Protected computer

Results: 695



#Item
601Accountancy / Business / Audit / Risk assessment / Information Systems Audit and Control Association / Information technology audit process / Information security audit / Auditing / Risk / Information technology audit

Computer Incident, Intrusion, Emergency Response Audit Program Created by Deborah Coggins May 2001 Audit Objectives: • To ensure assets are adequately monitored and protected.

Add to Reading List

Source URL: www.forum-intrusion.com

Language: English - Date: 2006-05-05 18:46:58
602Microsoft Windows / Computing / Cryptographic software / Encryption / Wireless security / Data security / Wi-Fi Protected Access / USB flash drive / Wi-Fi / Computer network security / Disk encryption / Cryptography

Monthly Security Tips NEWSLETTER September 2012 Volume 7, Issue 9

Add to Reading List

Source URL: www.cio.nebraska.gov

Language: English - Date: 2012-11-27 09:35:12
603Authorization / Law / Computer security / Privacy / Data privacy / Health Insurance Portability and Accountability Act / Privacy law

HIPAA Disclosure Authorization Form Full Name I hereby authorize to use or disclose my (Discloser) protected health information related to (Type of Information) to for the following purpose: (Recipien

Add to Reading List

Source URL: www.michigan.gov

Language: English - Date: 2012-12-07 11:57:48
604Computer law / United States Federal Sentencing Guidelines / United States federal law / Theft / Identity theft / Attendant circumstance / Protected computer / Title 18 of the United States Code / National Information Infrastructure Protection Act / Law / Criminal law / Crimes

Proposed Amendments to the Sentencing Guidelines January 27, 2009 This compilation contains unofficial text of proposed amendments to the sentencing guidelines

Add to Reading List

Source URL: www.ussc.gov

Language: English - Date: 2014-01-08 18:20:34
605Technology / Cryptographic protocols / IEEE 802.11 / Cyberwarfare / Aircrack-ng / Wired Equivalent Privacy / Wi-Fi Protected Access / Wi-Fi / Wireless LAN / Wireless networking / Computer network security / Computing

Kali Linux Cookbook Willie L. Pritchett David De Smet Chapter No. 9

Add to Reading List

Source URL: www.packtpub.com

Language: English
606United States Federal Sentencing Guidelines / United States federal law / Attempt / Theft / Acceptance of responsibility / Protected computer / Title 18 of the United States Code / National Information Infrastructure Protection Act / United States federal probation and supervised release / Criminal law / Law / Computer law

Amendments to the Sentencing Guidelines April 30, 2013 This compilation contains unofficial text of amendments to the sentencing guidelines, policy

Add to Reading List

Source URL: www.ussc.gov

Language: English - Date: 2014-01-08 18:20:34
607United States Federal Sentencing Guidelines / United States federal law / Government / Protected computer / Patriot Act / National Information Infrastructure Protection Act / United States federal probation and supervised release / Law / Computer law / Criminal law

Report to Congress: Increased Penalties for Cyber Security Offenses

Add to Reading List

Source URL: www.ussc.gov

Language: English - Date: 2014-01-08 18:19:20
608Computer law / United States Federal Sentencing Guidelines / United States federal law / Attempt / Financial crimes / Protected computer / National Information Infrastructure Protection Act / United States federal probation and supervised release / Criminal law / Law / Crime

Proposed Guideline Amendments for Public Comment

Add to Reading List

Source URL: www.ussc.gov

Language: English - Date: 2014-01-08 18:20:34
609United States Federal Sentencing Guidelines / United States federal law / Attendant circumstance / Protected computer / Attempt / United States federal probation and supervised release / National Information Infrastructure Protection Act / Law / Criminal law / Computer law

Amendments to the Sentencing Guidelines April 28, 2011 This compilation contains unofficial text of amendments to the sentencing guidelines, policy

Add to Reading List

Source URL: www.ussc.gov

Language: English - Date: 2014-01-08 18:20:38
610Crimes / Information technology audit / Cybercrime / United States Federal Sentencing Guidelines / United States federal law / Computer Fraud and Abuse Act / Fraud / Protected computer / Computer crime / Law / Computer law / Criminal law

Computer Fraud Working Group Report

Add to Reading List

Source URL: www.ussc.gov

Language: English - Date: 2014-01-08 18:20:32
UPDATE