Printer Friendly

Browse Computer crimes topic

Prevention subtopic

Articles

1-267 out of 267 article(s)
Title Author Type Date Words
Best online shopping practices. Mar 29, 2021 866
Sneaky way to control the narrative. Feb 9, 2021 939
Kaspersky tackles Asia-Pacific's digital reputation economy. Dec 10, 2020 595
Taiwan is crucial to the global fight against cyber crime. Nov 26, 2020 898
The importance of cybersecurity in software design. Nov 25, 2020 1376
Trends, Prevention, and Loss Recovery for Victims of Real Estate Wire Fraud and Other Cybercrimes. Feinberg, Joshua B. Nov 1, 2020 6159
SPOILING FOR A FIGHT: HACKING BACK WITH THE ACTIVE CYBER DEFENSE CERTAINTY ACT. Porch, Alice M. Sep 22, 2020 10339
HEALTHCARE DATA BREACHES IN SOUTH DAKOTA: POST-BREACH LEGISLATION IS NOT ENOUGH. Mabee, Michael J. Sep 22, 2020 14216
A JOP GADGET DISCOVERY AND ANALYSIS TOOL. Brizendine, Bramwell; Stroschein, Josh Sep 22, 2020 6403
ALERT PRIORITIZATION AND STRENGTHENING: TOWARDS AN INDUSTRY STANDARD PRIORITY SCORING SYSTEM FOR IDS ANALYSTS USING OPEN SOURCE TOOLS AND MODELS OF MACHINE LEARNING. Dangi, Bikram; Gamet, Jeremy; Kulm, Arica; Nelson, Tj; O'Brien, Austin; Pauli, Wayne E. Sep 22, 2020 6662
COVID-19 Resources. Apr 2, 2020 374
IF THE LAW CAN ALLOW TAKEBACKS, SHOULDN'T IT ALSO ALLOW HACKBACKS? Rodrigues, Adam Jan 1, 2020 5598
Practitioners need a written information security plan. Allen, Susan C. Jan 1, 2020 693
CREATING CYBERSECURITY AWARENESS. Brands, Kristine Jan 1, 2020 1053
THE RISE OF CYBERCRIME AND THE NEED FOR STATE CYBERSECURITY REGULATIONS. Bayard, Emily E. Sep 22, 2019 8871
Why global collaboration is needed to protect against a new generation of cyber threats. Jordan, Amy May 5, 2019 794
How to Stay Safe on Public WiFi. Apr 1, 2019 426
Protect yourself-and your benefits--from fraud. Lett, Bryan C. Report Mar 1, 2019 479
Costly Crisis Management. Helms, Karla Jo Mar 1, 2019 679
How to Prevent Small Business Clients from Hitting Cyber Blind Spots. Jan 21, 2019 972
Cyber liability: Managing evolving exposures. Sterna, Stanley; Wolfe, Joseph Jan 1, 2019 1366
How Our Institution Went From Most Hacked to Zero Breaches. Denzer, Juan Jun 1, 2018 2429
Why cybercriminals are targeting CPAs. Tysiac, Ken Jun 1, 2018 2258
CROSS-BORDER DATA ACCESS AND ACTIVE CYBER DEFENSE: ASSESSING LEGISLATIVE OPTIONS FOR A NEW INTERNATIONAL CYBERSECURITY RULEBOOK. Cook, Chris Mar 22, 2018 14698
Overcoming the Cyber Weapons Paradox. Goines, Maj Timothy M. Essay Dec 22, 2017 9376
Ransomware Attacks Steal Headlines, but... Dec 1, 2017 391
Equifax: Yet Another Data Breach. Pike, George H. Nov 1, 2017 1084
THE NEW WORLD OF SECURITY: "The goal is to thwart intellectual property theft, such as a stolen formula or customer list; to comply with government and industry regulations on protecting data; and to enforce end-user computing policies to avoid expensive lawsuits, such as sexual harassment.". Miller, Brad Nov 1, 2017 900
Beware data hijackers: Five steps to take to prevent a critical loss of security. Benton, Mark Oct 27, 2017 677
A Balanced Approach for Securing the OBD-II Port. Markham, Tom R.; Chernoguzov, Alex Technical report Aug 1, 2017 7024
Social media and the DOD: benefits, risks, and mitigation. Waldvogel, Dieter A. Report Jun 22, 2017 2912
Protecting electronic data in an unsecure world. Ohanesian, Michael V. Mar 1, 2017 1317
In-flight internet poses hacking dangers. Dec 1, 2016 371
From cyber threats to cyber-crime. Iovan, Stefan; Iovan, Alina-Anabela Report Dec 1, 2016 4518
Hack the vote: cyberrisk at the ballot box. Tuttle, Hilary Cover story Oct 1, 2016 2044
5 steps CPAs can take to fight hackers: accountants play an essential role in helping organizations develop and implement strategies to protect computer networks and data. Traina, Lisa Apr 1, 2016 2735
