Computer surveillance

Results: 1478



#Item
811salient (adj): standing above, prominent, apart from the rest  In the world of video surveillance and video management, Salient Systems Corporation stands apart. Our products are used to secure some of the most prominent

salient (adj): standing above, prominent, apart from the rest In the world of video surveillance and video management, Salient Systems Corporation stands apart. Our products are used to secure some of the most prominent

Add to Reading List

Source URL: www.voiceproducts.com

Language: English - Date: 2012-02-14 14:18:50
8122014 Homeland Security Grant Application Teleconference Question and Answer Session Minutes Wednesday, September 23, 2014 – 6:00 p.m. The Question and Answer Session Conference Call began at 6:00 p.m. with twelve (12)

2014 Homeland Security Grant Application Teleconference Question and Answer Session Minutes Wednesday, September 23, 2014 – 6:00 p.m. The Question and Answer Session Conference Call began at 6:00 p.m. with twelve (12)

Add to Reading List

Source URL: www.nh.gov

Language: English - Date: 2014-09-25 09:48:34
813NiceVision Intrusion Detection ® SMART VIDEO PROVEN VALUE

NiceVision Intrusion Detection ® SMART VIDEO PROVEN VALUE

Add to Reading List

Source URL: www.voiceproducts.com

Language: English - Date: 2012-02-16 13:09:02
814Microsoft Word - 2014CIF Agenda_Public Draft_ FINAL for Print.docx

Microsoft Word - 2014CIF Agenda_Public Draft_ FINAL for Print.docx

Add to Reading List

Source URL: www.fbcinc.com

Language: English - Date: 2014-01-24 09:47:26
815National security / Surveillance / Public safety / Information security operations center / Network management / Information security / Threat / Malware / Security operations center / Security / Security engineering / Computer security

This incident report is forwarded to CDHE and the Office of Information Technology in accordance with the policies and procedures for reportable incidents as described in the institution’s IT Security Plan or Program.

Add to Reading List

Source URL: highered.colorado.gov

Language: English - Date: 2014-03-14 12:40:04
816IBM Government Industry  The economy of security How physical and cyber security drive economic vitality Executive summary

IBM Government Industry The economy of security How physical and cyber security drive economic vitality Executive summary

Add to Reading List

Source URL: public.dhe.ibm.com

Language: English - Date: 2014-11-17 11:40:11
817REVOCATION OF COMPUTER/LIBRARY PRIVILEGES Revocation of Computer/Library Privileges: Lincoln Library endeavors to provide an atmosphere conducive to study, reading, and the legitimate use of materials, computers, equipme

REVOCATION OF COMPUTER/LIBRARY PRIVILEGES Revocation of Computer/Library Privileges: Lincoln Library endeavors to provide an atmosphere conducive to study, reading, and the legitimate use of materials, computers, equipme

Add to Reading List

Source URL: www.lincolnlibrary.info

Language: English - Date: 2014-06-25 12:12:42
818CYBER SECURITY: A MUST HAVE FOR HEALTH AND HUMAN SERVICES 2  Introduction

CYBER SECURITY: A MUST HAVE FOR HEALTH AND HUMAN SERVICES 2 Introduction

Add to Reading List

Source URL: www.aphsa.org

Language: English - Date: 2014-10-03 14:14:10
819IWCIM – PROGRAM – DAY 1 Saturday 1st of November 8:30 - 9:00: Registration KEYNOTE 1 9:00 – 9:55:

IWCIM – PROGRAM – DAY 1 Saturday 1st of November 8:30 - 9:00: Registration KEYNOTE 1 9:00 – 9:55:

Add to Reading List

Source URL: iwcim.isep.fr

Language: English - Date: 2014-10-31 08:46:21
820A Web-of-Things solution to enrich TV viewing experience using Wearable and Ambient sensor data Prabhakar Srinivasan, Cisco SPVTG Email: [removed]  Introduction

A Web-of-Things solution to enrich TV viewing experience using Wearable and Ambient sensor data Prabhakar Srinivasan, Cisco SPVTG Email: [removed] Introduction

Add to Reading List

Source URL: www.w3.org

Language: English - Date: 2014-05-10 13:44:39