Description
Metadata
Settings
owl:sameAs
Inference Rule:
b3s
b3sifp
facets
http://www.w3.org/2002/07/owl#
ldp
oplweb
skos-trans
virtrdf-label
None
About:
Computer crime
Sponge
Permalink
An Entity of Type :
owl:Thing
, within Data Space :
dbkwik.org
associated with source
dataset(s)
Attributes
Values
rdfs:label
Computer crime
is
dcterms:subject
of
Computer crime
Computer forgery
Nontargeted attack
Threat
Crime, Abuse, and the Computer: The Problem and the Federal Experience
Arab Convention on Combating Information Technology Offences
Auction fraud-Romania
U.S. v. Morris
First National Invitational Conference on Computer Abuse
Data diddling
Physical attack
Assessing Technology, Methods, and Information for Committing and Combating Cyber Crime
Financial institution
International Association of Computer Investigative Specialists
Los Alamos National Laboratory
High-technology crime
Electronic Fund Transfer and Crime
Anti-Phishing Working Group
Hacker
National Software Reference Library
Sexually oriented spam
Computer invasion of privacy
Computer Misuse
High-tech crime
Federal Computers and Telecommunications, Security and Reliability Considerations, and Computer Crime Legislative Options
Malicious Communications Act 1988
Computer Crime: Criminal Justice Resource Manual
External threat
Counterfeit cashier's check
Script kiddie
Computer trespass
Password Guessing
Scores virus
Prosecuting Computer Crimes
Electronic Crimes Task Forces
People v. Weg
Computer Operation
Federal Government Information Technology: Management, Security, and Congressional Oversight
Port scanning
Computer Crimes Task Force
Crimeware
Unauthorized access
U.S. v. Seidlitz
Virginia Computer Crimes Act
Guide to the Prosecution of Telecommunication Fraud by the Use of Computer Crime Statutes
Loss
Computer Crime Enforcement Act
LoveLetter worm
Australian High Tech Crime Centre
Phisher
Buffer overflow
Carderplanet
Session hijacking
Cyber threat
Vishing
Random attack
Malware
Salami technique
Vector
Data breach
Agora
Wire fraud
SQL injection vulnerability
Masquerader
Email redirector
Computer-related crimes
Problems Associated With Computer Technology in Federal Programs and Private Industry
IP redirecting
Network scanner
Insider threat
Internet extortion
R v Gold & Schifreen
Rapid Enforcement Allied Computer Team
Computer Crime: Legislative Resource Manual
National Institute of Justice
Escrow fraud
Phreaking
Threats to Computer Systems: Final Report
CIH (Chernobyl) virus
Cybercriminal
IT crime
Internet fraud
Reflection attack
Without authority
Altered
Air Force Rome Lab
Disgruntled insider
Infect
Computer criminal
Attacker
Attack program
ECrime Unit
Computer Forensics Tool Testing
Office of Computer Investigations and Infrastructure Protection
State v. Moran
High Tech Crime Consortium
Organizing for Computer Crime Investigation and Prosecution
Department of Justice
Solar Sunrise
◂◂ First
◂ Prev
Next ▸
Last ▸▸
Page 1 of 4
Go
Alternative Linked Data Views:
ODE
Raw Data in:
CXML
|
CSV
| RDF (
N-Triples
N3/Turtle
JSON
XML
) | OData (
Atom
JSON
) | Microdata (
JSON
HTML
) |
JSON-LD
About
OpenLink Virtuoso
version 07.20.3217, on Linux (x86_64-pc-linux-gnu), Standard Edition
Data on this page belongs to its respective rights holders.
Virtuoso Faceted Browser Copyright © 2009-2012 OpenLink Software