Espionage

Results: 3893



#Item
571Steganography / Statistical inference / Steganalysis / Year of birth missing / Noisy-channel coding theorem / Information theory / Embedding / Statistical hypothesis testing / Estimator / Cryptography / Espionage / Mathematics

IEEE SIGNAL PROCESSING LETTERS, VOL. 14, NO. 8, AUGUSTA Capacity Result for Batch Steganography Andrew D. Ker, Member, IEEE

Add to Reading List

Source URL: www.cs.ox.ac.uk

Language: English - Date: 2007-07-26 11:03:53
572Computing / 105th United States Congress / United States / Software licenses / Copyright / Library science / Proprietary software / Password / Digital Millennium Copyright Act / Computer law / Law / Espionage

OPENSTREETMAP FOUNDATION WEBSITE TERMS OF USE Introduction; Your Agreement to these Terms of Use. Welcome to the OpenStreetMap Foundation (“OSMF”) website, www.openstreetmap.org (the “OSMF Site”). The following

Add to Reading List

Source URL: wiki.openstreetmap.org

Language: English - Date: 2009-06-20 15:40:46
573Rogue software / Utility software / Lavasoft / Windows Registry / Spyware / Ad-Aware / Registry cleaner / System software / Software / Espionage

Registry Tuner The simple way to get the best performance from your PC. Your computer’s registry, the database containing information about programs installed on your PC, can become bogged down with corrupt and unused

Add to Reading List

Source URL: lavasoft.com

Language: English - Date: 2011-12-19 07:14:44
574Espionage / Technical surveillance counter-measures

v20140525Book Print.pub

Add to Reading List

Source URL: www.ctsc-canada.com

Language: English - Date: 2014-12-08 11:35:48
575Trade secrets / Double agents / Corporate crime / Industrial espionage / Louis Freeh / Robert Hanssen / Cyberwarfare / Spies / Espionage

FBI Reports: Spies Cost US $2B Monthly By Del Jones, USA Today WASHINGTON - Former FBI Director Louis Freeh said that U.S. companies are under economic attack from 23 countries trying to steal trade secrets and other int

Add to Reading List

Source URL: executiveworldservices.com

Language: English - Date: 2012-08-22 12:44:09
576Internet / Espionage / Computer network security / Internet protocols / Tunneling protocols / IPsec / Virtual private network / Cryptography / Tor / Computing / Cryptographic protocols / Internet privacy

Introduction Bypassing IPSec Dynamic cryptographic trapdoors

Add to Reading List

Source URL: cansecwest.com

Language: English - Date: 2011-03-29 19:42:58
577Privacy / Mass surveillance / Espionage / National Security Agency / Echelon / Charter of Fundamental Rights of the European Union / Central Intelligence Agency / European Union / Regulation of Interception of Communications and Provision of Communication-related Information Act / Privacy of telecommunications / National security / Surveillance

MOTION FOR A RESOLUTION European Parliament resolution on the existence of a global system for the interception of private and commercial communications (ECHELON interception system) The European Parliament, – having r

Add to Reading List

Source URL: cryptome.org

Language: English - Date: 2009-02-03 13:08:57
578Privacy of telecommunications / Criminal law / Government / Privacy law / National Information Infrastructure Protection Act / Espionage Act / Law / Gorin v. United States / Title 18 of the United States Code

DECLASSIFIED Authority NND • ..... To eliminate a dilemma

Add to Reading List

Source URL: cryptome.org

Language: English - Date: 2015-01-11 06:30:57
579Intelligence analysis / Military intelligence / Central Intelligence Agency / McLean /  Virginia / Inter-Services Intelligence / Counterintelligence / Open-source intelligence / Computer security / Information policy / Espionage / Security / National security

DO NOT COPY ! PROPERTY OF ECIPS European Centre for Information Policy and Security (ECIPS) ECIPS Transparency Register no DO NOT COPY ! PROPERTY OF ECIPS

Add to Reading List

Source URL: ecips.eu

Language: English - Date: 2014-04-21 10:41:25
580National security / Call-recording software / Verint Systems / Security / Comverse Technology / Central Intelligence Agency / Surveillance / Espionage / Mass surveillance

City of Beijing Enhances Security With Multi-Million Dollar Networked Video Solution From Verint February xx, 2006 Page 2 Verint Closes Acquisition of MultiVision’s Networked Video Security Business

Add to Reading List

Source URL: www.multivision.com.hk

Language: English - Date: 2006-03-07 21:00:34
UPDATE