Phishing and E-commerce: an information security management problem. Scheau, Mircea Constantin; Arsene, Adrian-Liviu; Dinca, Gerald Apr 1, 2016 4902
Managing privileged access hacking threats. Schorr, Joe Dec 1, 2015 1109
Hold that post! Is your company safe from social media hackers? Hausknecht, Suzanne Nov 1, 2015 487
FBI: Internet of things a serious cybercrime risk. Nov 1, 2015 348
Build your defense! develop a strategic plan of action to combat cybercrime. Ropp, Ron; Quammen, Becky Oct 1, 2015 897
Hitrust: Key security initiatives. Ropp, Ron; Quammen, Becky Brief article Oct 1, 2015 154
Emojis vs. Hackers. Potenza, Alessandra Brief article Sep 7, 2015 159
How to revitalize IT security training. Scott-Cowley, Orlando Jul 1, 2015 498
Performance evaluation of AODV routing protocol under black hole attack. Selvakumar, K.; Malarvizhi, N.; Murugan, V. Senthil Report Jun 1, 2015 2541
Review of security threats and its countermeasures in Mobile Adhoc Networks. Geetha, A.; Sreenath, N. Report Jun 1, 2015 2982
Modernization of Romanian legislation on preventing and combating cybercrime and implementation gap at European level. Moise, Adrian Cristian Essay Jan 1, 2015 7484
Resiliency in future cyber combat. Bryant, William D. Jan 1, 2015 8221
Nine ways to improve data security. Hagel, Jack Sep 1, 2014 710
The role of the youth's national identity in reducing social harms and internet crime. Khorrami, Ahmad; Foroutan, Mostafa; Sarfarazi, Mehrzad Report Jun 1, 2014 2911
Killing the golden goose: the dangers of strengthening domestic trade secret rights in response to cyber-misappropriation. Argento, Zoe Mar 22, 2014 7110
Killing the golden goose: the dangers of strengthening domestic trade secret rights in response to cyber-misappropriation. Argento, Zoe Mar 22, 2014 22983
Googling freedom: online privacy. Tuccille, J.D. Brief article Feb 1, 2014 184
International law and private actor active cyber defensive measures. Rosenzweig, Paul Jan 1, 2014 7956
Federal cyber panic: fake scare, blown budget. Suderman, Peter Brief article Nov 1, 2013 271
Real-world cyberthreats: detection of the malicious email and subsequent intrusion can be extremely difficult. Spending an extra two seconds to hover over links to verify the actual website will have an advantage over not-so-savvy users. Habersetzer, Vernon Jul 1, 2013 1626
To keep passwords safe from hackers, just break them into bits: millions of passwords have been stolen from companies such as LinkedIn and Yahoo. A new approach aims to prevent future heists. Simonite, Tom Jan 1, 2013 800
Firewall under fire: could a cybercrime send you up in flames? Hunt, Kristin Gunderson Jan 1, 2013 1873
Playing defense: with digital information so vulnerable to theft, it's imperative for journalists to be proactive in protecting confidential sources and data. But too few people are taking the threat seriously. Ricchiardi, Sherry Essay Sep 22, 2012 3799
Shadow boxing: cyber warfare and strategic economic attack. Olson, Soren Essay Jul 1, 2012 5284
Cyber Secure Pakistan, 2012. Malik, Zulfiqar Ali Conference notes Jun 10, 2012 603
Insurance options following a cyberattack: companies potentially at the mercy of computer hackers and cyherattackers should carefully weigh their insurance options to prevent widespread data damage to the enterprise. Godes, Scott N.; Zoogman, Nicholas J. Mar 1, 2012 1574
'Digital Crimes Consortium 2011: turning the tables against cybercrime'. Harmon, Bill Dec 1, 2011 335
High tech, high risk: the evolution and impact of cybercrime. Brief article Oct 1, 2011 237
The war on Web anonymity. Rosenbach, Marcel; Schmundt, Hilmar Brief article Aug 11, 2011 208
Work-from-home scams. Jan 1, 2011 462
