Search

Your search keyword '"Computer crimes -- Analysis"' showing total 405 results

Search Constraints

Start Over You searched for: Descriptor "Computer crimes -- Analysis" Remove constraint Descriptor: "Computer crimes -- Analysis"
405 results on '"Computer crimes -- Analysis"'

Search Results

1. Cyberattaques contre les systemes d'information de sante au Canada

2. Ticketmaster breach highlights consequences of cybercrime-as-a-service marketplaces and shared responsibility model

3. Online fraud, hacks, and scams, oh my

4. The personal data incident in Kumla also affects Askersund municipality

5. The personal data incident in Kumla also affects Hallsberg municipality

6. The personal data incident in Kumla also affects Laxa municipality

7. The personal data incident in Kumla also affects Lekeberg municipality

9. The Effect of Malicious Cyber Activity on the U.S. Corporate Sector

10. Advisory for Enhancement of API Authentication & Security for Trading Members

13. Cyber Ad-versaries Using Analytics to Measure 'Victims per Click' HP warns of rise in malicious PDF campaigns and Office exploits, while noting Office macros persist

16. Proposal of a simple open-source quantitative tribometric assay and its implementation for the assessment of the effects of redox-related alterations on the lubrication capacity of a commercial water-based lubricant gel (Updated August 1, 2022)

17. Analysis of Recent DeFi Scams and Hacks

18. Initial security analysis of ChatGPT4 finds scenarios for accelerated cybercrime

19. Anomali and ONG-ISAC Announce Joint Initiative to Combat Cybercrime in Oil & Natural Gas Sector

20. The Vatican Is Buzzing With Conspiracy Theories as Hackers Take Down the Pope's Website

22. Preparing for Multidomain Warfare: Lessons from Space/Cyber Operations

23. New 'Watch Center' to ring alarms on space-related cyber threats

24. Initial security analysis of ChatGPT4 finds scenarios for accelerated cybercrime

25. Sri Lanka : Sri Lanka signs the Second Additional Protocol to the Convention on Cybercrime on enhanced co-operation and disclosure of electronic evidence of the Council of Europe

26. FortiGuard Labs Predicts the Convergence of Advanced Persistent Threat Methods with Cybercrime

27. Winmill Employee Wins Veracode Video Contest

28. Threat and challenges of cyber-crime and the response

29. FICCI-EY Report Cyber Crime Management: Innovations/Models in Cybercrime Management

30. Allianz Risk Barometer 2019: Cyber Now Equally Concerning for Companies As Their Major Traditional Exposures

31. Allianz Risk Barometer 2019: Cyber Now Equally Concerning for Companies As Their Major Traditional Exposures

32. This man will save you from the evils of the internet: Part 3

33. Lahore Garrison University Researcher Publishes Findings in Global Digital and Print Media (Portrayal of Pakistan Electronic Crimes Act in Leading Liberal Dailies of Pakistan)

34. Stealing masks and amulets: what's law got to do with it?

35. United States : HP Threat Research Shows Attackers Exploiting Zero?Day Vulnerability Before Enterprises Can Patch

36. John Howell ask the Secretary of State for the Home Department, if she will make an assessment of the implications for her policies of the debate that took place at the Council of Europe on 30 September 2021 on the Convention on Cybercrime

37. Hacker nation: China's cyber assault

38. Artificial Intelligence and advanced Data Analytics for Law Enforcement Agencies

39. Sarah Olney ask the Secretary of State for the Home Department, if she will make an assessment of the potential merits of establishing a centralised reporting function for enhanced data sharing to help prevent scams relating to financial services

40. Bobby Brazier blasts 'c***' who hacked his Instagram to scam money from his fans; The 16-year-old model son of Jade Goody and Jeff Brazier lashed out at the person who used his account to scam money out of his kind and unsuspecting fans

41. Intimate partner violence, technology and stalking

42. An empirical study of attitudes and opinions of computer crimes: a comparative study between U.K. and the Kingdom of Bahrain

43. An analysis of the top 10 most cybercrime-ridden states

44. IMPROVING GRID RELIABILITY IN THE FACE OF EXTREME EVENTS

45. Robustness of the Markov-Chain model for cyber-attack detection

47. Cyberstalking, personal privacy, and moral responsibility

48. Driving towards success in the Air Force cyber mission: leveraging our heritage to shape our future

50. A general theory of crime and computer crime: An empirical test

Catalog

Books, media, physical & digital resources