Social software engineering

Results: 749



#Item
31Malware / Cyberwarfare / Ransomware / Cybercrime / Computer security / Social engineering / Cryptography / Antivirus software / Computer virus / Phishing / Scareware / Draft:Locky

INFOGRAPHIC - MalwareBytes - Ransomware Infographic UPDATE

Add to Reading List

Source URL: pt.malwarebytes.com

Language: English - Date: 2016-07-07 13:07:19
32Supply chain management / Procurement / Systems engineering / Agreement on Internal Trade / Purchasing / Goods and services / Construction / Government procurement in the European Union / Procurement software

PART IV - SPECIFIC RULES Chapter Five Procurement AnnexProcurement - Provisions for municipalities, municipal organizations, school boards and publicly-funded academic, health and social service entities

Add to Reading List

Source URL: www.marcan.net

Language: English - Date: 2015-09-05 17:10:39
33Cybercrime / Ransomware / Social engineering / Cryptography / Antivirus software / Malware / Phishing / Scareware / Computer virus / Computer security / Draft:Locky / TorrentLocker

INFOGRAPHIC - MalwareBytes - Ransomware Infographic UPDATE

Add to Reading List

Source URL: es.malwarebytes.com

Language: English - Date: 2016-07-07 12:58:17
34Risk / Vulnerability / Security / Actuarial science / Hazard analysis / Social vulnerability / Hazard / Vulnerability assessment / Disaster / HAZUS / Reliability engineering

Environmental Modelling & Software156e169 Contents lists available at ScienceDirect Environmental Modelling & Software journal homepage: www.elsevier.com/locate/envsoft

Add to Reading List

Source URL: homepage.univie.ac.at

Language: English - Date: 2015-06-01 23:03:25
35Cybercrime / Ransomware / Social engineering / Cryptography / Antivirus software / Malware / Phishing / Scareware / Computer virus / Computer security / Draft:Locky / TorrentLocker

INFOGRAPHIC - MalwareBytes - Ransomware Infographic UPDATE

Add to Reading List

Source URL: it.malwarebytes.com

Language: English
36Spamming / Social engineering / Identity theft / Cybercrime / Phishing / Netcraft / Email spam / Certificate authority / Anti-phishing software / Spoofed URL

Microsoft Word - soups2005.doc

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2005-06-21 09:58:19
37E-Science / Collaboration / Information science / Knowledge engineering / Cyberinfrastructure / Collaboratory / Renaissance Computing Institute / Interoperability / Application software / Ontology / Data-intensive computing / ICME cyberinfrastructure

Breakout #3: Collaboration Tools and Strategies Can we break this discussion up into two groupings? social interactions and data management systems Multi-dimensional space: networking, distributed work across time and

Add to Reading List

Source URL: www.ncar.ucar.edu

Language: English - Date: 2002-11-06 18:05:59
38Cybercrime / Ransomware / Social engineering / Cryptography / Antivirus software / Malware / Phishing / Scareware / Computer virus / Computer security / Draft:Locky / TorrentLocker

INFOGRAPHIC - MalwareBytes - Ransomware Infographic UPDATE

Add to Reading List

Source URL: br.malwarebytes.com

Language: English - Date: 2016-07-07 12:54:21
39Cybercrime / Ransomware / Social engineering / Cryptography / Antivirus software / Malware / Phishing / Scareware / Computer virus / Computer security / Draft:Locky / TorrentLocker

INFOGRAPHIC - MalwareBytes - Ransomware Infographic UPDATE

Add to Reading List

Source URL: ru.malwarebytes.com

Language: English - Date: 2016-07-07 13:10:29
40Social engineering / Fraud / Spamming / Deception / Non-sufficient funds / ESET / Advance-fee scam / Lottery scam / Romance scam / David Harley / Antivirus software / Cheque fraud

October 2015 Feature Article: 419 Special Table of Contents 419s: This Time it’s (not very) Personal.....................................................................................................................

Add to Reading List

Source URL: virusradar.com

Language: English - Date: 2015-11-30 04:02:56
UPDATE