Computer and network surveillance

Results: 80



#Item
41Cipher / Surveillance / Regulation of Investigatory Powers Act / Encryption / Internet privacy / Criminal law / Disk encryption / Export of cryptography in the United States / Network Security & Cryptography / Cryptography / Computer law / Law

LC Paper No. CB[removed]) Comment and recommendation to the Inter-departmental Working Group on Computer Related Crime Report By

Add to Reading List

Source URL: www.legco.gov.hk

Language: English - Date: 2005-08-10 22:43:04
42Surveillance / Public safety / Safety / Computer network security / Security / Crime prevention / Security guard

Private Security and Public Interest:

Add to Reading List

Source URL: anzsoc.org

Language: English - Date: 2009-04-20 00:43:59
43National security / Technology / Computing / Internet / New media / Scientific revolution / Computer security / Defensive computing / Workplace surveillance / Security / Computer network security / Crime prevention

INDIGO SCAPE INTERNET MANAGEMENT SECURITY SOFTWARE SYSTEMS Manage and Monitor Internet Use, Restrict Access, Filter Websites and Content with Indigo Scape Surfing the Internet has become a favourite pastime of people of

Add to Reading List

Source URL: www.indigosecure.com

Language: English - Date: 2010-10-20 06:54:00
44National security / Computer security / Surveillance / Computer network security / Burglar alarm / Access control / IP camera / Security / Safety / Crime prevention

Case Study Siam City Cement (SCCC) “Aimetis intelligent video management software allows us to remotely monitor our plants and critical areas, such as the explosives

Add to Reading List

Source URL: az446929.vo.msecnd.net

Language: English - Date: 2013-08-02 17:08:03
45National security / Computer network security / Security guard / Surveillance / Certified Information Systems Security Professional / Computer security / Security / Crime prevention / Public safety

Information security training Thanks to an active presence on the security market in Luxembourg for over 10 years, Dartalis assists and advises the field of information security with a friendly and highly experienced tea

Add to Reading List

Source URL: www.dartalis.lu

Language: English - Date: 2011-10-19 13:07:18
46Networks / Network theory / Innovation / Social information processing / Surveillance / Business cluster / Social network / Computer cluster / Science / Structure / Computing

OECD Workshop on Network approaches to Innovation December 8, 2008 Who cultivates the inter-firm networks in regional cluster ? -Innovation and Social Networks-

Add to Reading List

Source URL: www.oecd.org

Language: English - Date: 2014-07-21 01:43:18
47National security / Human rights / Public safety / Privacy / Computer network security / Open-source software / Internet privacy / Computer security / Information privacy / Security / Ethics / Crime prevention

Briefing STOA Options Brief Mass Surveillance : Technology foresight, options for longer term security and privacy improvements The purpose of this policy brief is to provide the Members of the European Parliament with t

Add to Reading List

Source URL: www.europarl.europa.eu

Language: English - Date: 2015-02-12 15:10:02
48Telecommunications engineering / Wireless mesh network / Aruba Networks / Mesh networking / Wi-Fi / Backhaul / Wireless network / Computer network / Wireless LAN / Wireless networking / Technology / Wireless

White Paper | Next-Generation Wireless Mesh Networks: Combining a multi-radio architecture with highperformance routing to optimize video surveillance and other multimedia-grade applications March 2011

Add to Reading List

Source URL: www.arubanetworks.com

Language: English - Date: 2015-01-15 18:27:51
49Internet / Media technology / New media / Scientific revolution / Virtual reality / Network security / Security / Computer surveillance in the workplace / Information security / Digital media / Technology / Digital technology

Communications Systems Usage Policy Purpose This documents the City of Edmonds Communications Systems Usage Policy, and provides guidance for managing the use of electronic communications by all departments, employees an

Add to Reading List

Source URL: www.edmondswa.gov

Language: English - Date: 2012-03-20 21:20:40
50Air safety / Technology / Radar / Automatic dependent surveillance-broadcast / Aircraft instruments / Computer network security / Aircraft Communications Addressing and Reporting System / Secondary surveillance radar / Identification friend or foe / Air traffic control / Avionics / Aviation

On the Security of the Automatic Dependent Surveillance-Broadcast Protocol arXiv:1307.3664v2 [cs.CR] 15 Apr[removed]Martin Strohmeier∗ , Vincent Lenders+ , Ivan Martinovic∗

Add to Reading List

Source URL: www.lenders.ch

Language: English - Date: 2014-12-19 11:12:15
UPDATE