The Enemy

Results: 681



#Item
271Electronic commerce / Payment systems / Merchant services / Credit card fraud / Fraud / Card security code / Internet Relay Chat / Credit card / Identity theft / Business / Technology / Credit cards

THE HONEYNET PROJECT & THE HONEYNET RESEARCH ALLIANCE Know Your Enemy - A Profile Profile: Automated Credit Card Fraud Assessment Date: 6 June, 2003

Add to Reading List

Source URL: old.honeynet.org

Language: English - Date: 2003-06-25 12:31:47
272Public defender / Enemy combatant / Patriot Act / José Padilla / Law / Criminal procedure / Legal aid

The BACK BENCHER Central District of Illinois Federal Defenders Vol. No. 34

Add to Reading List

Source URL: www.ca7.uscourts.gov

Language: English - Date: 2003-10-27 12:26:44
273Deficit reduction in the United States / United States federal budget / Economy of the United States / United States public debt / Gross domestic product

CURRENT EVENTS DAVID MALPASS — GLOBAL ECONOMIST The Enemy Within he U.S. is suffering a government-spending and debt crisis, compounded

Add to Reading List

Source URL: www.encimaglobal.com

Language: English - Date: 2011-05-04 17:37:41
274Government / Extrajudicial prisoners of the United States / José Padilla / Unlawful combatant / Hamdi v. Rumsfeld / Constitution Project / Enemy combatant / Michael Mukasey / Rumsfeld v. Padilla / Laws of war / History of the United States / Law

UNITED STATES COURT OF APPEALS FOR THE SECOND CIRCUIT August Term, 2003 (Argued: November 17, 2003

Add to Reading List

Source URL: www.foxnews.com

Language: English - Date: 2003-12-18 11:31:42
275United States home front during World War II / History of the United States / Human rights in the United States / Italian American internment / Japanese-American history / Executive Order / National security / Enemy alien / Civil Liberties Act / Japanese-American internment / Human rights abuses / Internments

P U B L I C LAW[removed]—NOV. 7, [removed]STAT[removed]Public Law[removed]106th Congress

Add to Reading List

Source URL: www.gpo.gov

Language: English - Date: 2013-01-16 16:15:50
276Islamic terrorism / War on Terror / Al-Qaeda / Terrorism / Laws of war / Enemy combatant / War in Afghanistan / Taliban / Osama bin Laden / Islam / Islamism / Organized crime

DEPARTMENT OF DEFENSE JOINT STATEMENT FOR THE RECORD ON LAW OF ARMED CONFLICT, THE USE OF MILITARY FORCE AND THE 2001 AUTHORIZATION FOR USE OF MILITARY FORCE

Add to Reading List

Source URL: www.lawfareblog.com

Language: English - Date: 2013-05-16 14:19:47
277Human geography / Culture / Right of asylum / Crimes / International migration / Migrant worker / Refugee / Illegal immigration / United Nations Convention on the Protection of the Rights of All Migrant Workers and Members of Their Families / Human migration / Demography / Population

THE INTERNATIONAL COUNCIL ON HUMAN RIGHTS POLICY Project on Social Control and Human Rights Research Paper (Final Draft) THE INTERNATI L OUNCIL ON HUMAN RIG THE ENEMY AT THE GATES AND THE ENEMY WITHIN:

Add to Reading List

Source URL: www.ichrp.org

Language: English - Date: 2010-02-09 03:42:33
278Internet protocols / Network architecture / Internet standards / Data security / Computer security / Honeypot / Transmission Control Protocol / Firewall / Ip / Computing / Internet / Computer network security

Know Your Enemy: Sebek A kernel based data capture tool The Honeynet Project http://www.honeynet.org Last Modified: 17 November 2003

Add to Reading List

Source URL: old.honeynet.org

Language: English - Date: 2003-11-17 14:46:22
279Geography of the United States / United States / Veteran / American Legion / Vietnam veteran / Seabee / Korean War Veterans Memorial / Vietnam Veterans Memorial Fund / National Mall and Memorial Parks / Vietnam Veterans Memorial / War

Back Airborne At the mercy of the winds, troops descended by glider or parachute, landing behind enemy lines and fighting to

Add to Reading List

Source URL: lincoln.ne.gov

Language: English - Date: 2010-11-05 11:09:08
280Computing / Conficker / Shellcode / Svchost.exe / Malware / Dynamic-link library / SHA-1 / System software / Software / Computer worms

T H E H O N E Y N E T P R O J E C T ® | KYE Paper Know Your Enemy: Containing Conficker To Tame A Malware The Honeynet Project http://honeynet.org

Add to Reading List

Source URL: www.honeynet.org

Language: English - Date: 2014-01-06 14:17:06
UPDATE