Eavesdropping

Results: 55



#Item
21

Hacking the Soul Eavesdropping on Neurons A new automated version of one of neuroscience’s most important techniques, patch clamping, makes it much easier and faster for scientists to tap into the inner workings of br

Add to Reading List

Source URL: syntheticneurobiology.org

- Date: 2014-09-01 09:31:33
    22Distributed data storage / Routing algorithms / Network topology / Gasoline gallon equivalent / Routing

    Multi-hop Greedy Gossip with Eavesdropping ¨ Deniz Ustebay, Boris Oreshkin, Mark Coates, and Michael Rabbat Department of Electrical and Computer Engineering McGill University

    Add to Reading List

    Source URL: www.tsp.ece.mcgill.ca

    Language: English - Date: 2009-04-06 18:30:26
    23Nonprofit technology / FreedomBox / Free software / Eben Moglen / Debian / Privacy / Internet privacy / Computing / Crowdsourcing / Web 2.0

    Privacy-protected email and telecommunications that resist eavesdropping. A publishing platform that resists oppression and censorship. An organizing tool for democratic activists in hostile regimes. An emergency communi

    Add to Reading List

    Source URL: freedomboxfoundation.org

    Language: English - Date: 2014-11-25 16:58:59
    24Internet / Network architecture / Internet protocols / Internet standards / Electronic commerce / Transport Layer Security / HTTP Secure / Transmission Control Protocol / FTPS / Secure communication / Cryptographic protocols / Computing

    Fusion Embedded™ SSL Unicoi Systems’ Fusion Secure Socket Layer (SSL) and Transport Layer Security (TLS) provides powerful endpoint authentication, protecting against eavesdropping, message falsification and interfer

    Add to Reading List

    Source URL: www.unicoi.com

    Language: English - Date: 2013-12-06 14:42:57
    25Mass surveillance / Black projects / National Reconnaissance Office / USA-202 / Intruder / Spy satellite / Satellite / Atlas / Naval Ocean Surveillance System / Spaceflight / Spacecraft / Surveillance

    Eavesdropping from Space Eavesdropping from Space1 Pat NORRIS Adviser to Vice-President Space, CGI IT UK Ltd., Leatherhead, UK

    Add to Reading List

    Source URL: www.espi.or.at

    Language: English - Date: 2015-02-27 04:59:20
    26Security / Email / HTTP / Cryptographic software / HTTP Secure / Man-in-the-middle attack / Instant messaging / Secure Shell / Information security / Computing / Internet / Internet privacy

    Information Security Animations –Eavesdropping (Script) Eavesdropping Eavesdropping refers to the unauthorised monitoring of other people’s communications. It can be

    Add to Reading List

    Source URL: www.infosec.gov.hk

    Language: English - Date: 2012-06-20 06:06:51
    27

    資訊保安動畫 -竊聽(旁白) 竊聽 竊聽(Eavesdropping)是指在未經授權的情況下,擅自監察別人的通訊內容。 竊聽可以在一般的電話系統、電子郵件、即時通訊系統或

    Add to Reading List

    Source URL: www.infosec.gov.hk

    Language: Korean - Date: 2012-06-20 06:06:51
      28

      資訊保安動畫 -竊聽(旁白) 竊聽 竊聽(Eavesdropping)是指在未經授權的情況下,擅自監察別人的通訊內容。 竊聽可以在一般的電話系統、電子郵件、即時通訊系統或

      Add to Reading List

      Source URL: www.infosec.gov.hk

      Language: Korean - Date: 2012-06-20 06:06:51
        29

        資訊保安動畫 -竊聽(旁白) 竊聽 竊聽(Eavesdropping)是指在未經授權的情況下,擅自監察別人的通訊內容。 竊聽可以在一般的電話系統、電子郵件、即時通訊系統或

        Add to Reading List

        Source URL: www.infosec.gov.hk

        Language: Korean - Date: 2012-06-20 06:06:51
          30Security / Email / HTTP / Cryptographic software / HTTP Secure / Man-in-the-middle attack / Instant messaging / Secure Shell / Information security / Computing / Internet / Internet privacy

          Information Security Animations –Eavesdropping (Script) Eavesdropping Eavesdropping refers to the unauthorised monitoring of other people’s communications. It can be

          Add to Reading List

          Source URL: www.infosec.gov.hk

          Language: English - Date: 2012-06-20 06:06:51
          UPDATE