Cyber Cold War looming for U.S. Dec 1, 2010 431
The next 9/11 could be in cyberspace. Jun 10, 2010 935
Internet imposters. May 1, 2010 441
Only you. Thilmany, Jean Brief article Apr 1, 2010 169
Wanted: 'cyber ninjas'. Brief article Mar 1, 2010 155
Resembling 'cartels,' Hackers become more industrialized. Mar 1, 2010 369
Internet safety. Killeen, Erlene Dec 1, 2009 961
RSA_Common_Criteria_release. Oct 28, 2009 571
Cybersecurity: current legislation, executive branch initiatives, and options for congress. Theohary, Catherine A.; Rollins, John Report Sep 1, 2009 8877
AP Targets Online Theft, Changes Rates and Notice Requirements. Apr 6, 2009 842
US Lawmakers push Cybersecurity Defense Bill in Senate. Author abstract Apr 2, 2009 253
Problems Related to Computer Ethics: Origins of the Problems and Suggested Solutions. Kuzu, Abdullah Author abstract Apr 1, 2009 401
Web self-defense: how to protect yourself against Internet scams. Schardt, David Apr 1, 2009 1789
Why shop online? Mar 9, 2009 1178
Initiative geared toward stopping internet predators. Brief article Sep 1, 2008 273
Spam, cybercrime linked (duh!). Brief article Sep 1, 2008 307
The lazy person's guide to botnets. Long, Dale J. Jul 1, 2008 2945
Ten tips to combat cybercrime. Leon, James F. May 1, 2008 2475
Securing online transactions: crime prevention is the key. Ena, Michael Jan 1, 2008 15643
Defending the digital battlefield. Joseph, Kristopher Jan 1, 2008 999
JUSTICE AND HOME AFFAIRS COUNCIL : MINISTERS TO TACKLE CHILD PROTECTION AND E-JUSTICE. Brief article Sep 28, 2007 282
House of Lord's Science and Technology committee considers cyber crime website. Brief article Apr 25, 2007 227
Sophos reveals cyber criminals turn from e-mail to the web. Brief article Jan 24, 2007 280
Comment: virtual neighborhood watch: open source software and community policing against cybercrime. Jones, Benjamin R. Jan 1, 2007 12056
PCI compliance: protecting customers and the franchise brand: give your franchise system a security check-up. Epstein, Tom Dec 1, 2006 1734
Corporate and government computers hacked by juveniles: your government computer is being targeted for a hack right now. The hackers are teenagers. They'll never be caught, and they know it. Radnofsky, Mary L. Sep 22, 2006 3792
Cyber sleuthing for hot jobs. Brief article Aug 1, 2006 214
EU to investigate alerts system for Internet security breaches. Brief article Jun 1, 2006 202
Data security: an ounce of prevention. Britt, Phillip Jun 1, 2006 1283
I've been violated. Kennedy, Shirley Duglin Editorial Jun 1, 2006 1147
Joint effort needed to fight cyber criminals - claim. Brief article Apr 26, 2006 214
Terror in America, made in China: while U.S. corporate elites export technology to Communist China's cyberpolice, the U.S. government allows China to export brutal repression to our shores. Jasper, William F. Mar 20, 2006 2137
Sophos warns of malware exploiting Microsoft vulnerability. Brief Article Dec 5, 2005 164
News of CPS cyber crime barristers welcomed by Sophos. Brief Article Oct 21, 2005 135
You might be a spammer if ... Schelmetic, Tracey E. Column Oct 1, 2005 474
eema announces cyber crime workshop. Brief Article Aug 17, 2005 156
eema announces cyber crime workshop. Brief Article Aug 17, 2005 165
DDoS SoS... Jun 10, 2005 455
Dos and don'ts for digital evidence: managers need to understand the basics of digital investigations so that they can respond to cybercrime without committing a crime themselves. Lang, Dave Jun 1, 2005 2734
No phishing allowed. Britt, Phillip Jun 1, 2005 1693
Deepnet Explorer releases password hashing counter measures. Brief Article Apr 14, 2005 154
DON CIP: a comprehensive solution to improve cyber and physical security of DON critical assets. Reiter, Donald Apr 1, 2005 1478
