Secret identity

Results: 66



#Item
11Software AG / Crime prevention / National security / ACF2 / Identity management / Resource Access Control Facility / Access control / Database / Security / Computer security / ADABAS

SECURITRE Security Interface between ADABAS/NATURAL and RACF / ACF2 / TOP SECRET Last night, a hacker broke through your security and stole confidential data.

Add to Reading List

Source URL: treehouse.com

Language: English - Date: 2015-01-13 09:56:47
12Credit card fraud / Personally identifiable information / Tax evasion / Identity theft / Special agent / Inspector General / Fraud / United States Secret Service / Data breach / Crimes / Law / Security

U.S. Department of Justice United States Attorney Southern District of Florida 99 N.E. 4 Street Miami, FL9001

Add to Reading List

Source URL: www.oig.dol.gov

Language: English - Date: 2015-04-09 13:50:28
13Personal finance / Identity / United States federal banking legislation / Crimes / Identity theft / Credit card / Bank fraud / Credit history / Fair Credit Reporting Act / Financial economics / Credit / Finance

checking and saving accounts and obtain new account numbers. Ask the bank to issue you a secret password that must be used in every transaction (not your mother’s maiden name). Write a form letter

Add to Reading List

Source URL: www.popcenter.org

Language: English - Date: 2008-01-07 15:09:51
14Sexual health / Same-sex sexuality / Male homosexuality / Sexual acts / Men who have sex with men / Safe sex / AIDS / Anal sex / Condom / Human sexuality / HIV/AIDS / Human behavior

Secret LiveS, Other vOiceS... A cOmmunity-bASed Study expLOring mALe-tO-mALe Sex, gender identity And hiv trAnSmiSSiOn riSk in Fiji Secret Lives, Other Voices...

Add to Reading List

Source URL: www.fsm.ac.fj

Language: English - Date: 2012-03-12 20:22:19
15Australian intelligence agencies / Government of Australia / Human rights / Identity management / Internet privacy / Australian Secret Intelligence Service / Personally identifiable information / Medical privacy / Information privacy / Privacy law / Privacy / Ethics

2014 THE LEGISLATIVE ASSEMBLY FOR THE AUSTRALIAN CAPITAL TERRITORY INFORMATION PRIVACY BILL 2014

Add to Reading List

Source URL: www.legislation.act.gov.au

Language: English - Date: 2014-06-04 22:21:55
16Software AG / Crime prevention / National security / ACF2 / Identity management / Resource Access Control Facility / Access control / Database / Security / Computer security / ADABAS

SECURITRE Security Interface between ADABAS/NATURAL and RACF / ACF2 / TOP SECRET Last night, a hacker broke through your security and stole confidential data.

Add to Reading List

Source URL: www.treehouse.com

Language: English - Date: 2015-01-13 09:56:47
17Intelligence / Intelligence gathering disciplines / Signals intelligence / Classified information / For Official Use Only / Government Communications Security Bureau / New Zealand / National security / Security / United States government secrecy

SECRET//COMINT//REL TO USA, FVEY (U) Second Party National Identity Rules, Continued

Add to Reading List

Source URL: static.stuff.co.nz

Language: English - Date: 2015-03-07 15:17:19
18American culture / Superman / Superhero / Clark Kent / Batman / DC Comics / First appearance / Smallville / Alternative versions of Superman / Comics / Literature / Kryptonians

7 The Superhero as Labor The Corporate Secret Identity Greg M. Smith

Add to Reading List

Source URL: www2.gsu.edu

Language: English - Date: 2012-06-14 21:47:58
19Graffiti / Identifier / Visual arts / Structure / Gangs / Bloods / Human geography

GARY KL1VA,NS Gangs are secret societies who advertise their identity. They hide in plain sight. Gang members wear colors, have identifying

Add to Reading List

Source URL: gangs.umd.edu

Language: English - Date: 2010-07-12 15:00:06
20Government / Federal Bureau of Investigation / United States Secret Service / Organized crime / Computer fraud / U.S. Immigration and Customs Enforcement / IRS Criminal Investigation Division / Identity theft / United States Department of Homeland Security / Crime / Computer crimes / Law

William Noonan Deputy Special Agent in Charge United States Secret Service Criminal Investigative Division Cyber Operations Branch

Add to Reading List

Source URL: docs.house.gov

Language: English - Date: 2014-02-03 12:59:20
UPDATE