Computer surveillance

Results: 1478



#Item
811Electronics / Intel Core / Intel / Multi-core processor / ThinkServer / Mac Pro / Computing / Computer hardware / Xeon

salient (adj): standing above, prominent, apart from the rest In the world of video surveillance and video management, Salient Systems Corporation stands apart. Our products are used to secure some of the most prominent

Add to Reading List

Source URL: www.voiceproducts.com

Language: English - Date: 2012-02-14 14:18:50
812Public economics / Homeland Security Grant Program / Surveillance / War on Terror / Government / United States Department of Homeland Security / Computer security / Vulnerability / Federal grants in the United States / Grants / Federal assistance in the United States / Public finance

2014 Homeland Security Grant Application Teleconference Question and Answer Session Minutes Wednesday, September 23, 2014 – 6:00 p.m. The Question and Answer Session Conference Call began at 6:00 p.m. with twelve (12)

Add to Reading List

Source URL: www.nh.gov

Language: English - Date: 2014-09-25 09:48:34
813Crime prevention / Security engineering / Computer network security / NICE Systems / Closed-circuit television / Digital video recorder / Intrusion detection system / Computer security / Surveillance / Security / National security / Public safety

NiceVision Intrusion Detection ® SMART VIDEO PROVEN VALUE

Add to Reading List

Source URL: www.voiceproducts.com

Language: English - Date: 2012-02-16 13:09:02
814National Security Agency / United States government secrecy / International Multilateral Partnership Against Cyber Threats / NIST Special Publication 800-53 / Computing / National Information Assurance Partnership / Security / Computer crimes / National security / Mass surveillance

Microsoft Word - 2014CIF Agenda_Public Draft_ FINAL for Print.docx

Add to Reading List

Source URL: www.fbcinc.com

Language: English - Date: 2014-01-24 09:47:26
815National security / Surveillance / Public safety / Information security operations center / Network management / Information security / Threat / Malware / Security operations center / Security / Security engineering / Computer security

This incident report is forwarded to CDHE and the Office of Information Technology in accordance with the policies and procedures for reportable incidents as described in the institution’s IT Security Plan or Program.

Add to Reading List

Source URL: highered.colorado.gov

Language: English - Date: 2014-03-14 12:40:04
816Public safety / National security / Crime prevention / Information security / IT risk / United States Department of Homeland Security / Surveillance / Cyberwarfare / Data breach / Security / Data security / Computer security

IBM Government Industry The economy of security How physical and cyber security drive economic vitality Executive summary

Add to Reading List

Source URL: public.dhe.ibm.com

Language: English - Date: 2014-11-17 11:40:11
817Crime prevention / Security guard / Surveillance

REVOCATION OF COMPUTER/LIBRARY PRIVILEGES Revocation of Computer/Library Privileges: Lincoln Library endeavors to provide an atmosphere conducive to study, reading, and the legitimate use of materials, computers, equipme

Add to Reading List

Source URL: www.lincolnlibrary.info

Language: English - Date: 2014-06-25 12:12:42
818National security / Computer network security / Security guard / Surveillance / Computer security / Health Insurance Portability and Accountability Act / Security / Crime prevention / Public safety

CYBER SECURITY: A MUST HAVE FOR HEALTH AND HUMAN SERVICES 2 Introduction

Add to Reading List

Source URL: www.aphsa.org

Language: English - Date: 2014-10-03 14:14:10
819Science / Remote sensing / Computer vision / Image processing / Segmentation / Hyperspectral imaging / Retina / Facial recognition system / ECognition / Surveillance / Vision / Optics

IWCIM – PROGRAM – DAY 1 Saturday 1st of November 8:30 - 9:00: Registration KEYNOTE 1 9:00 – 9:55:

Add to Reading List

Source URL: iwcim.isep.fr

Language: English - Date: 2014-10-31 08:46:21
820Human–computer interaction / Mobile computers / User interface techniques / Virtual reality / Biometrics / Surveillance / Wearable computer / Emotiv Systems / Brain–computer interface / Human–computer interaction / Technology / Computing

A Web-of-Things solution to enrich TV viewing experience using Wearable and Ambient sensor data Prabhakar Srinivasan, Cisco SPVTG Email: [removed] Introduction

Add to Reading List

Source URL: www.w3.org

Language: English - Date: 2014-05-10 13:44:39
UPDATE