Digital security

Results: 4317



#Item
661Notary / Cryptography / Authorization / Digital signature / Security / Computer security / Civil law / Key management / Public-key cryptography

Clear Form Print Form UNIVERSITY OF CALIFORNIA INSTRUCTIONS: A signature authorization is a delegation of authority and remains in

Add to Reading List

Source URL: controller.ucsf.edu

Language: English - Date: 2014-03-13 17:10:10
662Covariance and correlation / Fingerprint / Human anatomy / Demosaicing / Correlation and dependence / JPEG / Digital camera / Computing / Security / Digital photography / Fingerprints / Biometrics

Distinguishing Digital Image Origin via Higher Order Statistics

Add to Reading List

Source URL: ws2.binghamton.edu

Language: English - Date: 2010-10-05 18:30:20
663Finite-state machine / Digital electronics / Cryptographic hash function / Forensic science / Hash function / Digital signature / Cryptography / Electronic engineering / Automata theory

Journal of Digital Forensics, Security and Law, VolColumn: The Physics of Digital Information-Part 21 Fred Cohen

Add to Reading List

Source URL: all.net

Language: English - Date: 2012-09-01 08:58:29
664Cyberwarfare / Computer security / Privacy / Crime prevention / National security / Malware / Advanced persistent threat / Threat / Surveillance / Security / Computer network security / Espionage

European Parliament Hearing Human rights and technologies: the impact of digital surveillance and intrusion systems on human rights in third countries January 21, 2015 Prepared by Sarah A. McKune

Add to Reading List

Source URL: www.europarl.europa.eu

Language: English - Date: 2015-02-05 10:24:29
665Information / Computing / Computer file formats / Data management / Archival science / Digital preservation / UK Data Archive / File system / File format / Digital libraries / Library science / Preservation

Data preservation and security

Add to Reading List

Source URL: data-archive.ac.uk

Language: English - Date: 2013-12-06 07:01:09
666Imaging / Digital media / Video / Digital camera / IP camera / Pixel / Closed-circuit television / Webcam / Red Digital Cinema Camera Company / Digital photography / Technology / Surveillance

Copyright 2009 Vicon Industries Inc Page 1 Megapixel Cameras in Security Applications:  Are They Ready For Prime Time? 

Add to Reading List

Source URL: www.sourcesecurity.com

Language: English - Date: 2014-02-27 13:00:41
667Academi / Currituck County /  North Carolina / International Peace Operations Association / Iraq War / Mercenaries / Surveillance / DVM / Contract / Security / Law / Public safety

DIGITAL ALLY AWARDED THREE STATE CONTRACTS TO SUPPLY IN-CAR VIDEO SYSTEM TO LAW ENFORCEMENT AGENCIES ARKANSAS, WISCONSIN AND NEW MEXICO JOIN WEST VIRGINIA IN STATEWIDE PURCHASE AUTHORIZATIONS FOR DVM-500 DIGITAL IN-CAR V

Add to Reading List

Source URL: www.digitalallyinc.com

Language: English - Date: 2009-08-26 12:27:49
668Crime prevention / Law enforcement / National security / Privacy / Surveillance / Academi / Advertising / DVM / Forward-looking statement / Security / Business / Public safety

DIGITAL ALLY AWARDED STATEWIDE CONTRACT FROM MISSISSIPPI FOR IN-CAR VIDEO SYSTEMS CONTRACT ACCOMPANIED BY LARGEST SINGLE ORDER IN COMPANY’S HISTORY LEAWOOD, Kansas (August 2, 2007) – Digital Ally, Inc. (OTCBB: DGLY),

Add to Reading List

Source URL: www.digitalallyinc.com

Language: English - Date: 2009-08-26 12:27:48
669Digital media / Email / Internal Revenue Service / Technology

DEPARTMENT OF HOMELAND SECURITY U.S. Coast Guard REQUEST FOR DUPLICATE OR REPLACEMENT IRS FORM W-2 1. EMPLOYEE ID

Add to Reading List

Source URL: www.uscg.mil

Language: English - Date: 2015-04-13 12:40:03
670Windows games / Application software / Electronic games / Grand Theft Auto IV / Computer network security / Global Technology Associates /  Inc. / Digital media / Action-adventure games

PRESS RELEASE FOR IMMEDIATE RELEASE 3505 Lake Lynda Drive, Suite 109

Add to Reading List

Source URL: www.gta.com

Language: English - Date: 2012-10-09 15:50:06
UPDATE