Oliva, 2004 - Google Patents
Reference MaterialsOliva, 2004
- Document ID
- 15874650666724145968
- Author
- Oliva L
- Publication year
- Publication venue
- Information Technology Security: Advice from Experts
External Links
Snippet
Thank you for inviting me here today to testify on the topic,“Fighting Fraud: Improving Information Security.” Holding this hearing demonstrates your commitment to improving the security of our Nation's information systems and this committee's leadership on this issue in …
- 239000012925 reference material 0 title description 13
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Bhusal | Systematic review on social engineering: Hacking by manipulating humans | |
Sinrod et al. | Cyber-crimes: A practical approach to the application of federal computer crime laws | |
Clark et al. | Untangling attribution | |
Jenab et al. | Cyber Security Management: A Review. | |
Wadhwa et al. | A Review on Cyber Crime: Major Threats and Solutions. | |
Minnaar | 'Crackers', cyberattacks and cybersecurity vulnerabilities: the difficulties in combatting the'new'cybercriminals | |
Watkins et al. | Hack the stack: Using snort and ethereal to master the 8 layers of an insecure network | |
Newman | Cybercrime, identity theft, and fraud: practicing safe internet-network security threats and vulnerabilities | |
Mammeri | Cryptography: Algorithms, protocols, and standards for computer security | |
West | Preventing system intrusions | |
Assing et al. | Mobile access safety: Beyond BYOD | |
DeNardis | A history of internet security | |
Thangamuthu et al. | Cybercrime | |
Rana et al. | Honeypots in digital economy: an analysis of intrusion detection and prevention | |
Dmitrieva | I Know It When I See It: Should Internet Providers Recognize Copyright Violation When They See It? | |
Roy | Role of cyber law and its usefulness in Indian IT industry | |
Oppitz et al. | Security and privacy challenges | |
Al-Shebami et al. | Wireless LAN security | |
SOX | This White Paper | |
Bottino | Security Measures in a secure computer communications architecture | |
Oliva | Reference Materials | |
Mohseni | Network Security for Small Businesses | |
Reuvid | The Secure Online Business Handbook: A Practical Guide to Risk Management and Business Continuity | |
Reuvid | The Secure Online Business Handbook: e-commerce, IT functionality & business continuity | |
Wen et al. | Internet security: a case study of firewall selection |