Computer surveillance

Results: 1478



#Item
361Crime prevention / Law enforcement / Human rights / Mass surveillance / Data mining / Surveillance / National Security Agency / Computer surveillance / Internet privacy / Security / National security / Ethics

Pre-print of paper published in Künstliche IntelligenzC) Springer. URL of this pre-print: http://people.cs.kuleuven.be/~bettina.berendt/Papers/berendt_buechler_rockwell_KUIN_2015.pdf . The final publication is a

Add to Reading List

Source URL: people.cs.kuleuven.be

Language: English - Date: 2015-03-17 06:03:00
362Non-volatile memory / Computer data storage / Solid-state drive / Logical Disk Manager / Floppy disk / CLARiiON / Computer hardware / Computer storage media / Hard disk drive

Near Line Storage Series The world’s only storage system designed specifically for digital video surveillance NLS sequential recording system (SFS ™) uses hard disks like video tapes and offers extreme reliability or

Add to Reading List

Source URL: us.sourcesecurity.com

Language: English - Date: 2015-01-09 05:38:06
363Law enforcement / Police / Public safety / Surveillance / Law / Cyberwarfare / Law enforcement in Japan / National security / Security / Crime prevention

1. Police InfoCommunications A. Analysis of Computer Systems and Electromagnetic Records (1) Digital Forensics The High-Tech Crime Technology Division with the Digital Forensic

Add to Reading List

Source URL: www.npa.go.jp

Language: English
364Data / IOPS / Solid-state drive / Hybrid array / RAID / Computer data storage / Standard RAID levels / Storage area network / ISCSI / Computing / Data management / Information

SuperNovaSeries BCD5660 SAN Storage System Designed to address an IP Video Storage requirements, the BCD5660 is setting a new standard for performance efficiency in video surveillance environments KEY FEATURES

Add to Reading List

Source URL: us.sourcesecurity.com

Language: English - Date: 2015-01-08 07:24:40
365Computer security / Network security / Malware / Surveillance / Threat / Unified threat management / Computer network security / Cyberwarfare / Security

Predict and Prevent Corporate Security Threats iboss Network Security Tracks Data Flow to Predict and Prevent Corporate Security Threats Advanced behavioral data analysis detects threats through anomalies in data movemen

Add to Reading List

Source URL: residential.iphantom.com

Language: English - Date: 2015-04-20 16:17:18
366Identification / Iris recognition / Keystroke dynamics / Speaker recognition / Facial recognition system / Identity document / Biometric points / Fingerprint / Private biometrics / Biometrics / Security / Surveillance

1999 Glossary of Biometric Terms Association for Biometrics (AfB) and International Computer Security Association (ICSAGlossary of Biometric Terms

Add to Reading List

Source URL: www.biometrie-online.net

Language: English - Date: 2014-10-27 18:35:21
367Tap / TUN/TAP / Computer network / Surveillance / Technology / Public safety / Net Optics / Data monitoring switch / Network tap / Telephone tapping / Security

DATACOM SYSTEMS INC Network Tap Tutorial Overview

Add to Reading List

Source URL: www.datacomsystems.com

Language: English - Date: 2013-12-31 21:34:57
368Scientific method / Machine learning / Data analysis / Data mining / Surveillance / Statistics / Statistical classification / Linked data / Racial profiling / Science / Information / Knowledge

Big Capta, Bad Science? On two recent books on “Big Data“ and its revolutionary potential Bettina Berendt, Dept. of Computer Science, KU Leuven 5 January 2015 – updated 5 March 2015 “Big Data“ – that amalgam

Add to Reading List

Source URL: people.cs.kuleuven.be

Language: English - Date: 2015-03-13 11:27:52
369Electronic engineering / Katherine Albrecht / Liz McIntyre / Surveillance / Spychip / ODIN technologies / Clipped tag / Radio-frequency identification / Human–computer interaction / Technology

v.16 Endorsers last updatedof 10 Position Paper on the Use of RFID in Schools August 21, 2012

Add to Reading List

Source URL: www.spychips.com

Language: English - Date: 2012-09-09 13:13:23
370GFI Software / Network management / Internet / Website monitoring / Email / Web threat / Malware / Computer surveillance in the workplace / Workplace surveillance / Computing / Digital media / Technology

GFI White Paper Why SMEs need to deploy a web monitoring tool Most organizations today use the Internet to conduct business, giving employees access to what is, without doubt, an essential

Add to Reading List

Source URL: www.gfi.com

Language: English - Date: 2011-06-20 09:07:14
UPDATE