Digital security

Results: 4317



#Item
421Digital photography / Agriculture / Pixel / Imaging / Technology / Remote sensing / Normalized Difference Vegetation Index / Computer graphics

Frequently Asked Questions (FAQ) What are GCE 1km Crop Dominance (aka GCE V0.0) product and GCE 1km Multi-study Crop Mask (aka GCE V1.0) products? Global Food Security-support Analysis Data @ 30 m (GFSAD30) will be produ

Add to Reading List

Source URL: e4ftl01.cr.usgs.gov

Language: English
422Privacy of telecommunications / Mass surveillance / Crime prevention / Law enforcement / Surveillance / Foreign Intelligence Surveillance Act / National Security Agency / Electronic Privacy Information Center / Patriot Act / National security / Security / Government

National Security Surveillance and Human Rights in a Digital Age United States of America Joint Submission to the United Nations Twenty Second Session of the Universal Periodic Review Working Group Human Rights Council A

Add to Reading List

Source URL: d1ovv0c9tw0h0c.cloudfront.net

Language: English - Date: 2014-09-17 13:33:48
423Digital divide / E-Services / Information technology / Knowledge representation / Ministry of Security and Justice / Interior ministry / E-democracy / Ministry of Interior /  Public Safety and Decentralization / Technology / Open government / Communication

Slovenian Governmental Cloud Mag. Jurij Bertok (Dr. Alenka Žužek Nemec) IT and e-Service Directorate Ministry of the Interior, Slovenia Ministry of the Interior

Add to Reading List

Source URL: www.cloudconference.eu

Language: English - Date: 2015-07-06 08:06:19
424Computer security / System software / Federated identity management / Security Assertion Markup Language / OpenID / Identity management system / Windows CardSpace / Digital identity / Identity provider / Identity management / Identity / Federated identity

Achieving Privacy in a Federated Identity Management System Susan Landau, Hubert Le Van Gong Sun Microsystems Laboratories Robin Wilton

Add to Reading List

Source URL: www.ifca.ai

Language: English - Date: 2009-03-05 11:10:54
425Chemistry / Acronyms / Digital divide / Information society / United Nations Development Group / International Hydrological Programme / Water / Hydrology / United Nations / UNESCO / Matter

Stockholm World Water Week Side Event on “History, Ethics, Religious Values: Contributions to Water and Food Security” 5:45-6:45pm, 22 August Co-convened by: Water Observatory, Botín Foundation

Add to Reading List

Source URL: gallery.mailchimp.com

Language: English - Date: 2011-08-16 18:32:09
426Internet / Identity document / Sleep / Security / Digital media / Technology / Email

EMAIL completed form (together with media accreditation documents) to the ERS Press Officer Lauren Anderson: email ESRS Press Officer Brigitte Knobl: email Media–Free

Add to Reading List

Source URL: www.esrs.eu

Language: English - Date: 2015-01-29 09:29:58
427Digital media / Research / Hazard / Electronic submission / Security / Public safety / Computing / Email / Hazard analysis / Competitions

Spot the Hazard Competition Entry Form Please complete this form in English and send (with the above picture on which you have spotted the hazards) to: by 28 AugustDescription o

Add to Reading List

Source URL: www.hazard-competition.com

Language: English - Date: 2015-05-21 04:14:23
428Asset management / Account / Internet privacy / Federated identity / Business / Computing / Finance / Computer law / Inheritance / Digital inheritance

Poster: Digital Inheritance: Third-party digital asset management Anthony Xu Depeng Li

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2015-05-11 16:42:40
429Evaluation / Public-key cryptography / FIPS 140-2 / Electronic signature / Common Criteria / Protection Profile / Digital signature / Backup / Cryptography / Computer security / CEN Workshop Agreement

Microsoft Word - CWA14167-2_with_backup_CMCSOB-PP_v028.doc

Add to Reading List

Source URL: sogis.eu

Language: English - Date: 2013-02-14 10:21:34
430Network architecture / Computer network security / Internet privacy / Internet protocols / Hacking / DNS hijacking / Name server / Proxy server / Botnet / Internet / Computing / Domain name system

Operation Ghost Click: The Rove Digital Takedown

Add to Reading List

Source URL: www.trendmicro.com

Language: English - Date: 2012-07-02 22:28:05
UPDATE