SEARCH THE HSDL

Advanced search    Help

Searching for terms: ALL (Cyber AND Crime)   in: title or summary

Set an Alert to get future results

Results  121 - 150 (of 220)          sorted by relevance     sort by date

Clear all search criteria

Only 2/3! You are seeing results from the Public Collection, not the complete Full Collection. Sign in to search everything (see eligibility).

  • Fact Sheet: Cybersecurity National Action Plan [February 9, 2016]
    United States. Office of the White House Press Secretary
    2016-02-09
  • Executive Order 13694: Blocking the Property of Certain Persons Engaging in Significant Malicious Cyber-Enabled Activities
    United States. Office of the Federal Register
    Obama, Barack
    2015-01-01
  • S. Hrg. 106-839: Cyber Attacks: Removing Roadblocks to Investigation and Information Sharing: Hearing before the Subcommittee on Technology, Terrorism, and Government Information of the Committee on the Judiciary, United States Senate, One Hundred Sixth Congress, Second Session on Examining the Incidence of Cyber Attacks on the Nation's Information Systems, Focusing on Removing Roadblocks to Investigation and Information Sharing, March 28, 2000
    United States. Government Printing Office
    2001
  • Using Partnerships to Combat Cyber Threats
    United States. Federal Bureau of Investigation
    Mueller, Robert S., III, 1944-
    2010
  • Remarks as delivered by James R. Clapper, Director of National Intelligence: Worldwide Threat Assessment to the Senate Select Committee on Intelligence, Wednesday, January 29, 2014
    United States. Congress. Senate. Select Committee on Intelligence
    2014-01-29
  • Current and Projected National Security Threats Against the United States, Hearing before the U.S. Senate Select Committee on Intelligence, One Hundred Thirteenth Congress, Second Session, January 29, 2014
    United States. Congress. Senate. Select Committee on Intelligence
    2014-01-29
  • Our National Information Infrastructure: An Immediate Strategic Concern in National Security Policy
    Army War College (U.S.)
    Hamilton, Brian
    2004-05-03
  • Framework for Establishing Critical Infrastructure Resilience Goals: Final Report and Recommendations by the Council
    National Infrastructure Advisory Council (U.S.)
    2010-10-19
  • Cybersecurity: Threats to the Financial Sector, Hearing Before the Subcommittee on Financial Institutions and Consumer Credit of the Committee on Financial Services, U.S. House of Representatives, One Hundred Twelfth Congress, First Session, September 14, 2011
    United States. Government Printing Office
    2012
  • H. Rept. 107-497: Cyber Security Enhancement Act of 2002, Report to Accompany H.R. 3482, June 11, 2002
    United States. Government Printing Office
    2002-06-11
  • Readout of Deputy Secretary Mayorkas' Visit to Greece [June 25, 2014]
    United States. Department of Homeland Security. Press Office
    2014-06-25
  • China's Position on the Sony Attack: Implications for the U.S. Response
    U.S.-China Economic and Security Review Commission
    Wilson, Jordan
    2015-01-14
  • FBI Law Enforcement Bulletin: January 2014
    United States. Federal Bureau of Investigation
    2014-01
  • Our National Information Infrastructure; An Immediate Concern in National Security Policy
    Army War College (U.S.)
    Hamilton, Brian P.
    2004-05-03
  • Overview of U.S. Sanctions Regimes on Russia [January 11, 2017]
    Library of Congress. Congressional Research Service
    Welt, Cory; Rennack, Dianne E.
    2017-01-11
  • Test Results for Mobile Device Acquisition Tool: Guidance Software Neutrino 1.4.14
    United States. Office of Justice Programs
    2008-10
  • Test Results for Mobile Device Acquisition Tool: Mobilyze 1.1
    National Institute of Justice (U.S.)
    2011-01
  • Test Results for Mobile Device Acquisition Tool: iXAM Version 1.5.6
    National Institute of Justice (U.S.)
    2010-12
  • Test Results for Mobile Device Acquisition Tool: Zdziarski's Method
    National Institute of Justice (U.S.)
    2010-12
  • Common Sense Guide to Prevention and Detection of Insider Threats
    United States. Department of Homeland Security
    2005
  • Cybercrime: Can a Small Business Protect Itself, Forum before the Committee on Small Business, United States Senate, One Hundred Sixth Congress, Second Session, March 9, 2000
    United States. Government Printing Office
    2000
  • Ten Years After: The FBI Since 9/11, Factsheet on International Operations
    United States. Federal Bureau of Investigation
    2011
  • Remarks on the Security and Sustainability Partnerships for Shutting Down Black Markets and Dismantling Webs of Corruption and Criminality
    United States. Department of State
    Luna, David M.
    2014-10-08
  • Test Results for Mobile Device Acquisition Tool: CelleBrite UFED 1.1.3.3-Report Manager 1.6.5
    National Institute of Justice (U.S.)
    National Institute of Standards and Technology (U.S.). Office of Law Enforcement Standards
    2010-10
  • X-Ways Forensics v18.8: Test Results for Disk Imaging Tool
    United States. Department of Homeland Security. Science and Technology Directorate
    2016-10-14
  • Test Results for Disk Imaging Tool: Falcon-NEO Version 1.1
    United States. Department of Homeland Security. Science and Technology Directorate
    2018-10-20
  • Test Results for Disk Imaging Tool: Guymager Version 0.8.1
    United States. Department of Homeland Security. Science and Technology Directorate
    2016-10-14
  • Test Results for Disk Imaging Tool: Cinolink Dual HDD Dock
    United States. Department of Homeland Security. Science and Technology Directorate
    2020-06
  • Test Results for Disk Imaging Tool: Roadkil's Disk Image Version 1.6
    United States. Department of Homeland Security. Science and Technology Directorate
    2020-06
  • Test Results for Disk Imaging Tool: DFAS Pro Version 1.0.1.6 Build 052
    United States. Department of Homeland Security. Science and Technology Directorate
    2019-04-21
      1   2   3   4   5   6   7   8