and Security Technologies

Results: 1110



#Item
501United States Department of Homeland Security / Public safety / Computer crimes / International Multilateral Partnership Against Cyber Threats / Federal Information Security Management Act / Comprehensive National Cybersecurity Initiative / National Cyber Security Division / U.S. Department of Defense Strategy for Operating in Cyberspace / Cyberwarfare / Security / Computer security

Statement of Melissa E. Hathaway before the House of Representatives Committee on Homeland Security, Sub-Committee on Cybersecurity, Infrastructure Protection and Security Technologies “Examining the Homeland Security

Add to Reading List

Source URL: homeland.house.gov

Language: English - Date: 2011-06-23 15:11:22
502Technology / Security / Year of birth missing / Human rights / Surveillance / Katherine Albrecht / Internet privacy / Spychip / Ambient intelligence / Privacy / Ethics / Radio-frequency identification

5. ubiquitous computing and spatial privacy anne uteck Introduction 83 The technological dimensions and implications 85 A. Enabling Technologies 85 B. Ubiquitous Computing (Ubicomp) 88

Add to Reading List

Source URL: idtrail.org

Language: English - Date: 2009-03-27 16:31:29
503WikiLeaks / Espionage / National security / Web 2.0 / Whistleblowing / Julian Assange / OVH / HBGary / PRQ / World Wide Web / Security / Computing

The  WikiLeaks  Threat   An  Overview  by  Palan6r  Technologies,  HBGary   Federal,  and  Berico  Technologies   WikiLeaks  Overview   •  WikiLeaks was launched in 2006

Add to Reading List

Source URL: www.wikileaks.org

Language: English - Date: 2014-07-19 12:08:57
504Computer security / Hacking / Computer network security / Electronic warfare / Huawei / Stuxnet / Cyberterrorism / Industrial espionage / Zero-day attack / Cybercrime / Cyberwarfare / Computer crimes

Cyber Security Perspectives 21st century technology and security – a difficult marriage John Suffolk SVP | Global Cyber Security Officer Huawei Technologies

Add to Reading List

Source URL: www.huawei.com

Language: English - Date: 2012-09-05 16:04:01
505Computing / Voice over IP / Computer security / Password / Network security / Hacker / Electronics / Computer network security / Security / Wireless security

Security Strategies COVER STORY Technologies and tools for safer networks

Add to Reading List

Source URL: www.linux-magazine.com

Language: English
506Data / Computer network security / Trusted computing / Internet protocols / StrongSwan / Trusted Network Connect / IF-MAP / Trusted Computing Group / Internet Key Exchange / Computer security / Computing / Cryptographic protocols

The Linux Integrity Measurement Architecture and TPM-Based Network Endpoint Assessment Andreas Steffen ITA Institute for Internet Technologies and Applications HSR University of Applied Sciences Rapperswil CH-8640 Rapper

Add to Reading List

Source URL: www.strongswan.org

Language: English - Date: 2012-08-29 15:32:53
507United States Department of Homeland Security / Public safety / Electronic warfare / Hacking / Military technology / Critical infrastructure protection / Computer security / Internet Security Alliance / International Multilateral Partnership Against Cyber Threats / National security / Cyberwarfare / Security

    Testimony of Larry Clinton, President & CEO Internet Security Alliance before the Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies

Add to Reading List

Source URL: homeland.house.gov

Language: English - Date: 2011-06-23 15:11:15
508Computing / Voice over IP / Computer security / Password / Network security / Hacker / Electronics / Computer network security / Security / Wireless security

Security Strategies COVER STORY Technologies and tools for safer networks

Add to Reading List

Source URL: www.linux-magazine.com

Language: English
509Systems theory / Electric power transmission systems / Cybernetics / Development / Infrastructure / Electric power system / Computer security / System / Electrical grid / Security / National security / Electromagnetism

DECISION TECHNOLOGIES FOR PROTECTION OF CRITICAL INFRASTRUCTURES Earl E. Lee, II 1 Department of Decision Sciences and Engineering Systems Rensselaer Polytechnic Institute CII 5107, 110 Eighth St.

Add to Reading List

Source URL: eaton.math.rpi.edu

Language: English - Date: 2005-05-06 10:59:45
510Surveillance / Fingerprint recognition / Fingerprint / Automated fingerprint identification / Public key fingerprint / Authentication / Palm print / Fingerprint Verification Competition / Finger vein recognition / Fingerprints / Biometrics / Security

Special Issue on Security for Network Society Detection and Recognition Technologies Fingerprint Identification By Kaoru UCHIDA*

Add to Reading List

Source URL: www.nec.com

Language: English - Date: 2013-10-21 08:28:48
UPDATE