Decoy

Results: 333



#Item
201Police / Public safety / Surveillance / Decoy / Law / National security / Security / Law enforcement

Police Research Series Paper 137 Assessing the Police Use of Decoy Vehicles

Add to Reading List

Source URL: www.popcenter.org

Language: English - Date: 2008-02-22 09:11:36
202Police / Public safety / Surveillance / Decoy / Law / National security / Security / Law enforcement

Police Research Series Paper 137 Assessing the Police Use of Decoy Vehicles

Add to Reading List

Source URL: www.popcenter.org

Language: English - Date: 2012-08-15 14:59:25
203Car theft / Decoys / Surveillance / Motor vehicle theft / Police / Theft / Hong Kong Police Force / To Catch a Predator / Crimes / National security / Law

ASSESSING THE POLICE USE OF DECOY VEHICLES Briefing Note Police Research Series Paper 137 Joanna Sallybanks

Add to Reading List

Source URL: www.popcenter.org

Language: English - Date: 2008-06-05 13:15:09
204Police / Public safety / Surveillance / Decoy / Law / National security / Security / Law enforcement

Police Research Series Paper 137 Assessing the Police Use of Decoy Vehicles

Add to Reading List

Source URL: www.popcenter.org

Language: English - Date: 2008-06-05 13:15:09
205Computing / Honeyd / Client honeypot / Email address harvesting / Honeynet Project / Computer security / Decoy / Computer network security / Honeypot / Security

HONEYPOT SECURITY February 2008 © The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be

Add to Reading List

Source URL: www.infosec.gov.hk

Language: English - Date: 2009-06-15 09:06:18
206Car theft / Decoys / Surveillance / Motor vehicle theft / Police / Theft / Hong Kong Police Force / To Catch a Predator / Crimes / National security / Law

ASSESSING THE POLICE USE OF DECOY VEHICLES Briefing Note Police Research Series Paper 137 Joanna Sallybanks

Add to Reading List

Source URL: www.popcenter.org

Language: English - Date: 2008-06-05 12:13:46
207Computing / Honeyd / Client honeypot / Email address harvesting / Honeynet Project / Computer security / Decoy / Computer network security / Honeypot / Security

HONEYPOT SECURITY February 2008 © The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be

Add to Reading List

Source URL: www.infosec.gov.hk

Language: English - Date: 2011-03-29 08:29:47
208Quantum information science / Applied mathematics / Cryptography / Quantum key distribution / BB84 / Photon / Decoy state / Quantum cryptography / Physics / Quantum mechanics

High Bit Rate Quantum Key Distribution Systems High Bit Rate Quantum Key Distribution Systems Moritz Lenz School of Engineering and Physical Sciences at Heriot-Watt University

Add to Reading List

Source URL: moritz.faui2k3.org

Language: English - Date: 2007-05-06 10:41:09
209Physics / Emerging technologies / Quantum key distribution / Quantum dot / Decoy state / Quantum cryptography / Quantum information science / Cryptography

Sources for Ultrafast Quantum Key Distribution Systems Sources for Ultrafast Quantum Key Distribution Systems Moritz Lenz School of Engineering and Physical Sciences at Heriot-Watt University

Add to Reading List

Source URL: moritz.faui2k3.org

Language: English - Date: 2006-10-19 15:14:47
210Decoys / Woodcarving / Winter sports / Duck decoy / Waterfowl hunting / The Dorset House / Oscar W. Peterson / Hunting / Folk art / Ducks

Decoys and Decoy Carvers from the Illinois & Michigan Canal National Heritage Corridor. A paper to accompany a Folk Art Exhibit, January 26 - February 26, 1986. Lewis University Library, Romeoville, Ill., [removed]

Add to Reading List

Source URL: www.lewisu.edu

Language: English - Date: 2013-12-19 19:23:05
UPDATE