Search

Your search keyword '"Computer crime"' showing total 57,041 results

Search Constraints

Start Over You searched for: Descriptor "Computer crime" Remove constraint Descriptor: "Computer crime"
57,041 results on '"Computer crime"'

Search Results

1. E-Rate Program Expansion: A Pathway to Combating Cybersecurity Attacks in K-12 Schools.

2. Towards Future-Proof, Rights-Respecting Automated Data Collection: An Examination of European Jurisprudence.

3. Reinventing Operational Risk Regulation for a World of Climate Change, Cyberattacks, and Tech Glitches.

4. A BRIEF HISTORY OF CYBERWARFARE: Digital battlegrounds are hard to quantify; attackers are faceless and their weapons often untraceable. Nate Drake delves into the world of cyber espionage and sabotage

5. VENTURE CAPITAL CULPABILITY: POTENTIAL LIABILITIES FOR VENTURE CAPITAL INVESTMENT OF FRAUDULENT PORTFOLIO COMPANIES.

6. Gender-Based Cyber Violence: Forms, Impacts, and Strategies to Protect Women Victims

7. THE PROTECTION OF CIRCULATION OF DATA CONTAINED IN PUBLIC REGISTERS UNDER CRIMINAL LAW IN THE CONTEXT OF DIGITALIZATION

8. COMPUTER CRIMES.

9. Political Spam: Why It Sucks and How To Fix It.

10. BAYOU-METRICS: HOW LOUISIANA CAN PROTECT ITS CITIZENS IN A BIOMETRICS-INTENSIVE WORLD.

11. On the Hook: Venue, Vicinage, and Double Jeopardy's Relationship with Modern Data Crimes.

12. Bibliography of selected computer security publications : January 1980-October 1989

13. Interpol nimmt 22.000 IP-Adressen vom Netz

14. Grenzen zwischen Cyberspionage und Cybercrime verschwimmen

15. Nation state actors increasingly hide behind cybercriminal tactics and malware

16. Atende refused to pay the ransom, and now pays the price

17. CISA proposes new security requirements for businesses exposed to cyber espionage

18. Internet Archive breached twice within days

19. 6 biggest healthcare security threats

20. SpyCloud Embeds Identity Analytics in Cybercrime Investigations Solution to Accelerate Insider and Supply Chain Risk Analysis & Threat Actor Attribution

21. Chinese hackers allegedly hacked US ISPs for cyber espionage

23. German police dismantles illegal crypto exchanges

24. Hacker selling 7 TB of Star Health Insurance’s customer data using Telegram

25. Australian cops bust underworld app through compromised software updates

26. China-based cyber espionage campaign in SE Asia is expanding, says Sophos

27. Hackers are cloning YubiKeys via new side-channel exploit

28. Attackers are exploiting vulnerabilities at a record pace—here’s what to do about it

29. Corporate Computer Forensics Investigation Adoption Antecedents in Malaysia's Critical Information Infrastructure Agencies.

30. ABUSE OF PAYMENT CARDS AS EMERGING FORMS OF COMPUTER CRIME IN THE REPUBLIC OF NORTH MACEDONIA.

31. Računarska prevara: (međunarodni standardi i pravo Republike Srbije).

32. Cyberattacks on Energy Infrastructures as Modern War Weapons—Part I: Analysis and Motives.

33. Cyberattacks on Energy Infrastructures as Modern War Weapons-Part II: Gaps, Standardization, and Mitigation.

34. AI and fraud: What CPAs should know.

35. The Effect of Malicious Cyber Activity on the U.S. Corporate Sector

36. INDEMNIFICATION FOR COMMERCIAL SPACE SERVICES VENDORS.

37. Security Threats and Data Protection Methods Used in Cloud Computing: A Review

38. Computer Crime

39. Introduction to Ethical and Legal Aspects of Computing

41. DOMESTIC VIOLENCE.

42. Cancel Carte Blanche for the Information Industries: Federalizing U.C.C. Article 2.

43. A Global Crypto Code of Conduct: Crafting an Internationally Centralized Regulatory Body for a Decentralized Asset.

44. Addressing Unlawful Cyber Operations in Armed Conflict Through Human Rights Bodies Instead of the International Criminal Court.

46. DON'T JUST DO SOMETHING, STAND THERE: WHAT CRIMINAL LAW TEACHES US ABOUT ARTICLE III STANDING IN DATA BREACH CASES.

48. KEUMARS’ VILLAIN OF THE FORTNIGHT

49. IN BRIEF

50. TODAY'S CHOICES. THURSDAY Radio

Catalog

Books, media, physical & digital resources