Computer surveillance

Results: 1478



#Item
551Software / Intrusion detection system / Intrusion prevention system / Network security / Surveillance / Clone Systems /  Inc. / Snort / Computer network security / Computer security / System software

Lan-Secure Security Center If network security is your most important asset You need Security Center to help you keep it that way

Add to Reading List

Source URL: www.lan-secure.com

Language: English - Date: 2015-01-10 16:01:14
552Technology / Surveillance / Packaging materials / Encodings / Label / Cycle count / Inventory / Universal Product Code / Library computer system / Automatic identification and data capture / Identification / Barcodes

Track’Em™ Version 3.1 Getting Started Guide Track’Em – Getting Started Guide

Add to Reading List

Source URL: www.barcode-solutions.com

Language: English - Date: 2010-10-16 21:16:43
553Email / Public safety / Crime prevention / Workplace surveillance / Computer surveillance / Information security / Computer surveillance in the workplace / Security / National security / Surveillance

POLICY Computer Surveillance Policy Purpose To detail the circumstances in which computer surveillance could be

Add to Reading List

Source URL: www.mq.edu.au

Language: English - Date: 2013-03-24 19:10:10
554National security / Technology / Computing / Internet / New media / Scientific revolution / Computer security / Defensive computing / Workplace surveillance / Security / Computer network security / Crime prevention

INDIGO SCAPE INTERNET MANAGEMENT SECURITY SOFTWARE SYSTEMS Manage and Monitor Internet Use, Restrict Access, Filter Websites and Content with Indigo Scape Surfing the Internet has become a favourite pastime of people of

Add to Reading List

Source URL: www.indigosecure.com

Language: English - Date: 2010-10-20 06:54:00
555Australian intelligence agencies / Surveillance / Signals intelligence / TEMPEST / United States government secrecy / Computer security / Defence Signals Directorate / Information security / Security / National security / Espionage

Australian Government Department of Defence Australian Emanation Security Program (ESP)

Add to Reading List

Source URL: asd.gov.au

Language: English - Date: 2010-12-22 19:57:05
556Computer icon / Land Registry / Government / Law / Real property law / Long Range Surveillance / Land registration

GOVERNMENT OF SAMOA SAMOA SECOND INFRASTRUCTURE AND ASSET MANAGEMENT PROJECT (SIAM II) COMPONENT 5.01: LAND ADMINISTRATION AND SURVEY

Add to Reading List

Source URL: www.mnre.gov.ws

Language: English - Date: 2014-12-10 16:37:00
557Human–computer interaction / Surveillance / Impinj / Clipped tag / Radio-frequency identification / Automatic identification and data capture / Technology

19 RFID Technology, Security Vulnerabilities, and Countermeasures Qinghan Xiao1, Thomas Gibbons2 and Hervé Lebrun2 1Defence

Add to Reading List

Source URL: cdn.intechopen.com

Language: English - Date: 2014-03-14 22:28:46
558Human–computer interaction / Surveillance / Privacy / Wireless / BlueBean / CISC Semiconductor / Radio-frequency identification / Automatic identification and data capture / Technology

INVENTOLABS PRESS-KIT www.inventolabs.ru o p e r a t o r

Add to Reading List

Source URL: icbcom.ru

Language: English - Date: 2015-02-11 06:28:29
559Public safety / Crime prevention / Law enforcement / Closed-circuit television / Mass surveillance / Automatic number plate recognition / Panopticon / Highways Agency CCTV / Talking CCTV / Security / National security / Surveillance

Man or a Gorilla? Performance Issues with CCTV Technology in Security Control Rooms H.U. Kevala, M.A. Sassea. a Department of Computer Science, University College of London, London, WC1E 6BT, UK

Add to Reading List

Source URL: hornbeam.cs.ucl.ac.uk

Language: English - Date: 2006-10-25 10:29:23
560Employee monitoring / Internet privacy / Ethics / Employment / Privacy policy / Employee benefit / Technology / Behavior / Computer surveillance in the workplace / Privacy / Surveillance / Employment compensation

Personal Data (Privacy) Ordinance Privacy Guidelines: Monitoring and Personal Data Privacy at Work

Add to Reading List

Source URL: www.cuhk.edu.hk

Language: English - Date: 2009-08-25 06:36:48
UPDATE