and Security Technologies

Results: 1110



#Item
271Military science / Technology / Security / International Traffic in Arms Regulations / Export / United States Munitions List / Dual-use technology / Computer security / Arms Export Control Act / Military technology / Identifiers / United States Department of Commerce

The Impact of Export Controls on the Domestic Aerospace Industry: An AIAA Information Paper Abstract Export Control policies originally designed to protect sensitive technologies and capabilities from adversarial regimes

Add to Reading List

Source URL: www.aiaa.org

Language: English - Date: 2011-12-15 15:02:18
272Key schedule / Advanced Encryption Standard / Weak key / Block ciphers / Data Encryption Standard / Cryptography / Differential cryptanalysis / SEED

Update on SEED: SEED? Kitae Jeong1 , Joongeun Choi1 , Yuseop Lee1 , Changhoon Lee2 , Jaechul Sung3 , Haeryong Park4 and Yeonjung Kang4 1 Center for Information Security Technologies(CIST), Korea University, Kore

Add to Reading List

Source URL: seed.kisa.or.kr

Language: English
273Computer crimes / Business / Emerging technologies / Cyberwarfare / SCADA / Telemetry / FireEye /  Inc. / Smart grid / Phishing / Cybercrime / Electric power transmission systems / Technology

Threat Landscape: Utilities Industry Learn more at the Utilities Security webpage. Cyber Spies Make a Power Play The markets for renewable energy and smart grid technologies are expected to top $2 trillion in the next de

Add to Reading List

Source URL: www.fireeye.de

Language: English - Date: 2015-04-30 17:59:57
274Identification / Fingerprints / Access control / Card reader / Facial recognition system / Authentication / BioAPI / Finger vein recognition / Security / Biometrics / Surveillance

Biometrics is a Win Win for both the Customer and the Security Integrator Biometric technologies increase security, reduce risk and make us safer because knowing “who” matters if you are really serious about safety a

Add to Reading List

Source URL: www.facekey.com

Language: English - Date: 2014-09-30 15:40:39
275Computer crimes / Business / Emerging technologies / Cyberwarfare / SCADA / Telemetry / FireEye /  Inc. / Smart grid / Phishing / Cybercrime / Electric power transmission systems / Technology

Threat Landscape: Utilities Industry Learn more at the Utilities Security webpage. Cyber Spies Make a Power Play The markets for renewable energy and smart grid technologies are expected to top $2 trillion in the next de

Add to Reading List

Source URL: www.fireeye.kr

Language: English - Date: 2015-04-30 22:16:40
276Computer security / Akamai Technologies / Content delivery network / Computer network security / Cloud storage / Application security / Cloud computing security / Computing / Concurrent computing / Distributed computing

AKAMAI SERVICE AND SUPPORT: PRODUCT BRIEF Managed Kona Site Defender Service An Akamai Security Services Solution To be successful in today’s hyperconnected world, enterprises need to operate and innovate without fea

Add to Reading List

Source URL: www.akamai.com

Language: English - Date: 2015-03-30 05:06:01
277Computer security / Software / OAuth / Identity management / Identity management systems / OpenID / Play Framework / Distributed social network / Computing / Cloud standards / Federated identity

Venn technology decision tree   The HEART WG is mainly about profiling three technologies: OAuth, OpenID Connect, and  UMA. OAuth is a “base” technology. OpenID Connect is built on top of O

Add to Reading List

Source URL: openid.net

Language: English - Date: 2015-03-21 15:09:12
278Computer crimes / Business / Emerging technologies / Cyberwarfare / SCADA / Telemetry / FireEye /  Inc. / Smart grid / Phishing / Cybercrime / Electric power transmission systems / Technology

Threat Landscape: Utilities Industry Learn more at the Utilities Security webpage. Cyber Spies Make a Power Play The markets for renewable energy and smart grid technologies are expected to top $2 trillion in the next de

Add to Reading List

Source URL: www.fireeye.jp

Language: English - Date: 2015-04-30 17:59:57
279Security / Mergers and acquisitions / Form 10-K / Business / Management / M2SYS Technology / SEC filings / Proxy statement / Biometrics

NEWS RELEASE BIO-key Issues Open Letter to Shareholders Wall, NJ, August 20, 2014 – BIO-key International, Inc. (OTCQB: BKYI), a leader in fingerprint biometric identification technologies, cloud-based mobile credentia

Add to Reading List

Source URL: www.bio-key.com

Language: English - Date: 2014-08-20 08:57:49
280System software / Streaming / System administration / Network performance / Netflow / SolarWinds / Computer network security / Quality of service / Traffic flow / Computing / Network management / Information technology management

NetFlow Tips and Tricks Introduction ............................................................................................................................................... 2 NetFlow and other Flow Technologies

Add to Reading List

Source URL: cdn.swcdn.net

Language: English - Date: 2013-06-28 13:45:32
UPDATE