Computer surveillance

Results: 1478



#Item
711Human–computer interaction / Surveillance / Item-level tagging / Zebra Technologies / Smart label / Electronic Product Code / Retail loss prevention / CYBRA / SAP Auto-ID Infrastructure / Radio-frequency identification / Automatic identification and data capture / Technology

A Zebra Technologies White Paper Traceability in Retail—Reducing RFID Media Costs for Best Value 2

Add to Reading List

Source URL: www.mobileidsolutions.com

Language: English - Date: 2015-01-26 03:38:50
712Human–computer interaction / Surveillance / Zebra Technologies / Smart label / Label printer / Printer / Label / CYBRA / Impinj / Radio-frequency identification / Automatic identification and data capture / Technology

A Zebra Technologies White Paper Tips for RFID Smart Label Printing/Encoding 2

Add to Reading List

Source URL: www.mobileidsolutions.com

Language: English - Date: 2015-01-26 04:50:17
713Human–computer interaction / Surveillance / Zebra Technologies / Smart label / Zebra / Real-time locating system / Label printer / CYBRA / Radio-frequency identification / Automatic identification and data capture / Technology

ES14369L_Checkin_CheckOut

Add to Reading List

Source URL: www.mobileidsolutions.com

Language: English - Date: 2015-01-26 04:12:18
714Law / Computer law / Mass surveillance / Regulation of Investigatory Powers Act

_www.informationlaw.org.uk_ - Information/Surveillance Law Resources from Ibrahim Hasan New Communications Data Regulations Part 1 Chapter 2 of the Regulation of Investigatory Powers Act[removed]RIPA) gives local authorit

Add to Reading List

Source URL: www.informationlaw.org.uk

Language: English - Date: 2010-01-29 11:13:53
715Human–computer interaction / Surveillance / Zebra Technologies / Label printer / Smart label / Zebra / SAP AG / SAP Auto-ID Infrastructure / Alien Technology / Radio-frequency identification / Automatic identification and data capture / Technology

ES14370L_RFIDShipping-Receiving

Add to Reading List

Source URL: www.mobileidsolutions.com

Language: English - Date: 2015-01-26 05:22:55
716Crime prevention / Mass surveillance / Surveillance / Privacy of telecommunications / Computer law / Regulation of Investigatory Powers Act / Intelligence Services Commissioner / Investigatory Powers Tribunal / Lawful interception / National security / Security / Law enforcement

Surveillance Road Map A shared approach to the regulation of surveillance in the United Kingdom The road map has been drawn up by the Commissioners whose work it describes, in response to suggestions that their roles and

Add to Reading List

Source URL: ico.org.uk

Language: English - Date: 2015-01-26 12:10:08
717Crime prevention / Mass surveillance / Surveillance / Privacy of telecommunications / Computer law / Regulation of Investigatory Powers Act / Intelligence Services Commissioner / Investigatory Powers Tribunal / Lawful interception / National security / Security / Law enforcement

Surveillance Road Map A shared approach to the regulation of surveillance in the United Kingdom The road map has been drawn up by the Commissioners whose work it describes, in response to suggestions that their roles and

Add to Reading List

Source URL: ico.org.uk

Language: English - Date: 2015-01-26 12:09:07
718National Strategy to Secure Cyberspace / Surveillance / Cyberspace / National Security Agency / Computer security / Center for Cybersecurity Education at the University of Dallas / Department of Defense Strategy for Operating in Cyberspace / Security / National security / Cyberwarfare

National Centers of Academic Excellence in Information Assurance/Cybersecurity 9800 Savage Road Ft. Meade, MD[removed]October 3, 2014

Add to Reading List

Source URL: www.bellevue.edu

Language: English - Date: 2014-10-07 09:36:56
719Air safety / Technology / Radar / Automatic dependent surveillance-broadcast / Aircraft instruments / Computer network security / Aircraft Communications Addressing and Reporting System / Secondary surveillance radar / Identification friend or foe / Air traffic control / Avionics / Aviation

On the Security of the Automatic Dependent Surveillance-Broadcast Protocol arXiv:1307.3664v2 [cs.CR] 15 Apr[removed]Martin Strohmeier∗ , Vincent Lenders+ , Ivan Martinovic∗

Add to Reading List

Source URL: www.lenders.ch

Language: English - Date: 2014-12-19 11:12:15
720Privacy of telecommunications / Information sensitivity / United States government secrecy / Mass surveillance / Espionage / Foreign Intelligence Surveillance Act / WikiLeaks / Gorin v. United States / Protected computer / National security / Security / Government

Criminal Prohibitions on the Publication of Classified Defense Information Jennifer K. Elsea Legislative Attorney October 18, 2010

Add to Reading List

Source URL: digital.library.unt.edu

Language: English - Date: 2015-02-08 06:46:10
UPDATE