Computer surveillance

Results: 1478



#Item
481Public safety / French words and phrases / Crime prevention / Mixed reality / Virtual reality / Sousveillance / Augmented reality / Stereoscopy / Closed-circuit television / Security / National security / Surveillance

Walking through Sight: Seeing the Ability to See, in a 3-D Augmediated Reality Environment Ryan Janzen, Seyed Nima Yasrebi, Avishek Joey Bose, Arjun Subramanian, Steve Mann Department of Electrical and Computer Engineeri

Add to Reading List

Source URL: www.eyetap.org

Language: English - Date: 2015-03-02 12:11:52
482Encodings / Label / Mail / Technology / Surveillance / Identification / Computer printers / Automatic identification and data capture / Packaging materials / Barcode

Microsoft Word - CustomLabelRequestForm.doc

Add to Reading List

Source URL: www.barcode-solutions.com

Language: English - Date: 2007-11-05 08:14:58
483Public safety / Information sensitivity / Surveillance / Computer network security / Computer security / Polygraph / Biometrics / Non-disclosure agreement / Outsourcing / Security / National security / Crime prevention

Pactera Security Building Smarter Companies Pactera Technology International is the leading China-based provider of Consulting, Solutions, and Offshore Development to the Global[removed]Operating out of 35 offices

Add to Reading List

Source URL: www.pactera.com

Language: English - Date: 2013-04-17 13:58:32
484Crime prevention / Surveillance / Human–computer interaction / Law enforcement / Wearable computer / Steve Mann / User interface / Computer / Personal computer / Human–computer interaction / Security / National security

Humanistic Computing: “WearComp” as a New Framework and Application for Intelligent Signal Processing STEVE MANN, MEMBER, IEEE Invited Paper

Add to Reading List

Source URL: www.eyetap.org

Language: English - Date: 2013-11-22 21:58:42
485Public safety / Crime prevention / Privacy of telecommunications / Law enforcement / Workplace surveillance / Computer surveillance / Closed-circuit television / Internet privacy / Computer surveillance in the workplace / National security / Security / Surveillance

< INCLUDEPICTURE "http://act.greens.org.au/shop/includes/templates/classic/images/greens_logo.jpg" * MERGEFORMATINET >

Add to Reading List

Source URL: www.legislation.act.gov.au

Language: English - Date: 2010-07-28 19:25:06
486Spintronics / Electronics / Surveillance / Signals intelligence / TEMPEST / United States government secrecy / Hard disk drive / Asynchrony / Side channel attack / Computer hardware / Espionage / Magnetic ordering

Electromagnetic Analysis of Synchronous and Asynchronous Circuits using Hard Disc Heads Theo Markettos, Simon Moore 16th UK Asynchronous Forum

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2004-09-08 08:49:11
487Data privacy / Computer law / Internet privacy / Personally identifiable information / Legal aspects of computing / Surveillance / Medical privacy / Ethics / Privacy / Law

Microsoft Word - CLPC Submission on UPPs final.doc

Add to Reading List

Source URL: www.cyberlawcentre.org

Language: English - Date: 2013-12-09 02:29:52
488Public safety / Surveillance / Computer network security / Security engineering / Security guard / Computer security / Unique Identification Authority of India / Closed-circuit television / Security / Crime prevention / National security

STEER CLEAR OF PLANT THEFT Security advice for manufacturers, owners, hirers and users

Add to Reading List

Source URL: www.psni.police.uk

Language: English - Date: 2009-12-14 05:00:36
489Law enforcement / Identity document / Identity theft / Surveillance / David Lyon / Biometrics / Computer security / Security / Crime prevention / National security

The Problems with ldentity: Distribution, Agehcy, and ldentification Rachel A. Wortman,

Add to Reading List

Source URL: facpub.stjohns.edu

Language: English - Date: 2011-05-31 09:09:32
490Computer security / Surveillance / Physical access / IEEE / Automated teller machine / Man-in-the-middle attack / Password / Keystroke logging / BIOS / Computing / Security / Computer hardware

Hit by a Bus: Physical Access Attacks with Firewire Presented By Adam Boileau Ruxcon 2006 Copyright Security-Assessment.com 2006

Add to Reading List

Source URL: www.security-assessment.com

Language: English - Date: 2006-10-02 16:03:58
UPDATE