Espionage

Results: 3893



#Item
141Security clearance / Email / Central Intelligence Agency / Security / Internet / United States government secrecy / Espionage / National security

INSTRUCTIONS FOR U-1201 REQUEST FOR VISIT (RFV) FORM The following form must be completed in full. Failure to complete all areas of the form will result in the Request For Visit (RFV) being rejected. A. GENERAL INSTRUCTI

Add to Reading List

Source URL: www.deps.org

Language: English - Date: 2015-04-21 16:34:43
142Computer security / Antivirus software / Malware / Payment Card Industry Data Security Standard / Computer virus / Spyware / Rootkit / Unified threat management / Espionage / Computer network security / Cyberwarfare

CYLANCEPROTECT + App Control What is AppControl? Traditional antivirus products use a blacklisting approach that allows all applications to run unless they are known to be malicious or exhibit known bad behaviors. Applic

Add to Reading List

Source URL: cdn2.hubspot.net

Language: English - Date: 2015-05-05 12:00:46
143Intelligence / Computer security / Military intelligence / Computer network security / Threat / Central Intelligence Agency / Defense Intelligence Agency / Espionage / National security / Security

Executive Security ts Information Threats Physical Threats Known Adversary

Add to Reading List

Source URL: info.cyveillance.com

Language: English - Date: 2015-07-18 14:22:51
144Cyberwarfare / Malware / Phishing / Social engineering / Spamming / Computer security / Operations security / Spyware / Classified information / Security / Espionage / Computer network security

Ex+Op Power Point Master Slide Template, Oct 06, NU [D11]

Add to Reading List

Source URL: www.mc.nato.int

Language: English - Date: 2013-03-08 11:16:37
145Government / Mass surveillance / Signals intelligence / Espionage / National Security Agency / Foreign Intelligence Surveillance Act / NSA warrantless surveillance controversy / United States Foreign Intelligence Surveillance Court / United States v. U.S. District Court / National security / Privacy of telecommunications / Surveillance

Clapper v. Amnesty International USA)

Add to Reading List

Source URL: lawprofessors.typepad.com

Language: English - Date: 2013-02-26 13:01:28
146Steganography / Electronics / Digital audio / Audio engineering / Cryptographic software / Steganalysis / Pulse-code modulation / Data compression / Speech coding / Cryptography / Espionage / Audio codecs

An improved adaptive gain equalizer for noise reduction with low speech distortion

Add to Reading List

Source URL: asmp.eurasipjournals.com

Language: English
147Enigma / Cryptography / Enigma machine / Espionage

Enigma Valley Investment & Loan 527 Franklin St Cambridge, MAExciting new s about your

Add to Reading List

Source URL: web.mit.edu

Language: English - Date: 2013-01-26 18:05:29
148National security / Security / Economic Espionage Act / Industrial espionage / Technical intelligence / Sino-American relations / Chinese intelligence activity abroad / Death by China / Cyberwarfare / Trade secrets / Espionage

1 China’s Cyberespionage: The National Security Distinction and U.S. Diplomacy Greg Austin1 In January 2011, the United States and China agreed for the first time at head of state level to include cybersecurity as an

Add to Reading List

Source URL: thediplomat.com

Language: English - Date: 2015-05-21 18:14:05
149Computer law / Espionage / Spyware / Proprietary software / End-user license agreement / Windows Installer / Digital rights management / Open-source software / Application software / Software licenses / System software / Law

Textured Agreements: Re-envisioning Electronic Consent Matthew Kay, Michael Terry Human-Computer Interaction Lab University of Waterloo Waterloo, Ontario, Canada

Add to Reading List

Source URL: www.mjskay.com

Language: English - Date: 2015-05-09 18:11:08
150Rogue software / Spyware / Social engineering / Chaos Computer Club / Trojan horse / Internet privacy / Rogue security software / Antivirus software / Malware / Espionage / System software

Microsoft Wordstate-trojans.docx

Add to Reading List

Source URL: www.statewatch.org

Language: English - Date: 2012-08-05 06:31:35
UPDATE