Computer surveillance

Results: 1478



#Item
221Human–computer interaction / Computing / Keystroke logging / Computer keyboard / IBM Personal System/2 / Mouse / Universal Serial Bus / PS/2 connector / Menu / Surveillance / Computer hardware / Hardware keylogger

KeyGrabber PS/2 User’s Guide KeyGrabber PS/2 8 MB / 2 GB

Add to Reading List

Source URL: www.keelog.com

Language: English - Date: 2013-06-17 08:19:02
222Public safety / Information security / Password / 9 / Surveillance / Computer security / Vulnerability / Security / Crime prevention / National security

Information at all.net01B http://all.net/

Add to Reading List

Source URL: all.net

Language: English - Date: 2013-07-10 14:09:16
223Law / Crime prevention / Computer law / Electronic Privacy Information Center / Measuring instruments / Marc Rotenberg / Full body scanner / Internet privacy / Surveillance / Ethics / Privacy / Security

in the news epic TSA Aimed to Put Body Scanners

Add to Reading List

Source URL: epic.org

Language: English - Date: 2012-01-05 13:44:51
224National Security Agency / Mass surveillance / Surveillance / Privacy of telecommunications / Computer law / NSA electronic surveillance program / Electronic Privacy Information Center / Freedom of Information Act / NSA warrantless surveillance controversy / National security / Security / Government

IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLUMBIA ELECTRONIC PRIVACY INFORMATION CENTER 1718 Connecticut Avenue, N.W. Suite 200

Add to Reading List

Source URL: epic.org

Language: English - Date: 2007-09-27 14:44:17
225National security / Cloud computing / NUS School of Computing / Application software / Computer / Opera / Database / Surveillance / Peer-to-peer / Software / Computing / Crime prevention

Microsoft Word - newsletter-july

Add to Reading List

Source URL: www.comp.nus.edu.sg

Language: English - Date: 2012-12-25 13:37:16
226Crime prevention / Surveillance / Law enforcement / Closed-circuit television / Activity recognition / OpenCV / Sophia Antipolis / Security / National security / Computer vision

1 Scene Understanding for Activity Monitoring Francois BREMOND Inria Sophia Antipolis Méditerranée – STARS team

Add to Reading List

Source URL: leat.unice.fr

Language: English - Date: 2015-02-21 11:30:36
227Automatic identification and data capture / Facial recognition system / Surveillance / Gabor filter / Face / Edge detection / Artificial intelligence / Vision / Imaging / Face recognition / Head and neck / Computer vision

Using Coronal Depth Maps to Detect Identifiable Surface Features on Structural Head Imaging Konstantinos Sideris, BS1, Brian E. Chapman, PhD2 1 University of California, Los Angeles, Los Angeles, CA, USA 2

Add to Reading List

Source URL: www.cs.ucla.edu

Language: English - Date: 2014-06-17 14:22:22
228Human–computer interaction / Surveillance / Ubiquitous computing / Wireless / ISO/IEC 18000-3 / RuBee / Radio-frequency identification / Automatic identification and data capture / Technology

PDF Document

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:36
229Surveillance / Mass surveillance / Freedom of Information Act / Central Intelligence Agency / National Security Agency / Computer security / Security / National security / Freedom of information legislation

PDF Document

Add to Reading List

Source URL: www.aclu.org

Language: English - Date: 2015-04-21 14:28:30
230Data privacy / Computer law / Internet privacy / Personally identifiable information / Legal aspects of computing / Surveillance / Medical privacy / Ethics / Privacy / Law

PDF Document

Add to Reading List

Source URL: cyberlawcentre.org

Language: English - Date: 2013-12-09 02:29:52
UPDATE