Computer and network surveillance

Results: 80



#Item
61Ethics / Privacy / Ambient intelligence / Personal and Ubiquitous Computing / Radio-frequency identification / Surveillance / Internet privacy / Ubiquitous robot / Telecooperation Office / Ubiquitous computing / Technology / Human–computer interaction

ITU Privacy and Ubiquitous Network Societies

Add to Reading List

Source URL: www.itu.int

Language: English - Date: 2011-04-04 04:15:38
62National security / Computer network security / Security guard / Surveillance / FIFA World Cup / Public security / Computer security / Rio de Janeiro / Private security industry in South Africa / Security / Public safety / Crime prevention

Safety and Security Industry Overview Unit: US$ thousands[removed]

Add to Reading List

Source URL: export.gov

Language: English - Date: 2014-03-10 11:01:13
63Data security / Ethernet / Wireless security / Electronic engineering / Technology / Wireless intrusion prevention system / WIDS / Network switch / Wi-Fi / Computer network security / Wireless networking / Computing

TECHNICAL DATASHEET VirtualFence Appliance 3e–733A Vulnerability starts at the perimeter. Infrastructure and site surveillance

Add to Reading List

Source URL: www.ultra-3eti.com

Language: English - Date: 2014-05-29 15:39:53
64Computer network security / Crime prevention / National security / System administration / Password / Internet security / Information security / Network security / Telnet / Security / Computing / Computer security

Internet 2000 The path to the total network Chapter 8: Security and copyright “We are at a crossroads. Are we going to have the tool of electronic surveillance, or are we going to let criminals use the national inform

Add to Reading List

Source URL: www.arnoldit.com

Language: English - Date: 2008-08-27 16:01:55
65National security / Computer network security / Surveillance / Electronic commerce / Security guard / United States Department of Homeland Security / Computer security / Emergency management / Network security / Security / Public safety / Crime prevention

Security Considerations / procedures for referring suspicious Management Priorities 9 Assess security of property and identify threats, vulnerabilities, risks, and

Add to Reading List

Source URL: www.epa.gov

Language: English - Date: 2011-04-15 13:08:11
66National security / Computer network security / Surveillance / Electronic commerce / Security guard / United States Department of Homeland Security / Computer security / Emergency management / Network security / Security / Public safety / Crime prevention

Security Considerations / procedures for referring suspicious Management Priorities 9 Assess security of property and identify threats, vulnerabilities, risks, and

Add to Reading List

Source URL: www.epa.gov

Language: English - Date: 2011-04-15 13:08:11
67Data / Deep packet inspection / Packet capture / Firewall / Packet switching / Network packet / Router / Quality of service / Transmission Control Protocol / Computing / Computer network security / Network architecture

Working Paper Deep Packet Inspection in Perspective: Tracing its lineage and surveillance potentials by Christopher Parsons*

Add to Reading List

Source URL: www.sscqueens.org

Language: English - Date: 2011-08-17 15:43:16
68Mass surveillance / National Security Agency / United States government secrecy / United States Cyber Command / Central Intelligence Agency / United States Intelligence Community / William B. Black /  Jr. / Australian Intelligence Community / United States Department of Defense / National security / Military

William P. Marshall Managing Director Areas of Focus:  Cyber security and Information Assurance  General intelligence community matters  Information Operations and Computer Network Operations

Add to Reading List

Source URL: chertoffgroup.com

Language: English - Date: 2014-01-24 09:00:09
69National security / Computer network security / Surveillance / Electronic commerce / Security guard / United States Department of Homeland Security / Computer security / Emergency management / Network security / Security / Public safety / Crime prevention

Security Considerations / procedures for referring suspicious Management Priorities 9 Assess security of property and identify threats, vulnerabilities, risks, and

Add to Reading List

Source URL: www.epa.gov

Language: English - Date: 2011-04-15 13:08:11
70Surveillance / Logistics / Geolocation / Satellite navigation systems / Tracking / Automatic number plate recognition / Computer-aided dispatch / National Crime Records Bureau / Vehicle tracking system / Transport / Technology / Land transport

Notice for EOI CRIME AND CRIMINAL TRACKING NETWORK AND SYSTEMS (CCTNS) PROJECT

Add to Reading List

Source URL: ncrb.gov.in

Language: English - Date: 2012-01-12 04:02:27
UPDATE