Control system security

Results: 2384



#Item
271Prevention / Sensors / Burglar alarm / Alarm sensor / Fire alarm control panel / Building automation / Security / Safety / Alarms

Electronic Multi-Zone Environmental Alarm System Installation/Owner’s Manual D Limitations of the Alarm System or Device

Add to Reading List

Source URL: www.winland.com

Language: English - Date: 2014-05-22 13:12:16
272Electric power transmission systems / Technology / Security / Smart grid / Energy / Building automation / Access control / HVAC / Battery management system / Building management system / Heating /  ventilating /  and air conditioning / Building engineering

2011 The Challenge to Legacy Building Management Systems Jim Sinopoli, PE, RCDD, LEED AP Managing Principal, Smart Buildings, LLC

Add to Reading List

Source URL: ww1.prweb.com

Language: English - Date: 2012-01-04 10:38:48
273Security / Cyberwarfare / Voluntary Voting System Guidelines / Electronic voting / Voting machine / Voter-verified paper audit trail / Threat / Access control / Voting system / Computer security / Election technology / Politics

Security Requirements Table of Contents2

Add to Reading List

Source URL: votingintegrity.org

Language: English - Date: 2007-09-27 15:46:01
274Peace / United Nations Institute for Disarmament Research / Disarmament as Humanitarian Action / Disarmament / United Nations System / Nuclear Non-Proliferation Treaty / Nuclear disarmament / Nuclear proliferation / Weapon of mass destruction / Arms control / International relations / International security

AUnited Nations General Assembly

Add to Reading List

Source URL: www.unidir.ch

Language: English - Date: 2013-07-30 07:15:42
275Fingerprints / Access control / Identity management / Fingerprint recognition / Authentication / Password / Fingerprint / Two-factor authentication / Fingerprint SDK / Security / Biometrics / Identification

Part A. System Design, Components and Parameters Please describe the system architecture in detail. In particular, is enrollment and authentication done locally or on a server? - The enrolment and authentication is done

Add to Reading List

Source URL: www.logicomedia.com

Language: English - Date: 2015-05-06 11:28:34
276Face recognition / Automatic identification and data capture / Facial recognition system / Biometrics / Face / Access control / Security / Surveillance / National security

AcSys Face Reality® is a technologically advanced face recognition system(FRS) that provides ultimate security for the reality of today. Biometric security provides accountability for your organization, because it makes

Add to Reading List

Source URL: www.twtw.ca

Language: English - Date: 2004-08-29 11:08:00
277Windows Vista / Windows NT / Computer network security / Kerberos / User Account Control / Microsoft Management Console / Control panel / Microsoft Windows / Software / System software

KFW and OAFW Futures - Best Practice Workshop 2007

Add to Reading List

Source URL: www.secure-endpoints.com

Language: English - Date: 2007-05-10 20:51:04
278International security / Military-industrial complex / United Nations Institute for Disarmament Research / United Nations System / Nuclear proliferation / Nuclear Non-Proliferation Treaty / Disarmament / Nuclear disarmament / Weapon of mass destruction / Arms control / International relations / Nuclear weapons

UNITED NATIONS A General Assembly Distr.

Add to Reading List

Source URL: www.unidir.ch

Language: English - Date: 2013-07-30 07:15:43
279National Security Agency / Data modeling / Decision theory / Security policy / Access control / Mandatory access control / Trusted Computer System Evaluation Criteria / EXPRESS / Security-Enhanced Linux / Computer security / Security / Policy

SPL: An access control language for security policies with complex constraints Carlos Ribeiro, Andr´e Z´uquete, Paulo Ferreira and Paulo Guedes IST / INESC Portugal E-mail: 

Add to Reading List

Source URL: www.isoc.org

Language: English - Date: 2001-07-20 00:24:30
280Computer network security / Network architecture / Internet privacy / Cyberwarfare / Network performance / Proxy server / Port / Transmission Control Protocol / Secure Shell / Computing / Internet protocols / Internet

Attachment 3 Observation by the Internet Fixed-Point Monitoring System (TALOT2) for NovemberTo General Internet Users According to the Internet Fixed-Point Monitoring System (TALOT2), 86,568 unwanted (one-sided

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2013-05-23 07:51:49
UPDATE