Preventing computer fraud: enemies from without and within are constantly looking for ways to break into vulnerable computer systems. All it takes is one successful attack to bring down an entire system. Hanna, Greg Mar 1, 2005 2494
Holding Internet Service Providers accountable: would indirect liability reduce costly cyberspace externalities? Lichtman, Douglas Dec 22, 2004 5095
The FTC cracks down. Godbey, Bob Dec 1, 2004 378
Cyber-cheating: a new generation of cheaters uses modern methods to grab grades. But you can catch them with a combination of high-tech sleuthing and old-fashioned teaching. Flannery, Mary Ellen Nov 1, 2004 1785
Wash. college coalition fights cyber crime. Brief Article Oct 11, 2004 159
The Federation Against Software Theft launches UK campaign. Brief Article Oct 11, 2004 163
Rifling for evidence. Thilmany, Jean Brief Article Oct 1, 2004 288
U.S. representative Adam H. Putnam: as franchising strives to meet technology's challenges in the business sector, this Capitol Hill leader maintains a sharp focus on government information technology spending and the threats of cyber-crime. Interview Aug 1, 2004 2968
Microsoft identfies critical security vulnerabilites. Brief Article Aug 1, 2004 171
Cybercrimes and misdemeanors. Godbey, Bob Jul 1, 2004 389
Controlling Internet use in the workplace. Taillon, Gregory Jul 1, 2004 677
Computer monitoring and surveillance: balancing privacy with security. Wakefield, Robin L. Jul 1, 2004 1502
Computer fraud: analyzing perpetrators and methods. Davis, Harold E.; Braun, Robert L. Jul 1, 2004 2151
Guarding the virtual vault: businesses in all sectors now recognize the value of information. Unfortunately, so do criminals. Data theft has become a multi-billion dollar problem that no company can afford to ignore. Stoller, Jacob Feb 1, 2004 1254
Move beyond patch management: correlation threat-management engines can reduce the time needed to check syslog files. Hollows, Phil Jan 1, 2004 1130
Microsoft moves to protect small businesses in the UK. Brief Article Dec 15, 2003 142
PayPal Is Latest Target of Email Phishing Scam. Nov 17, 2003 551
RESEARCH: EU-FUNDED PROJECT ON COMBATING CYBERCRIME. Oct 29, 2003 429
New UK e-mail scam fishes for confidential bank details. Brief Article Oct 27, 2003 159
Tighter cybersecurity. Sep 22, 2003 726
Plug & pray? A layered security system can help keep your wireless system safe. Gaby, Bob Sep 1, 2003 1405
Tackling cyber criminals. Brayman, Matthew Brief Article Aug 1, 2003 301
Team approach to cybercrime. Piazza, Peter Brief Article Aug 1, 2003 285
$900,000 grant kicks off Calif. anti-cybercrime program. (Bits & Bytes). Brief Article Jul 7, 2003 230
Nonpassive defense of the Army's computer networks. King, Thomas G. Jul 1, 2003 1682
An eye for an eye: will it stand up in court? (Tech Talk). Piazza, Peter Jul 1, 2003 533
When virtual spam turns real. (Tech Talk). Piazza, Peter Jul 1, 2003 469
EU agency will improve cyber security. (Up front: news, trends & analysis). Swartz, Nikki Jul 1, 2003 444
Honeypots: a sticky legal landscape? Walden, Ian; Flanagan, Anne Jun 22, 2003 19158
Digital architecture as crime control. . Katyal, Neal Kumar Jun 1, 2003 15505
European cybersecurity agency. (Quick Bytes). Brief Article Apr 1, 2003 81
A national Agenda for Cybersecurity R&D. (Tech Talk). Piazza, Peter Apr 1, 2003 321
On patrol in cyberspace: a look at progress among local, state, and federal efforts to combat cybercrime, including credit card fraud and identity theft. (Computer Security). Piazza, Peter Apr 1, 2003 4293
A site where hackers are welcome: using hack-in contests to shape preferences and deter computer crime. Wible, Brent Apr 1, 2003 22845
