Personal tools

Did you not find what you were looking for? Try the Advanced Search to refine your search.

Search results 14 items matching your search terms

Subscribe to an always-updated feed of these search terms

Protection of Data and Prevention: Advice for Chief Executive Officers, Managers, and Information Technology Staff
You and your people are both the problem and the solution.
protection-prevention.pdf
mobile-isc2.pdf
Mobile Devices: Evidentiary Gold Mine or Empty Mine Shaft?
A discussion of the capabilities and limitations of mobile device analysis.
Discovery Beyond Documents
Using Science to Combat Data Loss: Analyzing Breaches by Type and Industry
The Next Twenty-Five Years in Computer Science
Anatomy of Online Fraud
Electronic Evidence in Criminal Defense
Spying on Spyware
What exactly is spyware? How does it work? What is its impact on users---and the businesses that employ them?
Understanding Information Assurance Services
Infosec: Friend or Foe?
Incident Handling: When the Breach Occurs
Interhack Framework used for California Attorney General's Data Breach Report
California Attorney General released 2012 Data Breach Report using Interhack founder C. Matthew Curtin and visiting scientist Lee Ayres' taxonomy of data loss ...