Identity intelligence

Results: 296



#Item
171Database management systems / Database theory / NoSQL / Internet Identity / Database / Scalability / Apache Cassandra / Data center / Relational database / Data management / Computing / Data

FRAUD DETECTION IID RELIES ON DATASTAX FOR AROUNDTHE-CLOCK CYBER THREAT MITIGATION Internet Identity (IID) is a cyber security company that provides the platform to easily exchange cyber threat intelligence between ente

Add to Reading List

Source URL: www.datastax.com

Language: English - Date: 2014-08-13 17:36:55
172Legal professions / Birth certificate / Genealogy / Identity document / Public key certificate / Sri Lanka Police Service / Constable / Cryptography / Security / Government

SRI LANKA POLICE DEPARTMENT Post of Police Constable (State Intelligence Service) SPECIMEN APPLICATION FORM

Add to Reading List

Source URL: www.police.lk

Language: English - Date: 2014-08-20 01:59:24
173New Zealand intelligence agencies / National security / Identity management / Law / Privacy / Government Communications Security Bureau / Internet privacy / Mass surveillance / Inspector-General of Intelligence and Security / Human rights / Ethics / Security

Government Communications Security Bureau and Related Legislation Amendment Bill _____________________________ Submission by the Privacy Commissioner

Add to Reading List

Source URL: www.privacy.org.nz

Language: English - Date: 2014-09-24 22:14:46
174Artificial intelligence / Learning / Parts of speech / Ensemble learning / Classifier / Linear classifier / Binary classification / AdaBoost / Boosting methods for object categorization / Statistics / Statistical classification / Machine learning

BERG, BELHUMEUR: TOM-VS-PETE CLASSIFIERS AND IDENTITY-PRESERVING ALIGNMENT 1 Tom-vs-Pete Classifiers and Identity-Preserving Alignment for Face Verification

Add to Reading List

Source URL: thomasberg.org

Language: English - Date: 2013-10-20 17:34:54
175Statistics / Formal sciences / Analytics / Big data / Apache Hadoop / Predictive analytics / Business analytics / Text analytics / Business intelligence / Data management / Data analysis

From Complexity to Clarity. IDENTITY ANALYTICS

Add to Reading List

Source URL: novetta.com

Language: English - Date: 2014-05-16 16:09:49
176Spamming / Computer crimes / Symantec / Antivirus software / Phishing / Malware / Identity theft / Targeted threat / Spam / Computing / Internet / Cybercrime

SYMANTEC INTELLIGENCE REPORT JULY 2014 p. 2

Add to Reading List

Source URL: www.symantec.com

Language: English - Date: 2014-08-14 03:32:21
177Data management / Business intelligence / Computer algebra / Record linkage / Analytics / Data sharing / Big data / Technology / Science / Formal sciences

Identity Resolution Information System          

Add to Reading List

Source URL: www.nascio.org

Language: English - Date: 2014-06-02 17:36:17
178Intellectual property law / Culture / Mind / Sociology of culture / Traditional knowledge / Creativity / Intelligence / Historical race concepts / Two-Spirit identity theory / Educational psychology / Anthropology / Psychology

Microsoft Word - Developing a Cultural Framework.doc

Add to Reading List

Source URL: fnigc.ca

Language: English - Date: 2013-07-12 18:16:35
179Tax evasion / Law / Security / Terrorism financing / Financial Intelligence / Correspondent account / Wire transfer / Belarus / Identity document / Financial regulation / Business / Money laundering

ЕАG-V ЕАG/FR[removed]

Add to Reading List

Source URL: eurasiangroup.org

Language: English - Date: 2010-12-10 08:58:36
180Privacy / Internet privacy / Cyber-security regulation / U.S. Department of Defense Strategy for Operating in Cyberspace / Ethics / Identity management / Law

April 15, 2013 Dear Representative: Earlier this year, many of our organizations wrote to state our opposition to H.R. 624, the Cyber Intelligence Sharing and Protection Act of[removed]CISPA). We write today to express our

Add to Reading List

Source URL: aallnet.org

Language: English
UPDATE