and Security Technologies

Results: 1110



#Item
361Alarm Call / Alarm devices / Burglar alarm / Autodialer alarm / Safety / Security / Alarms

Innovative Technologies in Custom Electronic Design & Manufacturing General Description The VD-6100-TM (Fahrenheit) and VD-6101-TM (Celsius) Freeze Alarm monitors temperature and power status. Upon an alarm condition, t

Add to Reading List

Source URL: www.protectedhome.com

Language: English - Date: 2009-01-19 14:25:08
362Cloud computing / Computer network security / Kerberos / ODBC / OpenSSL / Simba Technologies / Apache Hive / Apache Hadoop / Microsoft Data Access Components / Computing / Software / System software

Simba ODBC Driver with SQL Connector for Apache Hive Installation and Configuration Guide

Add to Reading List

Source URL: www.simba.com

Language: English - Date: 2014-05-20 16:50:23
363Biometrics / Fingerprints / Crime prevention / Criminology / Community Oriented Policing Services / Crime analysis / Computer-aided dispatch / Automated fingerprint identification / Police / Security / Law enforcement / Law

U.S. Department of Justice Office of Community Oriented Policing Services Identifying and Measuring the Effects of Information Technologies on Law Enforcement Agencies The Making Officer Redeployment Effective Program

Add to Reading List

Source URL: www.ilj.org

Language: English - Date: 2011-11-28 11:15:57
364Economics / Insider trading / Securities and Exchange Board of India Act / Company secretary / Stock / Fiduciary / Security / Regulation S-K / United Kingdom company law / Stock market / Law / Financial economics

ZEN TECHNOLOGIES LIMITED CODE OF CONDUCT FOR PREVENTION OF INSIDER TRADING TABLE OF CONTENTS S. No

Add to Reading List

Source URL: www.zentechnologies.com

Language: English - Date: 2012-11-12 05:02:57
365Agronomy / Emerging technologies / Environmental issues / Genetically modified food / Genetically modified organism / Biotechnology / Plant breeding / Genetically modified plant / Food security / Biology / Molecular biology / Genetic engineering

THE OFFICIAL AUSTRALIAN REFERENCE GUIDE TO AGRICULTURAL BIOTECHNOLOGY AND GM CROPS SECO N D ED I T I O N

Add to Reading List

Source URL: www.abca.com.au

Language: English - Date: 2015-03-25 00:31:08
366Security / Application firewall / Computer security / Akamai Technologies / Firewall / Denial-of-service attack / Computer network security / Computing / Cyberwarfare

AKAMAI CLOUD SECURITY SOLUTIONS: PRODUCT BRIEF Kona Web Application Firewall Application- layer defense to protect against attacks like SQL injections and cross-site scripts Everyone connected to the enterprise – wor

Add to Reading List

Source URL: www.akamai.de

Language: English - Date: 2014-07-29 16:36:01
367Privacy / Data privacy / Computing / Internet privacy / Information privacy / Data Protection Act / Privacy-enhancing technologies / Cloud computing security / Ethics / Identity management / Social issues

UK Access Management Federation for Education and Research Recommendations for Use of Personal Data 4th July 2014

Add to Reading List

Source URL: www.ukfederation.org.uk

Language: English - Date: 2014-07-08 06:33:04
368Akamai Technologies / Content delivery network / Performance management / System administration / Software as a service / Business transaction management / IBM cloud computing / Application firewall / Cloud computing / Computing / Centralized computing

PRODUCT BRIEF Cloud Monitor A Cloud-based API solution that puts critical transaction and security event data at your fingertips As you migrate an increasing number of applications and services to the Cloud, more of you

Add to Reading List

Source URL: www.akamai.com

Language: English - Date: 2013-10-01 04:06:01
369Health / Backup / Law / Dentistry / Computer security / Data privacy / Health Insurance Portability and Accountability Act / Privacy law

CASE STUDY: SOLUTIONSTART TECHNOLOGIES 1 | ® 2014 StorageCraft. All rights reserved.

Add to Reading List

Source URL: www.storagecraft.com

Language: English - Date: 2014-08-06 17:15:24
370Computing / Data privacy / Computer law / Law / Regulatory compliance / Payment Card Industry Data Security Standard / Information security / Health Insurance Portability and Accountability Act / Akamai Technologies / Computer security / Data security / Security

AKAMAI FEATURE Akamai Compliance Management Reduce Risk with SSL Delivery and Acceleration Services Help support PCI, ISO, FISMA, BITS and HIPAA Compliance Initiatives Maintaining regulatory compliance for your business

Add to Reading List

Source URL: www.akamai.com

Language: English - Date: 2013-05-02 06:58:00
UPDATE