Computer fraud

Results: 842



#Item
1Law & Technology: Evolving challenges as a result of fraud in E-commerce sector Computer  Online

Law & Technology: Evolving challenges as a result of fraud in E-commerce sector Computer Online

Add to Reading List

Source URL: gtw3.grantthornton.in

- Date: 2015-07-24 08:22:54
    2Authentication for Remote Voting Nathanael Paul David Evans Avi Rubin University of Virginia Johns Hopkins University Department of Computer Science Department of Computer Science

    Authentication for Remote Voting Nathanael Paul David Evans Avi Rubin University of Virginia Johns Hopkins University Department of Computer Science Department of Computer Science

    Add to Reading List

    Source URL: www.andrewpatrick.ca

    Language: English - Date: 2003-02-05 13:16:14
    3SPECIAL ISSUE: ICT AND SOCIAL CHALLENGES  YOU CAN’T BRIBE A COMPUTER: DEALING WITH THE SOCIETAL CHALLENGE OF CORRUPTION THROUGH ICT Shirish C. Srivastava Department of Operations Management and Information Technology,

    SPECIAL ISSUE: ICT AND SOCIAL CHALLENGES YOU CAN’T BRIBE A COMPUTER: DEALING WITH THE SOCIETAL CHALLENGE OF CORRUPTION THROUGH ICT Shirish C. Srivastava Department of Operations Management and Information Technology,

    Add to Reading List

    Source URL: www.misq.org

    Language: English - Date: 2016-02-25 14:03:50
    4Elections / Software / Computer file / Inter-process communication / Microsoft Excel / Zip / Voter registration / Computing / Electoral fraud

    Voter Registration Files This CD contains multiple compressed files containing voter registration information. The individual files are not created in a specific order, and provide information for active and inactive v

    Add to Reading List

    Source URL: coloradovoters.info

    Language: English - Date: 2015-12-02 11:17:29
    5F500 Retailer Case Study  AUTOMATED GIFT CARD FRAUD

    F500 Retailer Case Study AUTOMATED GIFT CARD FRAUD

    Add to Reading List

    Source URL: www.shapesecurity.com

    Language: English - Date: 2016-08-12 14:49:29
    6INTERNET ACCEPTABLE USE POLICY

    INTERNET ACCEPTABLE USE POLICY

    Add to Reading List

    Source URL: www.cumberlandcountypubliclibrary.org

    Language: English - Date: 2015-10-28 16:20:05
    7AN EMV MIGRATION FORUM WHITE PAPER  Near-Term Solutions to Address the Growing Threat of Card-Not-Present Fraud Version 2.0

    AN EMV MIGRATION FORUM WHITE PAPER Near-Term Solutions to Address the Growing Threat of Card-Not-Present Fraud Version 2.0

    Add to Reading List

    Source URL: www.emv-connection.com

    Language: English - Date: 2016-08-02 12:07:00
    8Technology Partnership Mobile Antivirus SDK About us A privately held security company founded in 2007 The best security team for “Online Fraud / ID Theft ” in the world

    Technology Partnership Mobile Antivirus SDK About us A privately held security company founded in 2007 The best security team for “Online Fraud / ID Theft ” in the world

    Add to Reading List

    Source URL: dl9.zemana.com

    Language: English - Date: 2016-06-10 10:05:32
    9July 11, 2016  Important: Fraudulent Activity, Scams, and Unauthorized Use of Nomura Brand Nomura continues to monitor all unauthorized use of the Nomura brand. Such unauthorized use can include email scams and other typ

    July 11, 2016 Important: Fraudulent Activity, Scams, and Unauthorized Use of Nomura Brand Nomura continues to monitor all unauthorized use of the Nomura brand. Such unauthorized use can include email scams and other typ

    Add to Reading List

    Source URL: www.nomuraholdings.com

    Language: English - Date: 2016-07-10 20:33:58
    10Januaryvigilant THE MONTHLY CARGO CRIME UPDATE FOR MEMBERS OF TAPA EMEA  PHARMA

    Januaryvigilant THE MONTHLY CARGO CRIME UPDATE FOR MEMBERS OF TAPA EMEA PHARMA

    Add to Reading List

    Source URL: www.tapaemea.org

    Language: English - Date: 2014-09-11 09:41:14