and Security Technologies

Results: 1110



#Item
11

Artificial Intelligence Safety and Security Call for Book Chapters Introduction The history of robotics and artificial intelligence in many ways is also the history of humanity’s attempts to control such technologies.

Add to Reading List

Source URL: cecs.louisville.edu

- Date: 2017-03-14 14:23:27
    12

    INFORMATION AND CYBER SECURITY STRATEGY OF SRI LANKA SRI LANKA CERT|CC Preface Around the globe, digital technologies have evolved into a powerful economic tool that has improved quality of

    Add to Reading List

    Source URL: www.slcert.gov.lk

    - Date: 2018-02-09 00:46:39
      13

      Slack Technologies, Inc. System and Organization Controls (“SOC”) for Service Organizations: Trust Service Principles Report Relevant to Security, Availability, and Confidentiality Related to the Team Communication P

      Add to Reading List

      Source URL: a.slack-edge.com

      - Date: 2017-12-08 20:00:35
        14

        GCP/MaGNET Workshop Report IIASA, March 2-3, 2017 Land use related negative emission technologies (LUNETs) & their implications on food security and relevant SDGs 1

        Add to Reading List

        Source URL: www.cger.nies.go.jp

        - Date: 2017-05-01 22:15:03
          15

          PRIVACY POLICY – BOSTON UNISOFT TECHNOLOGIES. Boston Unisoft Technologies. (“BOSTON UNISOFT TECHNOLOGIES”) believes that the privacy and security of an individual’s personal financial information is important. BO

          Add to Reading List

          Source URL: bostonunisoft.com

          - Date: 2017-03-23 11:56:21
            16

            Slack Technologies, Inc. Service Organization Controls (“SOC”) Report Relevant to Trust Services Principles and Criteria for Security, Availability, and Confidentiality for the Team Communication Platform Referred to

            Add to Reading List

            Source URL: a.slack-edge.com

            - Date: 2017-04-17 15:57:15
              17

              Grailog 1.0: Graph-Logic Visualization of Ontologies and Rules Harold Boley National Research Council, Security and Disruptive Technologies University of New Brunswick, Faculty of Computer Science Fredericton, NB, Canada

              Add to Reading List

              Source URL: cs.unb.ca

              - Date: 2013-05-12 19:46:42
                18

                WHITE PAPER Protecting the Cloud Fortinet Technologies and Services that Address Your Cloud Security Challenges

                Add to Reading List

                Source URL: www.ciosummits.com

                - Date: 2016-08-22 18:35:38
                  19

                  Grailog 1.0: Graph-Logic Visualization of Ontologies and Rules Harold Boley National Research Council, Security and Disruptive Technologies University of New Brunswick, Faculty of Computer Science Fredericton, NB, Canada

                  Add to Reading List

                  Source URL: www.cs.unb.ca

                  - Date: 2013-05-12 19:46:42
                    20

                    UBICOMM 2014 : The Eighth International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies Event Driven Adaptive Security in Internet of Things Waqas Aman and Einar Snekkenes Norwegian Informa

                    Add to Reading List

                    Source URL: www.researchgate.net

                      UPDATE