and Security Technologies

Results: 1110



#Item
111Risk / Probability / Safety / Actuarial science / Financial risk / Law enforcement / Prevention / Security / Mitigation

EUROSKY: Implementation of the Risk Assessment and New Technologies in the Cargo Aviation Security Chain CONTENTS • EUROSKY

Add to Reading List

Source URL: www.aerodays2015.com

Language: English - Date: 2015-10-30 06:29:33
112Security / Computing / E-commerce / Cybercrime / National security / Computer network security / Computer security / Cryptography / Symantec / Palantir Technologies / Kroll Inc.

Protection and Control over Financial Data 3rd JUNE 2013 London Stock Exchange Executive Report

Add to Reading List

Source URL: drmfsummit.com

Language: English - Date: 2015-11-03 18:11:53
113

OT partners with Mondaine to offer watch contactless payments Colombes, France, March 17, 2016 Oberthur Technologies (OT), a leading global provider of embedded security software products and services, today announced it

Add to Reading List

Source URL: www.oberthur.com

Language: English - Date: 2016-03-17 05:51:41
    114Computing / Security / 107th United States Congress / Patriot Act / Cloud computing / Search engine optimization / Computer security

    Customer Spotlight TM Patriot Technologies, Inc. provides secure, tailored hardware and software solutions to global customers. Patriot addresses all aspects of the technology

    Add to Reading List

    Source URL: www.contentmx.com

    Language: English - Date: 2015-11-30 12:40:31
    115

    OT’s WISE solution powers Swiss debit cards Colombes, France, May 26, 2016 OT (Oberthur Technologies), a leading global provider of embedded security software products and services, today announced the supply of its Wh

    Add to Reading List

    Source URL: www.oberthur.com

    Language: English - Date: 2016-05-26 08:25:41
      116

      Information and Communication Technologies (ICT), FET and Security Newsletter – February 2016 Israel Europe R&D Directorate, ICT-FET-Security, www.iserd.org.il Open ICT Calls 29 Objectives are no

      Add to Reading List

      Source URL: www.iserd.org.il

      Language: English - Date: 2016-02-17 02:41:32
        117Electric power / Energy / Electromagnetism / Security / Smart grid / Smart meter / Computer security / Phasor measurement unit / Automatic meter reading

        The eTWACS and Metrum Cellular Advantage Two Technologies, One Solution Maximize Advanced Metering Infrastructure for Electric Utilities Utilities face a daunting task when choosing a communications technology for

        Add to Reading List

        Source URL: www.aclara.com

        Language: English - Date: 2014-12-10 17:04:06
        118Cyberwarfare / Denial-of-service attacks / Computing / Internet Relay Chat / Cyberspace / Computer network security / Cybercrime / Denial-of-service attack / DDoS mitigation / Computer security / Neustar / Prolexic Technologies

        APRIL 2016 NEUSTAR DDOS ATTACKS & PROTECTION REPORT THE THREATSCAPE WIDENS: DDOS AGGRESSION AND THE EVOLUTION OF IOT RISKS INTRODUCTION

        Add to Reading List

        Source URL: ns-cdn.neustar.biz

        Language: English - Date: 2016-04-25 09:51:01
        119Mass surveillance / Privacy / Human rights / Crime prevention / Internet privacy / Total Information Awareness / Information Awareness Office / Surveillance / Personally identifiable information / Patriot Act / Policy appliances / Right to privacy

        Data Surveillance Countering Terrorism through Information and Privacy Protection Technologies Security and privacy aren’t dichotomous or conflicting

        Add to Reading List

        Source URL: www.eecs.harvard.edu

        Language: English
        120

        Using AI Techniques to improve Pentesting Automation Carlos Sarraute Core Security Technologies and Ph.D. program in Informatics Engineering, ITBA

        Add to Reading List

        Source URL: 2010.hackitoergosum.org

        Language: English - Date: 2010-04-16 11:10:57
          UPDATE