Digital security

Results: 4317



#Item
701Linguistics / Machine translation / Steganography / Computer-assisted translation / Digital watermarking / Parallel text / Watermark / Translation / Steganalysis / Cryptography / Espionage / Watermarking

CERIAS Tech ReportTRANSLATION-BASED STEGANOGRAPHY by C. Grothoff and K. Grothoff and L. Alkhutova and R. Stutsman and M. Atallah Center for Education and Research in Information Assurance and Security, Purdue Un

Add to Reading List

Source URL: www.cerias.purdue.edu

Language: English - Date: 2005-06-07 11:33:08
702Digital media / Identifiers / Universally unique identifier / Tamper resistance / Digital cinema / Public-key cryptography / Tamper-evident / Prevention / Packaging / Security / Technology

Microsoft Word - Errata_20061116.doc

Add to Reading List

Source URL: dcimovies.com

Language: English - Date: 2010-02-28 19:30:22
703Digital media / Application software / Electronic games / Grand Theft Auto IV / Computer network security / Global Technology Associates /  Inc. / Action-adventure games / Windows games

PRESS RELEASE FOR IMMEDIATE RELEASE 3505 Lake Lynda Drive, Suite 109

Add to Reading List

Source URL: www.gta.com

Language: English - Date: 2012-10-09 15:50:06
704Security / Identity / OpenID / Authentication / Identity management / Validation / HTML / Digital identity / Identity correlation / Computing / Federated identity / Computer security

PLOA White Paper v1.01 Personal Levels of Assurance (PLOA) An AT&T White Paper on Assurance Authored by J. Oliver Glasgow

Add to Reading List

Source URL: www.idcommons.org

Language: English - Date: 2011-11-22 16:29:43
705Space law / United Nations Committee on the Peaceful Uses of Outer Space / Space debris / Space policy / Indian Space Research Organisation / Space technology / Digital Earth / International Space University / Udipi Ramachandra Rao / Spaceflight / Space / Indian space program

Promoting Cooperative Solutions for Space Security Exchange of Views Statement, United Nations Committee on the Peaceful Uses of Outer Space February 2010

Add to Reading List

Source URL: swfound.org

Language: English - Date: 2010-11-05 15:16:20
706Central processing unit / Coprocessor / Two-factor authentication / Authentication / Communications protocol / Cryptography / Security / Public-key cryptography

Int J Inf Secur: 28–41 / Digital Object Identifier (DOIs10207Outbound authentication for programmable secure coprocessors Sean W. Smith Department of Computer Science, Dartmouth College

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2005-08-18 17:39:47
707Public safety / Law enforcement / Surveillance / Academi / Police car / Police / Security / National security / Crime prevention

DIGITAL ALLY, INC. TO SUPPLY IN-CAR DIGITAL VIDEO SYSTEMS TO WEST VIRGINIA STATE POLICE ALL STATE, COUNTY AND MUNICIPAL LAW ENFORCEMENT AGENCIES IN WEST VIRGINIA AUTHORIZED TO PURCHASE DIGITAL ALLY SYSTEMS LEAWOOD, Kansa

Add to Reading List

Source URL: www.digitalallyinc.com

Language: English - Date: 2009-08-26 12:27:45
708Data security / Office equipment / Public safety / Electronic commerce / Information security / Photocopier / Computer security / Encryption / Security / Crime prevention / National security

How Your Old Photocopier Can Cause a Security Breach According to, “Digital Photocopiers Loaded with Secrets,” published on CBSNews.com, nearly every digital copier built since 2002 contains a hard drive, much like t

Add to Reading List

Source URL: shreditprovidence.com

Language: English - Date: 2014-01-27 12:42:32
709Surveillance / Security engineering / Television / Pan tilt zoom camera / Closed-circuit television / Red Digital Cinema Camera Company / Encoder / Motion JPEG / Video / Security / National security

VideoIQ Rialto A4 Analytic Bridge ® The bridge to intelligent analytics The Rialto A4 lowers the per channel cost of analytics deployment by up to 50%, making it easy and cost-effective for companies

Add to Reading List

Source URL: us.sourcesecurity.com

Language: English - Date: 2012-06-18 08:30:02
710Technology / Video / Crime prevention / Privacy / Digital photography / Closed-circuit television / IP camera / Digital video recorder / Digital camera / Security / Surveillance / National security

DIGITAL VIDEO SURVEILLANCE GUIDELINES After considering your basic physical security requirements, such as exterior lighting, locks, alarms, and landscaping, a good digital video surveillance system is the next step in p

Add to Reading List

Source URL: www.jumpjet.info

Language: English - Date: 2008-12-28 11:31:00
UPDATE