Spring 2010 TECH 581E CIT Security Topics
Welcome to the spring edition of CIT Security Topics. For those of you wondering the topics for the course this semester will be as follows: How to survive and other myths of graduate school Spying,...
View ArticleTECH 581 E – Module 3: Spying, dataveilance, other tomfoolery you don’t know...
Where have we been? What are the effects of massive surveillance programs on society, but more importantly for our purposes on the enterprise? Companies use data mining and dataveillance technologies...
View ArticleCyber conflict and transnational cyber crime CNIT 58100 CFT
Course Description: This course will examine the spectrum of conflict from crime through cyber warfare. Specific case studies of transnational cyber crime and organizations engaged in such activities...
View ArticleCyber forensics of mobile and embedded devices CNIT 58100 CFM
Course Description: Consumer technologies are rapidly moving forward with items integrating processing, storage, and transmission into their base functionality. The enterprise issues with bring your...
View ArticleExamples of pre-history (before 1980) high technology attacks
The following are all from the very excellent book on high tech crime written in the late 1970s. I reviewed this book awhile back. Whiteside, Thomas, “Computer Capers: Tales of electronic thievery,...
View Article
More Pages to Explore .....