Computer and network surveillance

Results: 80



#Item
71Network architecture / Freenet / Presence information / Computer architecture / Software / Computing / Infranet

Infranet: Circumventing Web Censorship and Surveillance Nick Feamster, Magdalena Balazinska, Greg Harfst, Hari Balakrishnan, David Karger MIT Laboratory for Computer Science feamster, mbalazin, gch, hari, karger  @lcs.m

Add to Reading List

Source URL: wind.lcs.mit.edu

Language: English - Date: 2004-10-06 14:55:09
72Public safety / Concurrent computing / Data management / Computer network security / Data security / Data center / Backup / Computer security / Surveillance / Security / Crime prevention / National security

www.sapdatacenter.com How Secure Is the Data Center? Security – Chapter[removed]The SAP data center is designed to withstand various potential threads both from internal and external like:

Add to Reading List

Source URL: www.sapdatacenter.com

Language: English - Date: 2013-08-30 04:29:26
73Computer network security / Crime prevention / National security / Threat / Vulnerability / Access control / Audit trail / Surveillance / Authorization / Security / Cyberwarfare / Computer security

Computer Security Threat Monitoring and Surveillance

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-04-12 15:08:44
74Ethics / National security / United States Department of Homeland Security / Computer network security / Computer security / International Multilateral Partnership Against Cyber Threats / Privacy / Cyber-security regulation / National Cyber Security Division / Computer crimes / Security / Cyberwarfare

Myth v. Fact: Cyber Intelligence Sharing and Protection Act of[removed]CISPA) MYTH: This legislation creates a wide-ranging government surveillance program. FACT:  The bill has nothing to do with government surveillanc

Add to Reading List

Source URL: intelligence.house.gov

Language: English - Date: 2013-02-13 11:11:15
75Password / System administrator / Information security / Public safety / Security and safety features new to Windows Vista / Logical security / Security / Computing / Computer security

Occupational Health Safety Network (OHSN) Rules of Behavior February 2013 Introduction OHSN is a voluntary and secure electronic occupational safety and health surveillance system maintained by the National Institute for

Add to Reading List

Source URL: www.cdc.gov

Language: English - Date: 2014-03-12 10:46:18
76National security / United States Department of Homeland Security / Computer network security / Computer security / International Multilateral Partnership Against Cyber Threats / Crime / Internet privacy / National Cyber Security Division / Internet kill switch / Computer crimes / Security / Cyberwarfare

Myth v. Fact: H.R. 624, The Cyber Intelligence Sharing and Protection Act (CISPA) MYTH: This legislation creates a wide-ranging government surveillance program. FACT:  The bill has nothing to do with government survei

Add to Reading List

Source URL: intelligence.house.gov

Language: English - Date: 2013-04-18 08:32:14
77Public safety / Law enforcement / Surveillance / Security guard / Computer network security / Social Security / Computer security / Criminal record / Security / Crime prevention / Taxation in the United States

Bureau of Security and Investigative Services - Application for Security Guard or Patrolperson

Add to Reading List

Source URL: www.bsis.ca.gov

Language: English - Date: 2013-07-19 18:38:24
78Public safety / Surveillance / Computer network security / Security guard / Proprietary software / Social Security / Computer security / Security / Crime prevention / Taxation in the United States

Bureau of Security and Investigative Services - Application for Proprietary Private Security Officer[removed])

Add to Reading List

Source URL: www.bsis.ca.gov

Language: English - Date: 2013-07-12 10:21:43
79National security / Crime prevention / Computer network security / Human rights / Internet privacy / Information privacy / Surveillance / Radio-frequency identification / Closed-circuit television / Security / Privacy / Ethics

Threats to Privacy[removed]:52 Information technologies bring new and substantive threats to privacy - should they be curbed?

Add to Reading List

Source URL: www.marekfoss.org

Language: English - Date: 2013-09-05 07:04:50
80Acoustics / Keystroke logging / Spyware / Surveillance / Wireless mesh network / Covert channel / Mesh networking / Modem / Computer network / Technology / Computing / Espionage

On Covert Acoustical Mesh Networks in Air Michael Hanspach and Michael Goetz arXiv:1406.1213v1 [cs.CR] 4 Jun[removed]Fraunhofer FKIE, Wachtberg, Germany

Add to Reading List

Source URL: cryptome.org

Language: English - Date: 2014-06-06 08:01:41
UPDATE