and Security Technologies

Results: 1110



#Item
241Internet / Network architecture / Internet standards / Data security / Unix / Inetd / Firewall / Rlogin / Filesystem Hierarchy Standard / Computing / Computer network security / Internet protocols

Public/Private/Wireless Information Security A blue print for safeguarding sensitive information Mark Rader and Professor J. D. Birdwell Laboratory for Information Technologies 439 Science & Engineering Research Facility

Add to Reading List

Source URL: www.fwtk.org

Language: English - Date: 2015-05-17 11:35:12
242Public safety / Security / Directorate-General for Information Society and Media / Computer security

Invitation to a BIC1 Panel Session held during the SysSec Workshop2 on 6th JulyBuilding a long term International Cooperation strategy for Trustworthy ICT Technologies to support international cyber data sharing a

Add to Reading List

Source URL: www.syssec-project.eu

Language: English - Date: 2011-07-14 13:46:13
243Videotelephony / Android software / Skype / Web 2.0 / Tru / Microsoft / Lawful interception / Skype security / Skype Technologies / Software / Voice over IP / Computing

Microsoft and Skype set to allow backdoor eavesdropping By < HYPERLINK "http://memeburn.com/author/stevennorris/" o "Posts by Steven Norris: Gearburn Editor" >Steven Norris: Gearburn EditorSource: < HYPERLINK

Add to Reading List

Source URL: www.1215.org

Language: English - Date: 2013-03-14 05:55:50
244Technology / Institute for the Protection and Security of the Citizen / Information and communication technologies in education / Ispra / IPSC / Institute for Prospective Technological Studies / European Commission / Science and technology in Europe / Europe

PDF Document

Add to Reading List

Source URL: www.syssec-project.eu

Language: English - Date: 2011-07-25 05:28:18
245United States Department of Homeland Security / Crime prevention / Law enforcement / Surveillance / Homeland security / Critical infrastructure protection / Support Anti-Terrorism by Fostering Effective Technologies Act (SAFETY Act) / DHS Directorate for Science and Technology / National security / Public safety / Security

PDF Document

Add to Reading List

Source URL: www.digitalallyinc.com

Language: English - Date: 2015-03-23 10:12:38
246Iran–United States relations / Electronic warfare / Nuclear program of Iran / Hacking / Stuxnet / Duqu / Ali Khamenei / Army of the Guardians of the Islamic Revolution / Mahmoud Ahmadinejad / Cyberwarfare / Asia / Iran

The Iranian Cyber Threat to the U.S. Homeland Statement before the U.S. House of Representatives Committee on Homeland Security Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies and

Add to Reading List

Source URL: homeland.house.gov

Language: English - Date: 2012-04-25 15:09:57
247Internet / Cyberwarfare / Denial-of-service attack / Internet Relay Chat / Akamai Technologies / Network architecture / Prolexic Technologies / Denial-of-service attacks / Computing / Computer network security

AKAMAI CLOUD SECURITY SOLUTIONS: PRODUCT BRIEF Kona DDoS Defender DDoS defense to protect websites against the increasing scale, frequency, and sophistication of attacks As businesses and other organizations move incre

Add to Reading List

Source URL: www.akamai.com

Language: English - Date: 2015-04-13 05:52:02
248Security / Urban agriculture / Food and drink / Agriculture / United Nations Economic and Social Commission for Asia and the Pacific / Agricultural science / Environment / Land management / Food politics / Food security / Humanitarian aid

PRESS STATEMENT Strengthening national capacities for transfer of technologies to promote sustainable agriculture Bogor, 28 April 2014: About 30 officials from Lao People’s Democratic Republic, Indonesia, Myanmar, the

Add to Reading List

Source URL: www.uncapsa.org

Language: English - Date: 2014-04-28 03:30:51
249Educational technology / Information and communication technologies in education / Learning platform / United Nations Information and Communication Technologies Task Force / Communication / Information technology / Technology

Shaping Ideas to Shape the Future Competence, security and new business areas Results of the third phase of the international study “Prospects and Opportunities of Information and Communication Technologies (ICT) and M

Add to Reading List

Source URL: www.eict.de

Language: English - Date: 2015-03-02 03:33:12
250Environment / Sustainable energy / Renewable energy / Energy policy of the European Union / Energy conservation / International Energy Agency / Office of Energy Efficiency and Renewable Energy / Energy security / Energy policy of the United Kingdom / Energy economics / Energy / Technology

Energy Research, Development and Demonstration in Ireland 2007 AND 2008 INVENTORIES REPORT “Developing and deploying low-carbon technologies will require an integrated policy framework. Many of the most

Add to Reading List

Source URL: www.seai.ie

Language: English - Date: 2015-01-08 04:55:42
UPDATE