Computer surveillance

Results: 1478



#Item
631National security / Computer security / Surveillance / Computer network security / Burglar alarm / Access control / IP camera / Security / Safety / Crime prevention

Case Study Siam City Cement (SCCC) “Aimetis intelligent video management software allows us to remotely monitor our plants and critical areas, such as the explosives

Add to Reading List

Source URL: az446929.vo.msecnd.net

Language: English - Date: 2013-08-02 17:08:03
632Internet activism / Legal aspects of computing / Year of birth missing / Technology / Center for Internet and Society / Berkman / Harvard Law School / William W. Fisher / Massachusetts / Computer law / Cyberspace / Harvard University

Summer School INTERNET L@W / University of Geneva / June 15 – June 26, [removed]www.internetlaw-geneva.ch Tuesday June 16 Internet surveillance: global challenges and perspectives

Add to Reading List

Source URL: www.genevasummerschools.ch

Language: English - Date: 2015-02-19 03:26:42
633Password / IEEE / Login / PC Card / Computer hardware / Computing / Disk encryption

Tactical IT Intrusion Portfolio FINFIREWIRE Technical Surveillance Units and Forensic Experts often face a situation where they need to access a running computer system without shutting it down in order to prevent data

Add to Reading List

Source URL: wikileaks.org

Language: English - Date: 2013-09-04 13:55:34
634National security / Computer network security / Security guard / Surveillance / Certified Information Systems Security Professional / Computer security / Security / Crime prevention / Public safety

Information security training Thanks to an active presence on the security market in Luxembourg for over 10 years, Dartalis assists and advises the field of information security with a friendly and highly experienced tea

Add to Reading List

Source URL: www.dartalis.lu

Language: English - Date: 2011-10-19 13:07:18
635Public safety / Prevention / Surveillance / Physical security / Computer security / Cisco Systems / Security / Crime prevention / National security

North Bend Schools Automate Lockdown with Genetec Security Center Public School District in Nebraska Upgrades to IP Video Surveillance and Access Control to Better Protect Students MONTRÉAL (PRWEB) August 27, [removed]Ge

Add to Reading List

Source URL: www.prweb.com

Language: English - Date: 2014-08-27 14:00:14
636Technology / Automatic identification and data capture / Machine learning / Radio-frequency identification / Wireless / Activity recognition / Surveillance / Human factors / Pattern recognition / Ethics / Science / Privacy

Real-Time Crowd Labeling for Deployable Activity Recognition Walter S. Lasecki, Young Chol Song, Henry Kautz, and Jeffrey P. Bigham University of Rochester Computer Science {wlasecki, ysong, kautz, jbigham}@cs.rochester.

Add to Reading List

Source URL: www.cs.rochester.edu

Language: English - Date: 2012-12-11 18:12:18
637GPS tracking unit / Surveillance / Wireless / Smartphones / Technology / GPS

Dolphin 9700 Mobile Computer Honeywell’s Dolphin® 9700 rugged digital assistant maximizes worker productivity and reduces operating costs by providing reliable and easyto-use multi-modal communication and data collect

Add to Reading List

Source URL: www.mobileidsolutions.com

Language: English - Date: 2015-01-24 11:09:01
638Surveillance / Identification / Hand geometry / Smart card / Biometrics Institute / Biometric points / Security / Biometrics / National security

Biometrics – How to Put to Use and How Not at All? Andreas Pfitzmann TU Dresden, Faculty of Computer Science, 01062 Dresden, Germany [removed]

Add to Reading List

Source URL: dud.inf.tu-dresden.de

Language: English - Date: 2008-09-22 07:43:54
639Networks / Network theory / Innovation / Social information processing / Surveillance / Business cluster / Social network / Computer cluster / Science / Structure / Computing

OECD Workshop on Network approaches to Innovation December 8, 2008 Who cultivates the inter-firm networks in regional cluster ? -Innovation and Social Networks-

Add to Reading List

Source URL: www.oecd.org

Language: English - Date: 2014-07-21 01:43:18
640Technology / Electronic commerce / Surveillance / Computer law / Email / Internet privacy / Chief privacy officer / Legal aspects of computing / Consumer privacy / Ethics / Privacy / Computing

Global Co-Operation in the New Millennium The 9th European Conference on Information Systems Bled, Slovenia, June 27-29, 2001 CYBERLIABILITY: IS THE CHIEF PRIVACY OFFICER THE SOLUTION? Janice C. Sipior

Add to Reading List

Source URL: is2.lse.ac.uk

Language: English - Date: 2001-05-31 06:22:54
UPDATE