Computer surveillance

Results: 1478



#Item
561Behavior / Obfuscation / Crime prevention / Law enforcement / National security / Internet privacy / Data mining / Surveillance / Information privacy / Ethics / Privacy / Computer programming

PDF Document

Add to Reading List

Source URL: www.nyu.edu

Language: English - Date: 2013-09-19 11:00:35
562Crime prevention / Surveillance / Security guard / Closed-circuit television / Airport security / Computer security / Security / Public safety / National security

DOC Document

Add to Reading List

Source URL: communitysafety.police.wa.gov.au

Language: English - Date: 2013-11-11 19:47:44
563Human rights / Employee monitoring / Internet privacy / Domestic worker / Abuse / Computer surveillance in the workplace / Ethics / Privacy / Surveillance

PDF Document

Add to Reading List

Source URL: www.pcpd.org.hk

Language: English - Date: 2014-09-25 14:27:07
564Computer network security / Surveillance / Video / Computer networking / Closed-circuit television / Port forwarding / Network address translation / Firewall / Gateway / Security / National security / Computing

White paper Remote Connect Services Axis One-Click Camera Connection Prepared by: John Rasmussen, Product Manager, Milestone XProtect® Corporate Milestone Systems

Add to Reading List

Source URL: www.milestonesys.com

Language: English - Date: 2015-02-13 03:29:45
565Email / Security / Internet ethics / Spamming / National security / Workplace surveillance / Computer surveillance / Internet privacy / Spam / Internet / Surveillance / Computing

Microsoft Word - Workplace Surveillance policy_ May 11 FINAL

Add to Reading List

Source URL: www.statesuper.nsw.gov.au

Language: English - Date: 2013-07-03 23:03:17
566Criminology / Computer crimes / Criminal law / Cyberspace / Information Age / Crime prevention / Internet privacy / Surveillance / Legal aspects of computing / Crime / Law enforcement / Law

CRIME AND TECHNOLOGY IN THE GLOBAL VILLAGE P.N. Grabosky Australian Institute of Criminology Paper presented at the conference: Internet Crime

Add to Reading List

Source URL: aic.gov.au

Language: English - Date: 2009-06-09 04:55:31
567Kitware / DARPA / Computer vision / VIRAT / VTK / Air Force Research Laboratory / Object recognition / Software / Free software / Surveillance

• Kitware, Inc. • PI: Anthony Hoogs, PhD • On Finder, we can contribute: – 3D reconstruction from video and images – 3D scene understanding

Add to Reading List

Source URL: www.iarpa.gov

Language: English - Date: 2014-03-06 18:49:30
568Human–computer interaction / Surveillance / RFdump / Impinj / ODIN technologies / Radio-frequency identification / Automatic identification and data capture / Technology

RFID SECURITY February 2008 © The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be

Add to Reading List

Source URL: www.infosec.gov.hk

Language: English - Date: 2011-03-29 08:30:10
569Computer virus / Security / Internet privacy / Email / Surveillance / Data security / Password manager / Malware / Password / Internet / Computing

Top security tips for home users

Add to Reading List

Source URL: www.asd.gov.au

Language: English - Date: 2014-01-14 21:25:20
570Malware / Computer virus / Trojan horse

Quantum of Surveillance: Familiar Actors and Possible False Flags in Syrian Malware Campaigns A joint Citizen Lab-EFF Report By

Add to Reading List

Source URL: www.eff.org

Language: English - Date: 2013-12-29 00:07:38
UPDATE