Back to Results
First PageMeta Content
Computer security / Cyberwarfare / Crime prevention / National security / Computer forensics / Certified Forensic Computer Examiner / Computer insecurity / Information security / Cyberterrorism / Cybercrime / Security / Computer crimes


Predators everywhere look for an opportunity to take advantage of innocent people at any given moment. Computers, in conjunction with the Internet, have given some of these predators a
Add to Reading List

Document Date: 2013-10-03 14:54:41


Open Document

File Size: 264,51 KB

Share Result on Facebook

Company

Dell / PC World / New Technologies Inc. / PHOTODISC INC. / Cisco / MCI / Electronic Data Systems / AOL / Regional Computer Forensics Laboratory / Yahoo / Microsoft / Earthlink / /

Country

United States / /

Currency

USD / /

Event

Person Travel / /

Facility

National Institute of Standards and Technology / Special pub / American InterContinental University / University of Maryland / Carnegie Mellon Software Engineering Institute / /

IndustryTerm

Internet Control Message Protocol / Internet The vast majority / high-tech crime / private sector computer forensic software developers / Internet / software tools / law enforcement community / Internet crime statistics summary / forensic imaging / node equipment / Internet fraud / software package / federal law / dynamic tools / law offices / security administration services / government services / technology changes / contractor services / information technology / government infrastructure / adequate security to its systems / e - commerce / Internet Forensics / Web server / information system technology / law enforcement / computing / computer systems management / information technology services / /

Organization

Information Technology Information Sharing and Analysis Center / United States Internet Crime Task Force / U.S. Homeland Security Department / University of Maryland / National Steering Committee / U.S. government / U.S. Department of Homeland Security / Federal Computer Incident Response Center / Federal Bureau of Investigation / United States Marine Corps / National Institute of Standards and Technology / Carnegie Mellon Software Engineering Institute / U.S. Department of Justice / United States Army / American InterContinental University / International Association of Computer Investigative Specialists / Department of Defense / International Association of Computer Investigative / United States Navy / International Information Systems Forensics Association / /

Person

Phillip D. Dixon / Bill Clinton / /

Position

infiltrator and security analyst / Specialist / author / contractor / information forensics investigator / Certified Information Forensics Investigator / CIO / analyst / The assistant director of the Investigative Technologies Division / systems specialist / /

ProvinceOrState

Virginia / Maryland / /

Region

U.S. / /

SportsLeague

International Association / /

Technology

peer-to-peer / Information Technology / html / pdf / encryption / information system technology / file sharing / http / Web server / /

URL

http /

SocialTag