and Security Technologies

Results: 1110



#Item
331Anthropometry / Criminology / Human height / Physical anthropology / 3D printing / Biometrics / Business / Security / Industrial design / Technology / Surveillance

5th International Conference and Exhibition on 3D Body Scanning Technologies 2014

Add to Reading List

Source URL: www.3dbodyscanning.org

Language: English - Date: 2013-11-24 13:00:41
332Internet / Content-control software / Network security / Cyber-bullying / Unified threat management / Spyware / Proxy server / NetBox Blue / Content filtering / Computer network security / Espionage / Computing

ContentKeeper Technologies: Solutions for Education The ContentKeeper suite of products enables organisations within the Education sector to more effectively Monitor, Manage, Control and Secure Internet resources. It add

Add to Reading List

Source URL: www.contentkeeper.ca

Language: English - Date: 2008-03-02 13:13:31
333Internet protocols / Tunneling protocols / Cryptographic protocols / IPsec / Universal Mobile Telecommunications System / IPv6 / 3GPP Long Term Evolution / Windows Vista networking technologies / Continuous Computing / Network architecture / Computing / Data

Adax Teams with AuthenTec to Create a Complete Carrier-Grade IPsec Security Solution OAKLAND, Calif., February 08, 2012 – Adax (www.adax.com), an industry leader in high-performance packet-processing, security and netw

Add to Reading List

Source URL: www.adax.com

Language: English - Date: 2012-03-28 09:48:00
334Software / Shavlik Technologies / Spyware / Avira / Malware / Computer virus / Antivirus software / System software / Computer security

Shavlik® Protect Add-on Features Any Patch, Anywhere and More

Add to Reading List

Source URL: rs.shavlik.com

Language: English - Date: 2014-10-14 17:22:36
335Software / Web hosting / Cloud storage / Online backup services / Backup / Remote backup service / Mozy / Backup software / Data security / Computing

Summary In 2006 Albert Metais, owner and founder of Steelgate, decided to exploit the market potential of online backup and founded Steelgate Technologies. The company specializes in providing secure online backup to me

Add to Reading List

Source URL: www.novastor.com

Language: English - Date: 2014-11-03 21:16:30
336Computing / Windows Small Business Server / Microsoft Exchange Server / Microsoft Servers / Microsoft SharePoint / Microsoft SQL Server / Windows / Microsoft Forefront Threat Management Gateway / Avast! / Software / Windows Server / System software

RELEASE NOTES F-Secure® E-mail and Server Security version[removed]build 739 (RTM) © [removed]F-Secure Corporation. All rights reserved. Portions Copyright © 2004 BackWeb Technologies Inc. Portions Copyright © 2003 Co

Add to Reading List

Source URL: download.f-secure.com

Language: English - Date: 2014-04-03 08:28:15
337Performance work statement / Esri / Military acquisition / Government procurement in the United States / United States administrative law

NOAALink User’s Quarterly Government Information Technology (IT) priorities continue to revolve around data-related technologies and cyber security. Government agencies must enhance and expand ways to harness the data

Add to Reading List

Source URL: www.cio.noaa.gov

Language: English - Date: 2013-11-20 10:53:50
338Portable media players / Buddhism / Religion / Risk / Risk management / ZEN / Information security management system / Sony / Electronics / Electronic engineering / Technology

December 05, 2011 Press Release from Zen Technologies Limited Zen Technologies Limited (www.zentechnologies.com) issued a press release about the company’s pending order size of the Company and Update on its subsidiar

Add to Reading List

Source URL: www.zentechnologies.com

Language: English - Date: 2011-12-06 00:58:45
339Law / Proprietary software / Authentication / Computer law / Software licenses / Security

Subscriber Agreement This is an Agreement between You and TrustX Technologies, Inc. ("TrustX"). Clicking the "Accept" button and/or using the Software or the Service indicates acceptance of these terms. If you do not acc

Add to Reading List

Source URL: www.trustx.com

Language: English - Date: 2014-08-27 17:43:55
340Elevator / Alarm devices / Burglar alarm / Autodialer alarm / Safety / Security / Alarms

Innovative Technologies in Custom Electronic Design & Manufacturing General Description The VD-6300-MCS-02 Freeze Alarm monitors temperature, power status, security or an external contact, and offers remote switch contr

Add to Reading List

Source URL: www.protectedhome.com

Language: English - Date: 2009-01-19 14:25:10
UPDATE