Computer surveillance

Results: 1478



#Item
721Computer display standards / High-definition television / Video signal / HDMI / Audio and video connector / TFT LCD / Video Graphics Array / Computer hardware / Electronic engineering / Television technology

simply unique. M17LCBVH3 M19LCBVH3 17”, 19”

Add to Reading List

Source URL: www.surveillance-video.com

Language: English - Date: 2014-02-21 12:38:08
722Telecommunications / Telecommunications data retention / Security / Computer law / Surveillance / Regulation of Investigatory Powers Act / Communications data / Government procurement in the United States / Anti-terrorism /  Crime and Security Act / National security / Law / Privacy of telecommunications

Regulation of Investigatory Powers Act Consultation: Acquisition and Disclosure of Communications Data and Retention of Communications Data Codes of Practice 9 December 2014

Add to Reading List

Source URL: www.gov.uk

Language: English - Date: 2014-12-12 06:16:15
723Computer law / Data privacy / Privacy law / Hong Kong Police Force / Law enforcement in the United Kingdom / Police / Data Protection Act / Hampshire Constabulary / Association of Chief Police Officers / National security / Law / Surveillance

THE PROFESSIONAL BODY FOR POLICING Body-Worn Video 2014 Pending inclusion into Authorised Professional Practice

Add to Reading List

Source URL: www.college.police.uk

Language: English - Date: 2015-02-06 02:09:08
724Computer network security / Financial regulation / Money laundering / Tax evasion / Threat / Critical infrastructure protection / Computer network / Financial Intelligence / Surveillance / National security / Security / Espionage

Project QUANTUM LEAP After Action Report

Add to Reading List

Source URL: www.fas.org

Language: English - Date: 2014-05-06 20:30:34
725Crime prevention / Security guard / Surveillance / United States Department of Homeland Security / Computer security / Australian Protective Service / Federal Protective Service / Academi / Emergency management / Security / Public safety / National security

Best Practices for Armed Security Officers in Federal Facilities

Add to Reading List

Source URL: www.dhs.gov

Language: English - Date: 2014-05-08 13:45:52
726Government / Mass surveillance / United States government secrecy / National Cryptologic Museum / United States Department of Homeland Security / Central Security Service / United States Cyber Command / Computer security / Security / National Security Agency / National security

honesty integrity respect for the law national honesty transparency integrity respect for security

Add to Reading List

Source URL: www.nsa.gov

Language: English - Date: 2013-01-08 14:32:54
727Software / Computer security / Off-the-Record Messaging / Pretty Good Privacy / Hushmail / GNU Privacy Guard / Email encryption / Key server / Public-key cryptography / Cryptography / Cryptographic software / Internet privacy

Encryption Works How to Protect Your Privacy in the Age of NSA Surveillance

Add to Reading List

Source URL: freedom.press

Language: English - Date: 2013-07-03 14:37:15
728Computer law / Electronic Privacy Information Center / Law enforcement in the United States / Federal Bureau of Investigation / Surveillance / Next Generation Identification / Marc Rotenberg / Internet privacy / Biometrics / Security / Privacy / National security

ELECTRONIC PRIVACY INFORMATION CENTER • epic.org January 9, 2015

Add to Reading List

Source URL: epic.org

Language: English - Date: 2015-01-09 17:10:38
729Ethics / Privacy / Computer law / Surveillance / Electronic Communications Privacy Act / Stored Communications Act / Pen register / Internet privacy / United States v. Antoine Jones / Privacy law / Privacy of telecommunications / Law

REBUILDING BRIDGES: ADDRESSING THE PROBLEMS OF HISTORIC CELL SITE LOCATION INFORMATION Mark Daniel Langer † In February 2010, the FBI began a massive manhunt for the two men responsible for over fifteen bank robberies

Add to Reading List

Source URL: btlj.org

Language: English - Date: 2014-08-05 18:57:52
730Crime prevention / Security guard / Surveillance

REVOCATION OF COMPUTER/LIBRARY PRIVILEGES Revocation of Computer/Library Privileges: Lincoln Library endeavors to provide an atmosphere conducive to study, reading, and the legitimate use of materials, computers, equipme

Add to Reading List

Source URL: www.lincolnlibrary.info

Language: English - Date: 2014-06-25 12:12:42
UPDATE