Burglars with access codes: head of U.S. Secret Service in Mexico dissects cyber crime threat, as corporations scramble to protect themselves and their systems. Brayman, Matthew Mar 1, 2003 1664
Gateway helps Ill. college fight cyber crime. (Bits & Bytes). Brief Article Feb 17, 2003 233
Information watchdogs. (Input Output). Thilmany, Jean Feb 1, 2003 769
Here's what you need to know to protect SCADA systems from cyber-attack. (Protecting Control And Data Systems). Rush, William F.; Kinast, John A. Feb 1, 2003 2110
Can you hack it? Penetration testing gives companies a way to find their vulnerabilities before hackers use them to break in and cause harm. (Computer Security). Lam, Frank; Beekey, Mike; Cayo, Kevin Feb 1, 2003 3431
Killer app turns homicidal. (Tech Forum). Castelluccio, Michael Jan 1, 2003 1026
Connectivity equals vulnerability. (Commentary). Clouser, Ted Oct 28, 2002 688
Cyber security push on. (Washington Report). Chaisson, Kernan Sep 1, 2002 351
Filtering out problems: e-mail spam and scams often infuriate corporate computer users. A surprisingly easy and effective solution, however, is the e-mail client's filter feature. (Tech Talk). Piazza, Peter Brief Article Sep 1, 2002 455
Stringent measures needed to prevent software piracy. Brief Article Aug 10, 2002 206
Managing information security. (Current Research). Lohmeyer, Daniel F.; McCrory, Jim; Pogreb, Sofya Statistical Data Included Aug 6, 2002 933
The ghost of information past: think deleted data from your PC is gone for good? Think again. (Tech Issues). Rohan, Rebecca Aug 1, 2002 1378
Online masquerade: whose e-mail is it? E-mails carrying viruses like the recent Klez worm use deceptively simple techniques and known vulnerabilities to spread from one computer to another with ease. (Tech Talk). Piazza, Peter Brief Article Aug 1, 2002 980
JUSTICE AND HOME AFFAIRS: DANISH MOVE MAY PAVE WAY FOR MANDATORY DATA RETENTION BY TELECOM FIRMS. Brief Article Jul 13, 2002 273
Cyber security: key to homeland security. (Up front: news, trends & analysis). Brief Article Jul 1, 2002 370
A megabyte of prevention. (Up front: news, trends & analysis). Brief Article Jul 1, 2002 360
Fighting internet credit fraud: problems still remain. Cameron, Al Jul 1, 2002 2158
Cybercrime: finding security in Cyberspace; steps for pour business to take to avoid being a target for high-tech criminals. Campbell, Melissa Statistical Data Included Jun 1, 2002 1750
Secure your business online. (New Products). Donaldson, Sonya A. Brief Article Jun 1, 2002 120
Central station for virus reporting: Businesses have many options for reporting attempted intrusions by hackers, but they are reluctant to report viruses, regarding them more as a nuisance than as a threat. (Tech Talk). Piazza, Peter Brief Article Jun 1, 2002 866
Will the Nigerian film-flam ever end? (Tech Talk). Piazza, Peter Brief Article Jun 1, 2002 278
Investigative training online. (Tech Talk). Piazza, Peter Brief Article Jun 1, 2002 187
Wireless risks abound. (Tech Talk). Piazza, Peter Brief Article Jun 1, 2002 269
Privacy vs. cybersecurity: the advantages of doing business over the Internet are tremendous--but only if enterprises can ensure exchanging information in cyberspace is secure. (Tech Trends). Phillips, John T. May 1, 2002 2277
Reputations at risk. (News Extra). Brief Article May 1, 2002 205
Home on the page. (News and Trends). Apr 1, 2002 1041
Patriot's international implications: The USA Patriot Act expanded the definition of "protected computers" to include any outside the U.S. where communications pass through a U.S.-based network. (Tech Talk). Piazza, Peter Apr 1, 2002 518
NIST releases raft of resources. (Tech Talk). Piazza, Peter Brief Article Apr 1, 2002 360
Computer Security Issues in Libraries. (Library & Information Sciences). Ferrer, Daniel Fidel; Mead, Mary Brief Article Mar 22, 2002 203
