Computer surveillance

Results: 1478



#Item
311Radio-frequency identification / Human–computer interaction / Wireless / Surveillance / Smart label / Label / Automatic identification and data capture / Packaging materials / Technology

Microsoft PowerPoint - HIRABAYASHI_RFID_14AUG207.ppt

Add to Reading List

Source URL: www.wca.org

Language: English - Date: 2007-08-13 19:12:18
312Technology / Office equipment / Printer / Thermal transfer / Computer printers / Surveillance / Media technology / Automatic identification and data capture / Radio-frequency identification / Intermec

Product profile TMX2000 Mid-Range ThermaMAX Thermal Transfer Ribbon

Add to Reading List

Source URL: www.intermec.com

Language: English - Date: 2011-05-16 15:20:47
313Risk / Business / Audit / Computer-aided audit tools / ISO / Internal audit / Auditing / Accountancy / Information technology audit

NAMRIA 4th ISO surveillance audit.indd

Add to Reading List

Source URL: namria.gov.ph

Language: English - Date: 2014-11-24 03:37:49
314Human–computer interaction / Surveillance / Impinj / Electronic Product Code / Radio-frequency identification / Automatic identification and data capture / Technology

ExpressCard™ Technology by Duel/Methode

Add to Reading List

Source URL: www.wca.org

Language: English - Date: 2007-01-24 18:09:13
315Identification / Surveillance / BioAPI / Common Criteria / CBEFF / Fingerprint recognition / Authentication / Fingerprint / Computer security / Security / Biometrics / Fingerprints

"LOOKING "LOOKING FOR FOR A A COMMON COMMON ATTACK ATTACK

Add to Reading List

Source URL: www.commoncriteriaportal.org

Language: English - Date: 2011-10-31 12:01:45
316Physics / Signals intelligence / TEMPEST / United States government secrecy / Electronic test equipment / Measuring instruments / Computer keyboard / Laser / Voltmeter / Espionage / Surveillance / Technology

Sniffing Keystrokes With Lasers/Voltmeters Side Channel Attacks Using Optical Sampling Of Mechanical Energy And Power Line Leakage Andrea Barisani

Add to Reading List

Source URL: dev.inversepath.com

Language: English - Date: 2009-10-01 18:33:06
317Crime prevention / Ambient intelligence / Surveillance / Steve Mann / Wearable computer / Wearable technology / Closed-circuit television / Briefcase / Clerks / Security / National security / Public safety

Existential Technology: Wearable Computing Is Not the Real Issue!

Add to Reading List

Source URL: www.leonardo.info

Language: English - Date: 2011-10-19 15:54:46
318Technology / Deep packet inspection / Mass surveillance / Surveillance / Call-recording software / Verint Systems / Imperva / Check Point / Safenet / Computing / Computer network security / Computer security

RSAC15_South_Hall_4-20-15

Add to Reading List

Source URL: www.rsaconference.com

Language: English - Date: 2015-04-20 21:53:32
319Cyberwarfare / Computer security / Crime prevention / National security / Intrusion detection system / Network security / Telecommunications data retention / Threat / Surveillance / Computer network security / Security / Computing

Principles for Developing Comprehensive Network Visibility∗ Mark Allman, Christian Kreibich, Vern Paxson, Robin Sommer, Nicholas Weaver International Computer Science Institute Abstract

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2008-07-14 15:42:26
320File managers / User interface techniques / Mac OS / Windows Vista / Finder / Trash / Computer file / Drag and drop / System Folder / System software / Software / Computing

CleanApp 3 Surveillance and Cleanup 1 Contents

Add to Reading List

Source URL: download.syniumsoftware.com

Language: English - Date: 2015-04-13 11:51:05
UPDATE