Control system security

Results: 2384



#Item
731Prevention / IEC 61511 / Manufacturing / Control of Major Accident Hazards Regulations / Functional Safety / Safety instrumented system / Benchmark / Safety / Security / Risk

COMAH Competent Authority Operational Delivery Guide

Add to Reading List

Source URL: www.hse.gov.uk

Language: English - Date: 2014-12-22 06:18:35
732Surveillance / Warning systems / Crime prevention / Closed-circuit television / Security engineering / Hong Kong Police Force / China Central Television / Sydney Coordinated Adaptive Traffic System / National security / Security / Public safety

LC Paper No. CB[removed]) Legislative Council Panel on Transport Renewal of Hong Kong Area Traffic Control and Closed Circuit Television Systems

Add to Reading List

Source URL: www.legco.gov.hk

Language: English - Date: 2004-03-15 06:38:06
733Alarms / Fire alarm system / Emergency evacuation / Smoke detector / Alarm signal / Alarm devices / Firefighter / Fire alarm notification appliance / Fire alarm control panel / Safety / Security / Prevention

Summary of Fire Emergency Procedure In the event of a fire there will be a loud continuous alarm and readers should leave the building immediately via the nearest fire exit. Do not use the lifts.

Add to Reading List

Source URL: www.lib.cam.ac.uk

Language: English - Date: 2013-09-19 07:33:11
734System software / Windows Vista / Comparison of privilege authorization features / Computer network security / Password / Phishing / User Account Control / Trusted path / Keystroke logging / Software / Computing / Computer crimes

Operating System Framed in Case of Mistaken Identity Measuring the success of web-based spoofing attacks on OS password-entry dialogs Cristian Bravo-Lillo1 Lorrie Cranor1,2

Add to Reading List

Source URL: lorrie.cranor.org

Language: English - Date: 2012-10-15 13:39:22
735EnGarde Secure Linux / Security-Enhanced Linux / Computer network security / F-Secure / Secure Shell / Secure Computing / Operating system / Vulnerability / Mandatory access control / Computer security / System software / Software

Secure By Design: How Guardian Digital Secures EnGarde Secure Linux 1. Introduction to Guardian Digital and EnGarde Secure Linux 1.1. Pioneering Open Source Security in an Insecure World Since its inception in 1999, Guar

Add to Reading List

Source URL: www.engardelinux.org

Language: English - Date: 2006-10-09 08:56:01
736Face recognition / Automatic identification and data capture / Facial recognition system / Biometrics / Merlion / Access control / Central Region /  Singapore / Security / Surveillance

XiD Technologies’s REVOFaceTM was awarded the Gold Merlion Award 2014 Singapore (27 August, 2014) – XiD Technologies a leading provider of biometric technology, announced today they have won the Gold Merlion Award in

Add to Reading List

Source URL: www.xidtech.com

Language: English - Date: 2014-09-11 04:53:31
737Software / Cryptographic protocols / Trust negotiation / Digital credential / Credential / Access control / X Window System / Public-key cryptography / Identity management / Cryptography / Security

Trust Negotiation with Hidden Credentials, Hidden Policies, and Policy Cycles ∗ Keith B. Frikken Jiangtao Li Mikhail J. Atallah Department of Computer Science, Purdue University, West Lafayette, Indiana {kbf, jtli, mja

Add to Reading List

Source URL: www.isoc.org

Language: English - Date: 2006-02-09 00:38:58
738Computer security / Software testing / Computer network security / Silicon Integrated Systems / Telemetry / Industrial automation / Safety instrumented system / Industrial control system / Distributed control system / Technology / Automation / Security

CYBER SECURITY IMPLICATIONS OF SIS INTEGRATION WITH CONTROL NETWORKS Abstract The LOGIIC program was established to review and study cyber security issues and their business implications as they pertain to the oil and ga

Add to Reading List

Source URL: www.automationfederation.org

Language: English - Date: 2013-04-15 10:29:27
739Computer security / Deep packet inspection / System software / Security appliance / Content filtering / Firewall / Content-control software / Computer network security / Computing / Server appliance

ContentProtect Security Appliance The ContentProtect Security Appliance is a deep-packet, Layer 7 inspection appliance that scans, identifies, and controls Internet traffic—and provides advanced content filtering, rep

Add to Reading List

Source URL: www.contentwatch.com

Language: English - Date: 2011-07-13 15:00:12
740Padlock / Access control / Android devices / Motorola Cliq / Security

CLIQ – Secure, Remote Locking System Management Oil & Gas Distribution Solution June 2014 What is CLIQ? Mul-T-Lock CLIQ® is a wire

Add to Reading List

Source URL: assets.selector.com

Language: English - Date: 2014-09-15 02:56:56
UPDATE