and Security Technologies

Results: 1110



#Item
71National security / Emerging technologies / Life skills / Motivation / Business continuity and disaster recovery / Resilience / Psychological resilience / Computer security / Autonomous car / Platoon / Ecological resilience / Vehicular automation

Session 19 - CYBER SECURITY AND RESILIENCE CHALLENGES AND OPPORTUNITIES FOR SELF-DRIVING VEHICLES

Add to Reading List

Source URL: higherlogicdownload.s3.amazonaws.com

Language: English - Date: 2016-08-04 10:12:32
72Cryptography / Ambient intelligence / Internet of things / Enhanced privacy ID / Gateway / Intel Security / Intel / Computer security / Machine to machine / Jasper Technologies / Sigfox

Internet of Things Security Backgrounder Confidence, Safety and Security in the Digital World The Internet of Things (IoT) has the potential to transform our world and reshape the way we interact with our environment. Mi

Add to Reading List

Source URL: download.intel.com

Language: English - Date: 2015-11-02 18:47:16
73Information technology / Open government / E-democracy / E-commerce / Government / E-government / E-governance / Information and communications technology / Information and communication technologies for development / Draft:ICT Security Policy System: A Case Study

Microsoft Word - Chap6Iglesias_Egovernment Assessment on Philippine Cities-revised by Jen

Add to Reading List

Source URL: pascn.pids.gov.ph

Language: English - Date: 2014-08-11 04:07:44
74Cyberwarfare / Cybercrime / Information and communication technologies for development / National security / International Telecommunication Union / Cyberspace / Internet Governance Forum / Computer security / Commonwealth of Nations / International Multilateral Partnership Against Cyber Threats / Commonwealth Telecommunications Organisation

The role of the Commonwealth in facilitating cooperation in Cyberspace Shola Taylor, Secretary-General, Commonwealth Telecommunications Organisation Commonwealth Cybersecurity Forum 2016, 23 March 2015 Honourable Adriel

Add to Reading List

Source URL: www.cto.int

Language: English - Date: 2016-06-23 04:56:26
75Federally Funded Research and Development Centers / United States Department of Energy national laboratories / University of California / Battelle Memorial Institute / Ernest Lawrence / Lawrence Livermore National Laboratory / BWX Technologies / Livermore /  California / National Nuclear Security Administration / Livermore

FOR IMMEDIATE RELEASE June 1, 2015 Contact: Carrie Martin Phone: (E-mail: LAWRENCE LIVERMORE NATIONAL SECURITY, LLC ANNOUNCES

Add to Reading List

Source URL: www.llnsllc.com

Language: English - Date: 2015-06-01 15:03:45
76Information technology / Communications technology / Information and communications technology / Draft:ICT Security Policy System: A Case Study / Information and communication technologies for development

SOKOINE UNIVERSITY OF AGRICULTURE INFORMATION AND COMMUNICATION TECHNOLOGY POLICY

Add to Reading List

Source URL: www.sua.ac.tz

Language: English - Date: 2016-07-19 06:49:25
77Cyberwarfare / Denial-of-service attacks / Computer network security / Denial-of-service attack / Internet Relay Chat / Botnet / Computer security / NTP server misuse and abuse / Network Time Protocol / Prolexic Technologies / Lizard Squad

First Line of Defense ® FIRST LINE OF DEFENSE

Add to Reading List

Source URL: www.corero.com

Language: English - Date: 2015-03-30 11:14:59
78E-commerce / Merchant services / Payment systems / Credit cards / 3-D Secure / Payment Card Industry Data Security Standard / MasterCard / Chargeback / Debit card / Visa Inc. / One-time password / Payment gateway

Press Release 10 February 2015 AsiaPay Launches New Hosted 3D Secure ACS Service for Banks AsiaPay Technology, the ePayment technology arm of AsiaPay, focusing on innovative payment technologies and services across Asia-

Add to Reading List

Source URL: www.asiapay.com

Language: English - Date: 2015-02-10 23:19:57
79Computing platforms / Arxan Technologies / Cyberwarfare / Computer network security / .NET Framework / Malware / Computer security / Proprietary software / Cross-platform / Obfuscation / Software / Windows XP

Protecting .NET Software Applications Arxan Best Practices White Paper Arxan Technologies White Paper – Arxan protects your IP from software piracy, tampering, reverse engineering and any manner of theft. 1

Add to Reading List

Source URL: www.arxan.com

Language: English - Date: 2016-08-01 23:55:30
80Emerging technologies / Smart devices / Ambient intelligence / Internet of things / Smart grid / Computer security / Smart lock / Smart / Lock / Smart meter / Smart gun

The Safe & Smart Home: Security in The Smart Home Era Executive Summary While convenience and comfort are the most commonly touted benefits when it comes to the smart home, it turns out the biggest reason consumers adop

Add to Reading List

Source URL: august.com

Language: English - Date: 2016-04-21 00:23:13
UPDATE