyberspace / Identity theft / Fraud / International Cybercrime / Cyber security and countermeasure / Computer crimes / Crimes / Law

Law Federal Crimes in Cyberspace Associate Professor Jonathan Clough NJCA/ANU Current Issues in Federal Crime and Sentencing

Add to Reading List

Source URL: njca.com.au

Language: English - Date: 2013-07-18 02:52:15
782Cold War / Nuclear warfare / International security / Hacking / Military technology / Department of Defense Strategy for Operating in Cyberspace / Deterrence theory / Cyberwarfare / Cyberspace / Military science / Nuclear strategies / International relations

Secretary of Homeland Security Jeh Johnson hosts President Obama at National Cybersecurity and Communications Integration Center (DHS/Barry Bahler)

Add to Reading List

Source URL: ndupress.ndu.edu

Language: English - Date: 2015-04-01 21:35:05
783

8 Cyberspace avant la lettre “Vertalen is de meest diepgaande vorm van lezen” (Gabriel Garcia Marquez)

Add to Reading List

Source URL: oneliner.be

Language: Dutch - Date: 2013-01-25 11:41:29
    784Cyberspace / Information Age / Virtual reality / William Gibson / Computer security / Public safety / U.S. Department of Defense Strategy for Operating in Cyberspace / Department of Defense Strategy for Operating in Cyberspace / Security / National security / United States Department of Homeland Security

    THE GCCS PREPARATORY WORKSHOP PROTECTING CYBERSPACE? LEGAL, POLITICAL, AND PRACTICAL DIMENSIONS 5-6 FEBRUARY 2015, THE HAGUE, THE NETHERLANDS

    Add to Reading List

    Source URL: static.hcss.nl

    Language: English - Date: 2015-04-24 07:45:45
    785Computer security / Crime prevention / Electronic commerce / Secure communication / Public safety / National Cyber Security Division / Department of Defense Strategy for Operating in Cyberspace / Security / National security / Computer network security

    This document is scheduled to be published in the Federal Register onand available online at http://federalregister.gov/a, and on FDsys.govP NATIONAL SCIENCE FOUNDATION

    Add to Reading List

    Source URL: cryptome.org

    Language: English - Date: 2015-04-24 20:19:20
    786Pornography law / Internet / Digital media / Cyberspace / Legal aspects of computing / Internet Watch Foundation / Child pornography / Global governance / Communications Decency Act / Computer law / Law / Internet governance

    The governance of the Internet in Europe with special reference to illegal and harmful content Clive Walker & Yaman Akdeniz* CyberLaw Research Unit, Centre for Criminal Justice Studies, Department of Law, University of L

    Add to Reading List

    Source URL: www.cyber-rights.org

    Language: English - Date: 2006-11-09 10:25:26
    787Hacking / Military technology / Computer crimes / Computer security / War / International Multilateral Partnership Against Cyber Threats / Department of Defense Strategy for Operating in Cyberspace / U.S. Department of Defense Strategy for Operating in Cyberspace / Cyberwarfare / Security / Electronic warfare

    Cyber Capability in the Middle East: Seizing Opportunity while Managing Risk in the Digital Age

    Add to Reading List

    Source URL: mena.boozallen.com

    Language: English - Date: 2015-04-27 04:14:10
    788Crime prevention / National security / Management / Computer security / Risk / Information security / Internet-related prefixes / Cyber-security regulation / Department of Defense Strategy for Operating in Cyberspace / Security / Public safety / Actuarial science

    Cyber Security: balancing risk and reward with confidence - Guidance for Non-Executive Directors

    Add to Reading List

    Source URL: www.gov.uk

    Language: English - Date: 2014-12-10 03:56:11
    789Federated identity / Computer network security / Abstraction / Identity assurance / Digital identity / National Strategy for Trusted Identities in Cyberspace / Security / Identity management / Identity / Computer security

    st London 1 November 2012 Press Release

    Add to Reading List

    Source URL: www.openidentityexchange.org

    Language: English - Date: 2014-06-06 18:30:57
    790Cyberspace / Denial-of-service attack / IP address spoofing / SYN flood / UDP flood attack / Smurf attack / Firewall / Transmission Control Protocol / Internet security / Computer network security / Denial-of-service attacks / Computing

    A Taxonomy of DDoS Attack and DDoS Defense Mechanisms ∗ Jelena Mirkovic

    Add to Reading List

    Source URL: lasr.cs.ucla.edu

    Language: English - Date: 2005-06-22 14:30:02
    UPDATE