SEARCH THE HSDL
Searching for terms: ALL (Cyber AND Crime) in: title or summary
Set an Alert to get future results
Results 31 - 60 (of 220) sorted by relevance sort by date
Only 2/3! You are seeing results from the Public Collection, not the complete Full Collection. Sign in to search everything (see eligibility).
-
Keep an Eye on North Korean Cyber-Crime as the COVID-19 Spreads
-
Computer Attack and Cyber Terrorism: Vulnerabilities and Policy Issues for Congress [October 17, 2003]Library of Congress. Congressional Research ServiceWilson, Clay2003-10-17
-
Impact of Alleged Russian Cyber AttacksU.S. Army Command and General Staff College. School of Advanced Military StudiesAshmore, William C.2009-05-21
-
Remarks by Secretary Napolitano at the Global Cyber Security Conference [August 4, 2009]United States. Department of Homeland Security. Press Office2009-08-04
-
Defining Cyber and Focusing the Military's Role in CyberspaceArmy War College (U.S.)Mowery, Samuel P.2013-03
-
Cyber Warriors and the 'Jus in Bello'Naval War College (U.S.). International Law StudiesPadmanabhan, Vijay M.2013
-
2017 Internet Crime ReportInternet Crime Complaint Center (U.S.); United States. Federal Bureau of Investigation2018-05-07?
-
Cyber Border Security - Defining and Defending a National Cyber BorderNaval Postgraduate School (U.S.). Center for Homeland Defense and SecurityOsborn, Phillip2017-10
-
Audit of the Federal Bureau of Investigation's Implementation of Its Next Generation Cyber InitiativeUnited States. Department of Justice. Office of the Inspector General2015-07
-
Cyber Infrastructure Protection, Volume IIArmy War College (U.S.). Strategic Studies InstituteJordan, Louis H.; Saadawi, Tarek Nazir, 1951-; Boudreau, Vicent2013-05
-
U.S. Department of Homeland Security Cybersecurity StrategyUnited States. Department of Homeland Security2018-05-15
-
Law Enforcement Cyber Center [website]United States. Bureau of Justice Assistance; International Association of Chiefs of Police; Police Executive Research Forum . . .2014?
-
Serial No. 114-32: A Global Perspective on Cyber Threats, Hearing Before the Subcommittee on Oversight and Investigations of the Committee on Financial Services, U.S. House of Representatives, One Hundred Fourteenth Congress, First Session, June 16, 2015United States. Government Publishing Office2016
-
Video Games as a Training Tool to Prepare the Next Generation of Cyber WarriorsCarnegie-Mellon University. Software Engineering InstituteHerr, Christopher; Allen, Dennis2014
-
Cyber Threat Today: Major Attacks on the RiseUnited States. Federal Bureau of Investigation2008-10-17
-
2015 Internet Crime ReportUnited States. Federal Bureau of Investigation; Internet Crime Complaint Center (U.S.)2016?
-
Prospects for an International Cybersecurity RegimeUnited States Air Force Academy; USAF Institute for National Security StudiesHoldorf, Polly M.2015
-
S. Rept. 113-258: Inquiry into Cyber Intrusions Affecting U.S. Transportation Command Contractors, Report of the Committee on Armed Services, United States Senate, September 18, 2014United States. Government Printing Office2014-09-18
-
Taxonomies of Cyber Adversaries and Attacks: A Survey of Incidents and ApproachesLawrence Livermore National LaboratoryPowers, Shawn; Meyers, Carol; Faissol, Daniel2009-04
-
S. Hrg. 107-366: Improving Our Ability to Fight Cybercrime: Oversight of the National Infrastructure Protection Center: Hearing before the Subcommittee on Technology, Terrorism, and Government Information of the Committee on the Judiciary, United States Senate, One Hundred Seventh Congress, First Session, July 25, 2001United States. Government Printing Office2002
-
Readout of Secretary Napolitano's Meetings with Top European Officials [January 5, 2011]United States. Department of Homeland Security. Press Office2011-01-05
-
Cyberterrorism and Computer Crimes: Issues Surrounding the Establishment of an International Legal RegimeUSAF Institute for National Security StudiesAldrich, Richard W., 1959-2000-04
-
ABA Cybersecurity Legal Task Force [website]American Bar Association
-
U.S. Cybersecurity Defense AssessmentArmy War College (U.S.)Sherman, Darren C.2013-03
-
Strategies For Resolving The Cyber Attribution ChallengeAir University (U.S.). Air Force Research InstituteYannakogeorgos, Panayotis A.2013-05
-
International Cyber Security Conference Final ReportNational Defense University. Center for Technology and National Security PolicyBarry, Chuck; Lee, Lauren; Rewers, Marek2009-06
-
Serial No. 106-252: Computer Security: Cyber Attacks-War Without Borders: Hearing before the Subcommittee on National Security, Veterans Affairs, and International Relations of the Committee on Government Reform, House of Representatives, One Hundred Sixth Congress, Second Session, July 26, 2000United States. Government Printing Office2001
-
Headline Archive: 'Dark Market' Takedown: Exclusive Cyber Club for Crooks ExposedUnited States. Federal Bureau of Investigation2008-10-20
-
Serial No. 113-69: Assessing Persistent and Emerging Cyber Threats to the U.S. in the Homeland, Joint Hearing before the Subcommittee on Counterterrorism and Intelligence and the Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies of the Committee on Homeland Security, House of Representatives, One Hundred Thirteenth Congress, Second Session, May 21, 2014United States. Government Printing Office2014
-
Cyber Security Response to Physical Security Breaches