Security breaches

Results: 272



#Item
221Order Code RL33199  Data Security Breaches: Context and Incident Summaries  Updated May 7, 2007

Order Code RL33199 Data Security Breaches: Context and Incident Summaries Updated May 7, 2007

Add to Reading List

Source URL: ipmall.info

Language: English - Date: 2007-06-05 19:06:15
222Order Code RL33199  Data Security Breaches: Context and Incident Summaries  Updated March 21, 2007

Order Code RL33199 Data Security Breaches: Context and Incident Summaries Updated March 21, 2007

Add to Reading List

Source URL: ipmall.info

Language: English - Date: 2007-04-24 18:22:09
223   Activity Risk Intelligence Behavior based signature-less technique to detect data breaches

  Activity Risk Intelligence Behavior based signature-less technique to detect data breaches

Add to Reading List

Source URL: www.securonix.com

Language: English - Date: 2012-04-04 12:33:39
224Identity Theft Resource Center 2012 Breach List: Breaches: 470 Exposed: 17,491,690  Report Date:

Identity Theft Resource Center 2012 Breach List: Breaches: 470 Exposed: 17,491,690 Report Date:

Add to Reading List

Source URL: www.idtheftcenter.org

Language: English - Date: 2013-07-02 11:39:27
225SUPERIOR COURT 2006 Annual Report Statistical Information 683(5,25&2857  1HZ&DVWOH&RXQW\

SUPERIOR COURT 2006 Annual Report Statistical Information 683(5,25&2857 1HZ&DVWOH&RXQW\

Add to Reading List

Source URL: www.courts.delaware.gov

Language: English - Date: 2010-08-02 10:05:11
    226Vertical Insight[removed]Data Breach Investigations Report MANUFACTURING Data breaches can be

    Vertical Insight[removed]Data Breach Investigations Report MANUFACTURING Data breaches can be

    Add to Reading List

    Source URL: www.verizonenterprise.com

    Language: English - Date: 2014-05-12 20:00:00
    227Order Code RL33199  CRS Report for Congress Received through the CRS Web  Data Security Breaches:

    Order Code RL33199 CRS Report for Congress Received through the CRS Web Data Security Breaches:

    Add to Reading List

    Source URL: ipmall.info

    Language: English - Date: 2006-11-05 21:58:00
    228UN Security Council Resolution 1540: Monitoring and Detecting Breaches in Biosecurity & Illicit Trafficking of BW-Related Materials Dana Perkins, PhD 1540 Committee Expert Biological Weapons Convention Meeting of States

    UN Security Council Resolution 1540: Monitoring and Detecting Breaches in Biosecurity & Illicit Trafficking of BW-Related Materials Dana Perkins, PhD 1540 Committee Expert Biological Weapons Convention Meeting of States

    Add to Reading List

    Source URL: www.un.org

    Language: English - Date: 2013-12-27 16:32:01
    229Multi-agent systems / Botnets / Cyberwarfare / Zeus / Zombie / Malware / Computer crime / Email spam / Click / Computer network security / Computing / Spamming

    From the Desk of [Insert Name Here] What are Bots, Botnets and Zombies? You have probably heard terms such as “bots,” “zombies,” and “botnets” in recent news stories about data breaches and other cyber secur

    Add to Reading List

    Source URL: msisac.cisecurity.org

    Language: English - Date: 2014-06-27 11:15:13
    2309 GCA CRIMES AND CORRECTIONS CH. 48 NOTIFICATION OF BREACHES OF PERSONAL INFORMATION CHAPTER 48 NOTIFICATION OF BREACHES OF PERSONAL INFORMATION SOURCE: This entire chapter added by P.L[removed]:1 (Mar. 13, 2009).

    9 GCA CRIMES AND CORRECTIONS CH. 48 NOTIFICATION OF BREACHES OF PERSONAL INFORMATION CHAPTER 48 NOTIFICATION OF BREACHES OF PERSONAL INFORMATION SOURCE: This entire chapter added by P.L[removed]:1 (Mar. 13, 2009).

    Add to Reading List

    Source URL: www.guamcourts.org

    Language: English - Date: 2011-08-30 21:39:41