and Security Technologies

Results: 1110



#Item
21

Institute for Systems and Technologies of Information, Control and Communication 3rd International Conference on Information Systems Security and Privacy – ICISSPThe ICISSP Conference (The 3rd International Con

Add to Reading List

Source URL: ap2si.files.wordpress.com

- Date: 2016-09-02 13:52:20
    22

    Privacy Policy Beyond the Pond is committed to protecting your privacy. We maintain the privacy of your information using security technologies and adhere to policies that prevent unauthorized use of your personal inform

    Add to Reading List

    Source URL: beyondthepondusa.com

    - Date: 2016-04-26 15:12:54
      23

      Statement of Subcommittee Chairman John Ratcliffe (R-TX) Cybersecurity, Infrastructure Protection, and Security Technologies Subcommittee “Value of DHS’ Vulnerability Assessments in Protecting our Nation’s Critical

      Add to Reading List

      Source URL: homeland.house.gov

      - Date: 2016-07-12 09:31:29
        24

        Proceedings on Privacy Enhancing Technologies ; ):276–293 Henry Tan, Micah Sherr, and Wenchao Zhou Data-plane Defenses against Routing Attacks on Tor Abstract: Tor is susceptible to traffic correlation attacks

        Add to Reading List

        Source URL: security.cs.georgetown.edu

        - Date: 2016-07-26 12:57:18
          25

          Dears, For your information, please ensure data security and data privacy regime (Hong Kong Regulation) when approaching to those technologies. regards, JL

          Add to Reading List

          Source URL: www.digital21.gov.hk

          - Date: 2014-01-20 06:40:25
            26

            OT enables contactless payment with Swatch in Switzerland Colombes, France, June 16, 2016 OT (Oberthur Technologies), a leading global provider of embedded security software products and services,

            Add to Reading List

            Source URL: www.oberthur.com

            - Date: 2016-06-16 06:42:27
              27

              ELASSTIC Enhanced Large Scale Infrastructure with Safety and Security Technologies and special Information Capabilities How to include safety, security and resilience in a building design! Capabilities Elasstic Design

              Add to Reading List

              Source URL: www.elasstic.eu

              - Date: 2016-06-10 05:44:06
                28

                OT chosen by STET and GIE-CB as their exclusive partner to roll out mobile payment in France Colombes, France, June 22nd 2016 OT (Oberthur Technologies), a leading global provider of embedded security software products a

                Add to Reading List

                Source URL: www.oberthur.com

                - Date: 2016-06-22 04:16:53
                  29Security / Surveillance / Prevention / Video / Safety / Physical security / Assistive technology / Closed-circuit television / IP camera / Video management system / NVR / Aventura Technologies

                  Surveon Deploys 3,000 Highly Reliable 3 Megapixel Cameras to Safeguard Southern Taiwan City To ensure the protection on lives and properties of citizens, city surveillance is the most direct and productive method for any

                  Add to Reading List

                  Source URL: www.surveon.com

                  Language: English - Date: 2013-11-06 00:22:15
                  30Europe / Nomenclature of Territorial Units for Statistics / Luxinnovation / Science and technology in Europe / New ICT / Luxembourg / Draft:ICT Security Policy System: A Case Study / Information and communication technologies for development

                  LUXEMBOURG: THE PERFECT LOCATION FOR ICT INNOVATION LUXEMBOURG: THE PERFECT LOCATION FOR ICT INNOVATION

                  Add to Reading List

                  Source URL: www.ictcluster.lu

                  Language: English - Date: 2015-07-06 08:02:39
                  UPDATE