Digital security

Results: 4317



#Item
641Computer security / Software / Network security / Digital security / Computer network security / EnGarde Secure Linux / Security

GDSN Overviewindd

Add to Reading List

Source URL: www.guardiandigital.com

Language: English - Date: 2010-08-11 14:48:59
642Overdraft / Digital signature / Signature / Cryptography / Security / Notary

Authorized Signature Form - Agency Account - Student Organization (xls format)

Add to Reading List

Source URL: studentlife.msu.edu

Language: English - Date: 2013-08-01 16:11:43
643Streaming / Traffic flow / Transmission Control Protocol / Software / Internet / Peer-to-peer / Domain / Tor / Computing / Digital media / Inter-process communication

Research Roadmap on Security Measurements Xenofontas Dimitropoulos Eduard Glatz, Elias Raftopoulos, Martin Burkhart

Add to Reading List

Source URL: www.syssec-project.eu

Language: English - Date: 2011-07-25 05:24:39
644Fox-IT / Surveillance / Computer network security / Redfox / AdWords / Computer security / Fox Broadcasting Company / The X-Files / Fox News Channel / Television in the United States / Security / Television

nr 3 novemberMonitoring What is your digital safety net?

Add to Reading List

Source URL: www.fox-it.com

Language: English - Date: 2015-04-22 11:55:12
645Persecution / Social psychology / Password / Cryptography / Bullying / Internet privacy / Password policy / Password manager / Ethics / Behavior / Security

Class 2: Manage Your Digital Footprint Student Handbook I Know/I Want to Know/I learned

Add to Reading List

Source URL: www.ikeepsafe.org

Language: English - Date: 2013-06-22 12:04:17
646Public safety / Academi / Currituck County /  North Carolina / International Peace Operations Association / Mercenaries / Police / Security / National security / Surveillance

DIGITAL ALLY, INC. RECEIVES FIFTH AND LARGEST ORDER FROM WEST VIRGINIA STATE POLICE FOR 229 DVM-500 IN-CAR VIDEO SYSTEMS COMPANY ANNOUNCES RECEIPT OF LARGEST SINGLE ORDER FOR DVF-500 DIGITAL VIDEO FLASHLIGHT SYSTEMS OVER

Add to Reading List

Source URL: www.digitalallyinc.com

Language: English - Date: 2009-08-26 10:54:31
647Video processing / Security / Biometrics / Identification / Fingerprint / Science / Video copy detection / Cryptography / Public key fingerprint / Acoustic fingerprinting / Digital rights management / Digital video fingerprinting

Signature Certain copies make you smile. Others don’t. www.ina.fr/signature

Add to Reading List

Source URL: www.institut-national-audiovisuel.fr

Language: English - Date: 2011-06-22 04:31:42
648Crime prevention / Law enforcement / Surveillance / Academi / Police / Law / Security / National security / Public safety

Digital Ally Awarded Statewide Contract With State of West Virginia Initial One-Year, Sole-Source Contract to Provide DVM-750 In-Car Video Systems to State Police LENEXA, KS--(Marketwired - Dec 30, Digital Ally,

Add to Reading List

Source URL: www.digitalallyinc.com

Language: English - Date: 2013-12-30 10:34:50
649Public-key cryptography / Digital signature / Key management / Notary / Ciphertext indistinguishability / Computational complexity theory / Reduction / Security parameter / RSA / Cryptography / Theoretical computer science / Applied mathematics

On the Impossibility of Tight Cryptographic Reductions Christoph Bader, Tibor Jager, Yong Li, and Sven Sch¨age Horst G¨ortz Institute for IT Security, Ruhr-University Bochum, Germany {christoph.bader, tibor.jager, yong

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-27 06:52:51
650Fingers / Human anatomy / Identification / Security / Dailymotion / Metadata / Data / Digital video fingerprinting / Acoustic fingerprint / Information / Biometrics / Fingerprints

Core Technology & Services Overview At-A-Glance Technology Overview

Add to Reading List

Source URL: www.audiblemagic.com

Language: English - Date: 2015-04-22 15:38:59
UPDATE