[go: up one dir, main page]

Oliva, 2004 - Google Patents

Reference Materials

Oliva, 2004

Document ID
15874650666724145968
Author
Oliva L
Publication year
Publication venue
Information Technology Security: Advice from Experts

External Links

Snippet

Thank you for inviting me here today to testify on the topic,“Fighting Fraud: Improving Information Security.” Holding this hearing demonstrates your commitment to improving the security of our Nation's information systems and this committee's leadership on this issue in …
Continue reading at www.igi-global.com (other versions)

Similar Documents

Publication Publication Date Title
Bhusal Systematic review on social engineering: Hacking by manipulating humans
Sinrod et al. Cyber-crimes: A practical approach to the application of federal computer crime laws
Clark et al. Untangling attribution
Jenab et al. Cyber Security Management: A Review.
Wadhwa et al. A Review on Cyber Crime: Major Threats and Solutions.
Minnaar 'Crackers', cyberattacks and cybersecurity vulnerabilities: the difficulties in combatting the'new'cybercriminals
Watkins et al. Hack the stack: Using snort and ethereal to master the 8 layers of an insecure network
Newman Cybercrime, identity theft, and fraud: practicing safe internet-network security threats and vulnerabilities
Mammeri Cryptography: Algorithms, protocols, and standards for computer security
West Preventing system intrusions
Assing et al. Mobile access safety: Beyond BYOD
DeNardis A history of internet security
Thangamuthu et al. Cybercrime
Rana et al. Honeypots in digital economy: an analysis of intrusion detection and prevention
Dmitrieva I Know It When I See It: Should Internet Providers Recognize Copyright Violation When They See It?
Roy Role of cyber law and its usefulness in Indian IT industry
Oppitz et al. Security and privacy challenges
Al-Shebami et al. Wireless LAN security
SOX This White Paper
Bottino Security Measures in a secure computer communications architecture
Oliva Reference Materials
Mohseni Network Security for Small Businesses
Reuvid The Secure Online Business Handbook: A Practical Guide to Risk Management and Business Continuity
Reuvid The Secure Online Business Handbook: e-commerce, IT functionality & business continuity
Wen et al. Internet security: a case study of firewall selection