Gartner survey examines consumers' attitudes to online fraud. Brief Article Mar 5, 2002 135
Spamming gets a closer look: the U.S. government is taking more action than other countries against unwanted e-mail. (Capital edge: legislative & regulatory update). Tillman, Bob Mar 1, 2002 2702
FIGHT AGAINST FRAUD: ITALY CHALLENGES APPOINTMENT OF ITS MAGISTRATES TO OLAF. Feb 27, 2002 434
Tough on the causes of crime. Interview Feb 10, 2002 2311
Spam I Am!--The proliferation of junk e-mail: No matter how you slice it, it can be annoying and hinder your productivity. (Internet Waves). Kennedy, Shirley Duglin Feb 1, 2002 2245
Poison pen e-mail: A newly discovered vulnerability makes it possible for a hacker to send e-mail to a computer without the user's knowledge. (Tech Talk). Piazza, Peter Feb 1, 2002 694
Missing policies. (Quick Bytes). Brief Article Feb 1, 2002 88
Government infosec gets failing grade. (Tech Talk). Piazza, Peter Brief Article Feb 1, 2002 395
Security alert! If you've ever made these statements, you may be living in a techno-fool's paradise. Beckett, Dan Feb 1, 2002 439
Protecting Information on Laptops, PDAs, and Cell Phones. Frank, Kimberly E.; Charron, David Jan 1, 2002 3003
Advanced cybertraining courses made available. (Tech Talk). Piazza, Peter Brief Article Jan 1, 2002 197
Twenty questions on e-commerce security. (The CPA in industry). Tribunella, Thomas Statistical Data Included Jan 1, 2002 2020
Keeping Hackers away with personal firewalls. (Personal computing). Goldsborough, Reid Brief Article Dec 1, 2001 812
Security Breach: Wireless Networks Less Than Secure. (Tech Talk). Platis, Athena Nov 1, 2001 1817
Ann Landers and the Name Thieves. Castelluccio, Michael Brief Article Oct 1, 2001 1012
CLOSING THE STABLE DOOR BEFOREHAND. Brief Article Oct 1, 2001 541
Preventing Fraud. Curtin, Leah; Simpson, Roy L. Oct 1, 2001 624
Ashcroft Antes Cybercrime CHIPs. PIAZZA, PETER Brief Article Oct 1, 2001 355
Hurdles to Cyberjustice. PIAZZA, PETER Brief Article Aug 1, 2001 346
National Science Foundation Grant to Help Take a Byte Out of Cybercrime. Brief Article Jun 25, 2001 210
Hong Kong Policies Cybercrime. Brief Article May 1, 2001 166
E-Business Fraud Fighters Unite. PIAZZA, PETER Brief Article May 1, 2001 330
Computer Security in the Age of the Internet. Reardon, Timothy E. Mar 22, 2001 1347
FraudHalt Hologram Verification System. Mar 1, 2001 551
Computer crime. ANDERSON, TERESA Brief Article Feb 1, 2001 117
Net Force. Greeley, Jim Brief Article Feb 1, 2001 1035
Pass masters. Brief Article Feb 1, 2001 177
www.hackerheaven.edu. WRIGHT, SCOTT W. Jan 22, 2001 2879
Waive Goodbye to Liability. Bumgarner, John N. Jan 1, 2001 1925
FBI to Industry: Share Your Pain. Brief Article Dec 1, 2000 481
15 million [pounds sterling] boost for e-fraud projects. Prickett, Ruth Brief Article Nov 1, 2000 402
Protecting Children on the Electronic Frontier A Law Enforcement Challenge. PARSONS, MATT Oct 1, 2000 2395
Protecting trade secrets is necessary part of smart business. BERGER, C. JAYE Brief Article Aug 9, 2000 1037
Requirements for E-business Security. Aug 1, 2000 1735
Anonymity and the Internet. Johnson, Dan Brief Article Jul 1, 2000 510
Who's Watching? Castelluccio, Michael Jul 1, 2000 1030
US GOVT. "CYBER MOD SQUAD" SEEKS TO DISARM CYBER TERRORISTS. Jun 26, 2000 292
Putting Sites to the Test. Brief Article Jun 1, 2000 251
Cyber SWAT Team in the Works. Brief Article Jun 1, 2000 170
Hacked Off. Taylor, Jeff A. Brief Article May 1, 2000 415
Hack Work. Williams, Jason Apr 17, 2000 2415
Locking them out. Williams, Jason Brief Article Apr 17, 2000 150
INTRUSION DETECTION SYSTEMS AND MULTISENSOR DATA FUSION. BASS, TIM Apr 1, 2000 3857
Web Site Insurance. Brief Article Apr 1, 2000 110
