Digital security

Results: 4317



#Item
831Security / UL / Safe / GS / Science / Reference / Geprüfte Sicherheit / Underwriters Laboratories / Certification mark

Pneumatic actuated Angle Seat Valve with digital electro-pneumatic positioner 2/2-way valve DN 25, 40, 50 ¢ for agressive, gaseous and liquid fluids

Add to Reading List

Source URL: spcontrol.ru

Language: English - Date: 2006-05-06 11:21:04
832Security / Broadband / Voice over IP / Networking hardware / VoIP phone / IPTV / Access control / Digital Enhanced Cordless Telecommunications / Burglar alarm / Electronic engineering / Videotelephony / Electronics

Infotainment and Security Solutions Based on Multiservice Digital Network Environment Infotainment and Security Solutions Times and Technology are Changing

Add to Reading List

Source URL: www.sam-electronics.de

Language: English - Date: 2014-01-13 07:22:21
833Key management / Internet protocols / Public-key cryptography / Internet standards / Domain Name System Security Extensions / Digital signature / Zone file / Keysigning / DNS zone / Cryptography / Domain name system / Internet

.ca Signing Metrics R. Gieben∗ NLnet Labs May 2, 2006 NLnet Labs document

Add to Reading List

Source URL: www.nlnetlabs.nl

Language: English - Date: 2009-06-27 06:07:10
834Freedom of expression / OSCE Representative on Freedom of the Media / Organization for Security and Co-operation in Europe / Tajikistan / Digital media / Internet censorship / United States Mission to the Organization for Security and Cooperation in Europe / Internet / Technology / International relations / Organisation for Security and Co-operation in Europe / Diplomacy

United States Mission to the OSCE Statement on the Blocking of Facebook and Websites in Tajikistan As delivered by Political Counselor Christopher Robinson to the Permanent Council, Vienna

Add to Reading List

Source URL: photos.state.gov

Language: English - Date: 2012-05-24 08:17:55
835Terminology / Digital television / Backup / Data security / MOD / Audio file format / RAID / High-definition television / Video / Television

EZ Logger Multichannel Archiving System

Add to Reading List

Source URL: www.dveo.com

Language: English - Date: 2015-03-15 01:49:17
836Identity management / Computing / OpenID / Web services / Phorm / Identity assurance / Digital identity / Information Card / ICAM / Federated identity / Identity / Computer security

PDF Document

Add to Reading List

Source URL: www.openidentityexchange.org

Language: English - Date: 2014-06-06 18:30:57
837Public safety / Digital technology / Surveillance / Identity / Internet privacy / Internet / Digital identity / Computer security / Computer surveillance / Security / Crime prevention / National security

Internet Surveillance with Digital Identity Detection is the New

Add to Reading List

Source URL: infoarmor.com

Language: English - Date: 2014-10-10 15:14:28
838Public safety / Crime prevention / National security / Information privacy / Internet privacy / Information security / Personally identifiable information / Surveillance / Information privacy law / Ethics / Privacy / Security

Session II Security and Privacy in Digital Space The rapid development of technology has raised a variety of security and privacy issues. Digital space may be used for fraud, obtaining or laundering criminal

Add to Reading List

Source URL: www.parleu2015.lv

Language: English - Date: 2015-04-13 03:22:16
839Television / National security / IP camera / Internet Protocol / Axis Communications / Motion JPEG / Closed-circuit television / Red Digital Cinema Camera Company / Frame rate / Surveillance / Video / Security

AXIS 209FD/209MFD Network Cameras Flat, discreet cameras for indoor video surveillance AXIS 209FD/209MFD are flat, discreet network cameras designed specifically for non-invasive video surveillance. These

Add to Reading List

Source URL: us.sourcesecurity.com

Language: English - Date: 2010-01-08 03:59:59
840Digital media / Technology / Transmission Control Protocol / Be Unlimited / Internet access / Internet / Port / Netflow / Firewall / Computing / Internet protocols / Computer network security

Broadband Traffic Report 2. Broadband Traffic Report Traffic Volumes Rise Steadily Over the Past Year, and HTTPS Use Expands Looking at broadband traffic over the past year, we can see that traffic volumes have increas

Add to Reading List

Source URL: www.iij.ad.jp

Language: English - Date: 2014-10-02 05:25:02
UPDATE