and Security Technologies

Results: 1110



#Item
171

Shaping Ideas to Shape the Future Competence, security and new business areas Results of the third phase of the international study “Prospects and Opportunities of Information and Communication Technologies (ICT) and M

Add to Reading List

Source URL: www.tns-infratest.com

Language: English - Date: 2011-05-11 10:23:25
    172

    The National Security Agency invites you to attend The 2nd Annual NSA Trusted Computing Conference and Exposition September 20-22, 2011 Orlando, Florida The theme for the year’s event is “Using COTS Technologies to D

    Add to Reading List

    Source URL: www.nsa.gov

    Language: English - Date: 2011-07-08 09:43:11
      173

      2013 IEEE Security and Privacy Workshops How Usage Control and Provenance Tracking Get Together - A Data Protection Perspective Christoph Bier Fraunhofer Institute of Optronics, System Technologies and Image Exploitatio

      Add to Reading List

      Source URL: www.ieee-security.org

      Language: English - Date: 2013-05-05 16:04:42
        174

        2013 IEEE Security and Privacy Workshops How Usage Control and Provenance Tracking Get Together - A Data Protection Perspective Christoph Bier Fraunhofer Institute of Optronics, System Technologies and Image Exploitatio

        Add to Reading List

        Source URL: ieee-security.org

        Language: English - Date: 2013-05-05 16:04:42
          175

          In Mobile Security Technologies (MoST), San Francisco, MayGuarDroid: A Trusted Path for Password Entry Tianhao Tong and David Evans University of Virginia [tt4cc, evans]@virginia.edu

          Add to Reading List

          Source URL: www.mostconf.org

          Language: English - Date: 2013-04-20 02:55:32
            176

            No Faustian Pact: Balancing Privacy and Security The rapid increase of Information and Communication Technologies (ICT) has thoroughly changed the debate on security and privacy concerns. Criminals, terrorists, corporati

            Add to Reading List

            Source URL: www.thehaguesecuritydelta.com

            Language: English - Date: 2014-02-12 14:16:19
              177

              ™ SECURITY PROFILE FOR WIND RIVER LINUX Open source software has been gaining ground, with increasing use in the quickly evolving devices and technologies of today. As the embedded Linux footprint continues to expand,

              Add to Reading List

              Source URL: www.windriver.com

              Language: English - Date: 2015-06-05 15:32:47
                178

                No Faustian Pact: Balancing Privacy and Security The rapid increase of Information and Communication Technologies (ICT) has thoroughly changed the debate on security and privacy concerns. Criminals, terrorists, corporati

                Add to Reading List

                Source URL: static.hcss.nl

                Language: English - Date: 2014-02-13 05:04:44
                  179

                  Biogas Resources, Technologies and Cost Dr Jerry Murphy, BioEnergy and Biofuels Research, Environmental Research Institute, UCC Energy Systems Modelling Addressing Energy Security and Climate Change

                  Add to Reading List

                  Source URL: iea-etsap.org

                  Language: English - Date: 2010-12-02 06:12:11
                    180Transport / Economy of Germany / Companies listed on the New York Stock Exchange / Loral Space & Communications / Loral Corporation / Lockheed Martin Transportation & Security Solutions / Siemens IT Solutions and Services / Technology / Siemens / Lockheed Martin

                    Judy Marks President & Chief Executive Officer, Siemens Government Technologies, Inc. Biography Judith (Judy) F. Marks joined Siemens in May 2011, and serves as President and Chief Executive Officer of

                    Add to Reading List

                    Source URL: www.siemens-foundation.org

                    Language: English - Date: 2015-03-16 17:06:24
                    UPDATE