Back to Results
First PageMeta Content
Crime prevention / Computer network security / Computer crimes / Information technology audit / Hacking / Computer security / Computer fraud / Computer insecurity / Federal Bureau of Investigation / Security / National security / Cybercrime


Harvard Journal o f Law & Technology V o l u m e 11, N u m b e r 3 S u m m e r[removed]PRIVATE INTRUSION RESPONSE
Add to Reading List

Document Date: 2011-02-11 21:39:00


Open Document

File Size: 1,77 MB

Share Result on Facebook

City

Washington / D.C. / Rome / Columbus / London / /

Company

After Citibank / Citibank / Reuters / WarRoom Research LLC / /

Continent

America / /

Country

United States / /

Currency

USD / /

Facility

Carnegie Mellon University / Catholic University of America / University College of Law / Computer Security Institute / /

IndustryTerm

transportation / bank / compromised systems / /

Organization

Congress / Harvard / Catholic University of America / Carnegie Mellon University / National Aeronautics and Space Administration / Department of Defense / Federal Bureau of Investigation / /

Person

Sharon Walsh / Anne W. Bransenmb / Stevan D. Mitchell / Sector Capabilities / Kyi / Mathew Bevan / David Bernstein / Robert O'Harrow Jr. / Michael P. Dierks / Jamie S. Gorelick / Robert L. Dunne / David L. Gripman / Stephen Farrell / William Perez / Janet Reno / Steptoe / Sam Nunn / /

Position

President / Major / Attorney General / forward / General Counsel / President / General / Private / Chief / Elizabeth A. Banker / /

ProgrammingLanguage

L / /

ProvinceOrState

Florida / A. B. / Washington / /

PublishedMedium

GUARDIAN / the Harvard Journal / /

Technology

information technology / /

SocialTag