Ten Commandments for safe and sane connectivity. Rohan, Rebecca Brief Article Mar 1, 2000 854
International Chamber of Commerce. Brief Article Mar 1, 2000 96
Just Say No. Jan 1, 2000 90
Security Alliance. Jan 1, 2000 92
Fighting Back Against Online Predators. NEELEY, DEQUENDRE Brief Article Dec 1, 1999 716
Selecting a Site for the Software Sentry. WOOD, MARK Dec 1, 1999 1864
New Breed of Crime. Sullivan, Laura Brief Article Nov 1, 1999 197
Cyberfraud and Computer Crime. Cheney, Glenn Nov 1, 1999 2605
Here come the IT muggers. Nevin, Tom Nov 1, 1999 777
Hire thine enemy? Neeley, Dequendre Sep 1, 1999 846
Technical triage on virus risks. Jacobs, Richard Sep 1, 1999 3176
Welcome ... you've got security. Neeley, Dequendre Sep 1, 1999 3359
BLACK HOLE OF FRAUD ANDECEPTION. Jun 1, 1999 302
Send the Cypercops. EPSTEIN, JACK May 1, 1999 993
How to avoid getting caught in the Net. Ringle, Bill Statistical Data Included Mar 22, 1999 1039
30 essential steps to take right now to prevent online crime. Janal, Daniel Mar 1, 1999 1607
Detecting computer fraud. Corbitt, Terry Dec 1, 1998 867
Crime prevention and the electronic frontier. Parsons, Matt Oct 1, 1998 1922
Clipping encryption. Henderson, Rick May 1, 1998 883
The growing threat of computer crime in small businesses. Doney, Lloyd D. May 1, 1998 3431
There are spies - and hackers - among us. Haapaneimi, Peter Feb 15, 1998 1133
A picture hides a thousand words. Neeley, DeQuendre Feb 1, 1998 431
Attendees win big at the Loss Prevention Department's Business Credit Fraud Symposium. Feb 1, 1998 1961
Better safe than sorry. Schperberg, Robert; Larson, Jeanie; Schperberg, Dee Aug 1, 1997 2337
Crime, fraud & cyberspace: common sense and the use of anti-virus software can help take a bite out of sinister cybercrime. Corbett, Merlisa Lawrence Jul 1, 1997 1265
Locking out the bad guys. Baker, Dean Jul 1, 1997 1341
Protecting against cyberfraud. Deering, Ann Dec 1, 1996 715
Computer crime: an emerging challenge for law enforcement. Katz, Andra J. Dec 1, 1996 4337
The new guerrilla warfare. Hardy, Stephen M. Sep 1, 1996 4064
Overcoming obstacles: preparing for computer-related crime. Groover, Richard S. Aug 1, 1996 1413
Crime in cyberspace. Stephens, Gene Sep 1, 1995 3070
Avoid swindles on the information highway. Brief Article Aug 1, 1995 460
Computer fraud - what can be done about it? Romney, Marshall May 1, 1995 2929
Secure and competitive intelligence, on and off the Internet. Lunin, Lois F. Mar 1, 1995 1411
Thermal imaging puts new face on access control problem. Koprowski, Gene Feb 1, 1995 880
Expectations of security and privacy. Neumann, Peter G. Column Sep 1, 1994 730
The enemy within. Nov 1, 1992 250
Is a hacker hovering in your horoscope? Kirvan, Paul Column Nov 1, 1992 795
A password to computer security. Goldfarb, Michael G. Jul 1, 1992 1249
Locking up open systems. Crawford, Paul Feb 1, 1992 2839
Networked for crime. Nickell, Daniel B. Dec 1, 1991 2040
Keeping computers safe. Icove, David J. Dec 1, 1991 2141
Revisiting computer security in the business world. Wilkes, Maurice V. Aug 1, 1991 2179
Computer security in the business world. Wilkes, Maurice V. Apr 1, 1990 1927
Computer systems on the brink of destruction. Leverett, E.J., Jr.; Powell, Brenda F. Nov 1, 1989 2648
Take it from the top. Wade, James R. Mar 1, 1989 1582
The perils of personal computers. Foster, Al; Schweitzer, James A. Mar 1, 1989 1059
Members only. Pritzker, Richard Mar 1, 1989 1547
Cloak and data. Baum, Ronald J. Mar 1, 1989 901
Who goes there? Mayfield, Charles Mar 1, 1989 1873
Computer viruses: checklist for recovery. Aucoin, Roger F. Feb 1, 1989 2235
Security for Lotus files. Machalow, Robert Feb 1, 1989 1545

Terms of use | Privacy policy | Copyright © 2021 Farlex, Inc. | Feedback | For webmasters