and Security Technologies

Results: 1110



#Item
671International standards / Medical informatics / Substance abuse / Health informatics / Substance-related disorders / Personal health record / Confidentiality / Electronic health record / Substance use disorder / Ethics / Health / Medicine

National Association of State Alcohol and Drug Abuse Directors (NASADAD) Comments: Privacy and Security and Emerging Technologies 1. Privacy and Security and Emerging Technologies What privacy and security risks, concern

Add to Reading List

Source URL: nasadad.org

Language: English - Date: 2011-07-15 15:04:31
672

William (Bill) Harrod, CISSP William Harrod is a Public Sector Cyber-Security Advisor for CA Technologies. As an Information Security Executive and Cyber-Security Professional, Mr. Harrod has over twenty years of experie

Add to Reading List

Source URL: www.federalnewsradio.com

- Date: 2014-10-07 16:40:14
    673Civil defense / Human decontamination / Hygiene / Safety / Security / Milling cutter / Mining / Concrete / Visual arts / Prevention / Technology / Building materials

    IAEA Workshop Decontamination Technologies – Mechanical Methods Dipl.-Ing. Patrick Kern Technology and Management for the Decommissioning of Nuclear Facilities – Prof. Dr.-Ing. Sascha Gentes

    Add to Reading List

    Source URL: www-ns.iaea.org

    Language: English - Date: 2010-11-23 06:24:03
    674Surveillance / National security / Face recognition / Identification / Fingerprint / Integrated Automated Fingerprint Identification System / Iris recognition / Facial recognition system / Authentication / Biometrics / Security / Fingerprints

    STATUS REPORT ON THE EFFORTS TO DEVELOP AND CERTIFY ACCURACY STANDARDS FOR BIOMETRIC TECHNOLOGIES

    Add to Reading List

    Source URL: biometrics.nist.gov

    Language: English - Date: 2003-02-06 07:40:27
    675Computing / ESET / Kerio Control / Kerio Connect / ESET NOD32 / Kerio Technologies / Software / System software / Antivirus software

    Datasheet ESET Security for Kerio provides proactive malware protection by scanning email and web traffic processed by Kerio Connect or Kerio Control applications. It also protects the Windows server host from malware, b

    Add to Reading List

    Source URL: static3.esetstatic.com

    Language: English - Date: 2013-11-06 12:42:15
    676Nanomaterials / Regulation / National Institute of Standards and Technology / Public administration / Technology / Impact of nanotechnology / Regulation of nanotechnology / Emerging technologies / Nanotechnology / Time

    Achieving the Vision for Perimeter Security and Economic Competitiveness

    Add to Reading List

    Source URL: nanotech.lawbc.com

    Language: English - Date: 2012-11-30 19:08:55
    677Security / GSA Advantage / Ergonomics / Sexual harassment / Safety culture / Workplace violence / Safety / Occupational safety and health / Risk

    Coastal Training Technologies GSA Authorized MOBIS Federal Supply Schedule Price List GSA number: GS-02F-9309C

    Add to Reading List

    Source URL: www.gsaadvantage.gov

    Language: English - Date: 2011-12-05 15:05:07
    678Environment / International development / Food security / Security / Urban agriculture / Agricultural productivity / Poverty / Productivity / Agriculture / Humanitarian aid / Development / Sustainable agriculture

    Empowering poor rural communities with labour saving technologies for increased labour productivity, food production and income generation UN Trust Fund for Human Security Fast Facts

    Add to Reading List

    Source URL: docs.unocha.org

    Language: English - Date: 2014-04-29 09:54:17
    679Smart grid / Measurement / Computer security / Cloud computing / Grid computing / Smart meter / Energy / Technology / Emerging technologies

    Breakout Session 4A: Cybersecurity Strategy Vicky Yan Pillitteri [removed] Acting SGIP SGCC Chair and Cybersecurity Advisor, Computer Security Division, Information Technology Laboratory

    Add to Reading List

    Source URL: members.sgip.org

    Language: English
    680Computing / ESET NOD32 / ESET / Kerio Connect / Kerio Control / Virus Bulletin / Kerio Technologies / Software / Antivirus software / System software

    Datasheet ESET NOD32 Antivirus for Kerio Connect Without a reliable antivirus solution on your Kerio Connect, you risk tremendous costs in data loss, security breaches and missed business opportunities that can result f

    Add to Reading List

    Source URL: static3.esetstatic.com

    Language: English - Date: 2012-11-28 14:37:31
    UPDATE