Crime Information Center

Results: 1325



#Item
11search_logo_2014_recreated.eps

search_logo_2014_recreated.eps

Add to Reading List

Source URL: www.ncjrs.gov

Language: English - Date: 2016-06-01 14:13:28
12The South Carolina General Assembly is offering access to the unannotated South Carolina Code of Laws on the Internet as a ser

The South Carolina General Assembly is offering access to the unannotated South Carolina Code of Laws on the Internet as a ser

Add to Reading List

Source URL: www.scstatehouse.gov

Language: English - Date: 2016-05-06 09:14:36
13New Mexico Sentencing Commission March 29, 2016 JISC  MINUTES

New Mexico Sentencing Commission March 29, 2016 JISC MINUTES

Add to Reading List

Source URL: nmsc.unm.edu

Language: English - Date: 2016-07-13 11:44:54
14Consultation Survey Responses of the International Center for Law & Economics Case Id: 87923cf7-6b3d-487c-b945-0a1fc4004811 In the Matter of: The European Union Consultation Regarding the Regulatory Environment

Consultation Survey Responses of the International Center for Law & Economics Case Id: 87923cf7-6b3d-487c-b945-0a1fc4004811 In the Matter of: The European Union Consultation Regarding the Regulatory Environment

Add to Reading List

Source URL: laweconcenter.org

Language: English - Date: 2016-01-11 17:53:56
15Classification: CJIS Program Supervisor Title Code: V00680 Pay Range: 26 POSITION SUMMARY: This is a highly professional and technical supervisory position responsible for monitoring assigned shift

Classification: CJIS Program Supervisor Title Code: V00680 Pay Range: 26 POSITION SUMMARY: This is a highly professional and technical supervisory position responsible for monitoring assigned shift

Add to Reading List

Source URL: www.mshp.dps.mo.gov

Language: English - Date: 2016-07-20 15:22:54
16Global Phishing Survey: Trends and Domain Name Use in 2H2014 Global Phishing Survey 2H2014: Trends and Domain Name Use

Global Phishing Survey: Trends and Domain Name Use in 2H2014 Global Phishing Survey 2H2014: Trends and Domain Name Use

Add to Reading List

Source URL: internetidentity.com

Language: English - Date: 2015-05-27 15:57:10
17Microsoft PowerPoint - BBNS-GS NATO Capabilities Overview_December 14, 2015 v09 DM

Microsoft PowerPoint - BBNS-GS NATO Capabilities Overview_December 14, 2015 v09 DM

Add to Reading List

Source URL: www.cybersecurity.cz

Language: English - Date: 2016-04-17 12:12:36
18IoT Safety/Security Design Tutorial - Important Points to be understood by Software Developers toward the Smart-society -  The Software Reliability Enhancement Center, Technology Headquarters,

IoT Safety/Security Design Tutorial - Important Points to be understood by Software Developers toward the Smart-society - The Software Reliability Enhancement Center, Technology Headquarters,

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2016-07-29 00:53:32
19This paper appears at the 24th USENIX Security SymposiumInvestigating the Computer Security Practices and Needs of Journalists Susan E. McGregor Tow Center for Digital Journalism Columbia Journalism School

This paper appears at the 24th USENIX Security SymposiumInvestigating the Computer Security Practices and Needs of Journalists Susan E. McGregor Tow Center for Digital Journalism Columbia Journalism School

Add to Reading List

Source URL: www.franziroesner.com

Language: English - Date: 2015-06-29 14:09:16
20U. S. Department of Justice Federal Bureau of Investigation Criminal Justice Information Services Division Criminal Justice Information Services (CJIS) Security Policy

U. S. Department of Justice Federal Bureau of Investigation Criminal Justice Information Services Division Criminal Justice Information Services (CJIS) Security Policy

Add to Reading List

Source URL: kentuckystatepolice.org

Language: English - Date: 2016-06-22 13:33:27