Computer surveillance

Results: 1478



#Item
931Project management software / Version control / Free software licenses / Apache Software Foundation / Distributed revision control systems / GitHub / Gitorious / Freepository / Apache Subversion / Computing / Software / Computer programming

Supplemental Tables Releasing Tools for International Disease Surveillance as Open-Source Software: A Case Study Raj J. Ashar Supplemental Table 1.  List of licenses used by various libraries on which SAGES tools depen

Add to Reading List

Source URL: techdigest.jhuapl.edu

Language: English - Date: 2014-08-01 14:42:05
932Computing / Security / Surveillance / Mass surveillance / National Security Agency / Mitre Corporation / Extensible Configuration Checklist Description Format / Computer security / CVSS / Computer network security

MITRE’s NextGen Research Strategy

Add to Reading List

Source URL: scap.nist.gov

Language: English - Date: 2013-12-31 15:31:55
933National security / Artificial intelligence / Automatic identification and data capture / Artificial intelligence applications / Automatic number plate recognition / Optical character recognition / Vehicle registration plate / Access control / Threat / Security / Computer security / Surveillance

www.perceptics.com State ID Proves Vital in LPR for Access Control Vehicle identifications and inspections constitute key components of most perimeter and access control security protocols. The greater the stakes and con

Add to Reading List

Source URL: www.perceptics.com

Language: English - Date: 2012-12-17 07:25:44
934Privacy / Computer law / National security / Crime prevention / Electronic Communications Privacy Act / Surveillance / Internet privacy / Data mining / Patriot Act / Privacy law / Ethics / Law

Managing the Muddled Mass of Big Data By Susan Freiwald University of San Francisco School of Law At the same time that Big Data promises previously unobtainable insights, its use places significant pressure on three sig

Add to Reading List

Source URL: www.futureofprivacy.org

Language: English - Date: 2013-09-09 17:19:28
935Crime prevention / Public safety / Mass surveillance / National Security Agency / United States government secrecy / Certified Information Systems Security Professional / Information security / SAIC / Computer security / Security / National security / Data security

TOPSECRETPROTECTION.COM Protecting Classified & Sensitive Information Is Our Business ISSPM TRAINING COURSE STUDENT EVUALTIONS AND COMMENTS NSA ISSPM TRAINING COURSE STUDENT TESTIMONIALS The National Security Agency (NSA

Add to Reading List

Source URL: www.topsecretprotection.com

Language: English - Date: 2011-03-15 21:44:05
936Automatic identification and data capture / Computer security / Automatic number plate recognition / Optical character recognition / Vehicle registration plate / Access control / Risk assessment / Security / Artificial intelligence / Surveillance

9737 Cogdill Rd, Ste 200N Knoxville, TN[removed]8544 [removed] www.perceptics.com

Add to Reading List

Source URL: www.perceptics.com

Language: English - Date: 2012-12-17 07:25:45
937Security / United States government secrecy / Mass surveillance / Espionage / National Security Agency / Quantum computer / Classified information / For Official Use Only / Qubit / Theoretical computer science / National security / Quantum information science

TOP SECRET//SI//REL TO USA, AUS, CAN, GBR, NZL NATIONAL SECURITY AGENCY CENTRAL SECURITY SERVICE (U) CLASSIFICATION GUIDE FOR

Add to Reading List

Source URL: cryptome.org

Language: English - Date: 2014-06-12 10:29:36
938Crime prevention / National security / Security guard / Surveillance / Computer security / Executive protection / Bodyguard / Risk / Academi / Security / Public safety / Prevention

PICA-Executive_Protection

Add to Reading List

Source URL: www.pica.net

Language: English - Date: 2014-06-16 16:41:33
939National security / Videotelephony / Privacy of telecommunications / Privacy law / Communications Assistance for Law Enforcement Act / Mass surveillance / Telephone tapping / Voice over IP / SMS / Electronic engineering / Technology / Surveillance

Can They Hear Me Now? A Security Analysis of Law Enforcement Wiretaps Micah Sherr, Gaurav Shah, Eric Cronin, Sandy Clark, and Matt Blaze Dept. of Computer and Information Science, University of Pennsylvania Philadelphia,

Add to Reading List

Source URL: www.privacywonk.net

Language: English - Date: 2013-08-27 11:36:52
940Privacy / Internet privacy / Employee monitoring / Background check / Social networking service / Workplace surveillance / Computer surveillance in the workplace / Ethics / Surveillance / Employment

[removed]Survey Social Media in the Workplace Around the World 3.0 Proskauer Rose LLP | Prior results do not guarantee a similar outcome | Attorney Advertising

Add to Reading List

Source URL: www.proskauer.com

Language: English - Date: 2014-06-25 13:28:34
UPDATE