and Security Technologies

Results: 1110



#Item
561Computer network security / Software testing / Secure communication / National security / Web application security / Password / Penetration test / Cross-site scripting / HTTP Secure / Computer security / Security / Cyberwarfare

Securing Web Application Technologies (SWAT) C h e c k l i s t The SWAT Checklist provides an easy-to-reference set of best practices that raise awareness and help development teams create more secure applications. It’

Add to Reading List

Source URL: www.securingthehuman.org

Language: English - Date: 2015-01-28 15:57:38
562Management / Authorized economic operator / World Customs Organization / Supply chain security / Machine-to-Machine / Trade facilitation / Single-window system / Export / Internet of Things / International trade / Business / Supply chain management

Global Trade 2020 Achieving the Vision of Interconnected Customs Innovative technologies and policies are laying the foundation for a Global Networked Customs that promotes streamlined, secure trade.

Add to Reading List

Source URL: www.dnb.com

Language: English - Date: 2015-01-15 16:03:49
563National Institute of Justice / United States Department of Justice / Surveillance / National Law Enforcement and Corrections Technology Center / Crime / Security / Law enforcement

U.S. Department of Justice Office of Justice Programs National Institute of Justice Sensor, Surveillance, and Biometric Technologies (SSBT) Submitted by

Add to Reading List

Source URL: www.wolfcomusa.com

Language: English - Date: 2014-06-29 00:49:32
564Computer network security / Computer security / Computer crimes / Public safety / International Multilateral Partnership Against Cyber Threats / Information security / Application security / Penetration test / Database security / Security / Crime prevention / National security

Bellevue University Cybersecurity Programs & Courses Undergraduate Course List Core Courses: CYBR 250 Introduction to Cyber Threats, Technologies and Security

Add to Reading List

Source URL: www.bellevue.edu

Language: English - Date: 2014-01-16 12:39:06
565Computing / Ethics / Digital divide / Federal administration of Switzerland / Computer security / International Telecommunication Union / Privacy / Information and communication technologies in education / Information and communications technology / Technology / Communication / Information technology

Federal Department of the Environment, Transport, Energy, and Communications DETEC Federal Office of Communications OFCOM Media Service Media Release

Add to Reading List

Source URL: www.petiteshistoiresdinternet.ch

Language: English - Date: 2010-11-10 14:38:06
566Security / Safety / Prevention / Biosafety / Genetic engineering / Biosecurity / Biorisk / European BioSafety Association / Biological hazard / Risk / Bioethics / Biology

Over 12,000 installations. 40 years experience. One name. Allentown. For four decades, Allentown’s full line of research animal housing and airflow technologies have provided

Add to Reading List

Source URL: www.ebsaweb.eu

Language: English - Date: 2008-11-04 10:38:07
567Military technology / Military science / Security / Man-portable air-defense systems / Missile / SOM

SPIE Technologies for Optical Countermeasures XI; and High-Power Lasers 2014, Amsterdam, September[removed]Aircraft Vulnerability Analysis by Modelling and Simulation Cornelius J. Willersa, Maria S. Willersb and Alta de Wa

Add to Reading List

Source URL: researchspace.csir.co.za

Language: English - Date: 2014-12-15 16:55:16
568Computing / ESET / Kerio Control / Kerio Connect / ESET NOD32 / Kerio Technologies / Software / System software / Antivirus software

Datasheet ESET Security for Kerio provides proactive malware protection by scanning email and web traffic processed by Kerio Connect or Kerio Control applications. It also protects the Windows server host from malware, b

Add to Reading List

Source URL: static2.esetstatic.com

Language: English - Date: 2013-11-06 12:42:15
569Identity document / Business / Identification / Stored-value card / Credit card / Payment systems / Debit card / Security

SOLUTIONS Say Goodbye to Prepaid Gas Cards and Incentive Cards By Mike Miller, NonProfit Technologies, Inc. Does your staff seem slavishly devoted to managing card programs such as Prepaid Gas Cards and Prepaid

Add to Reading List

Source URL: www.cpaz.com

Language: English - Date: 2014-11-16 05:56:14
570FIPS 140 / Password / Computing / Cyberwarfare / Security and safety features new to Windows Vista / Security token / Cryptography standards / Computer security / FIPS 140-2

3e Technologies International (3eTI) FIPS[removed]Non-Proprietary Security Policy 3e Technologies International, Inc. FIPS[removed]Non-Proprietary Security Policy

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-12-01 01:13:44
UPDATE