Espionage

Results: 3893



#Item
601Sophos / Antivirus software / Computer network security / PureMessage / Spyware / Microsoft Windows / Espionage / System software / Computer security

Product launch primer: Small business solutions, version 2.0 (Q3[removed]We are introducing a new range of Small Business Editions as part of this release There will be three editions that are sold as part of the Sophos s

Add to Reading List

Source URL: www.openaccess.co.uk

Language: English - Date: 2008-02-20 05:25:52
602Antivirus software / Computer network security / Malware / Rogue software / Spyware / Sophos / Computer virus / Proprietary software / Agnitum / Espionage / System software / Software

NEW Small Business Solutions Security made simple Sophos’ reliably engineered, easy-to-operate products protect over 35 million users in more than 150 countries worldwide. Its small business solutions are purpose-built

Add to Reading List

Source URL: www.openaccess.co.uk

Language: English - Date: 2008-02-20 05:26:09
603Harvard Humanitarian Initiative / National security / Unmanned aerial vehicles / Military / Espionage / Military terminology / Signals intelligence / Humanitarian aid

Introduction The Humanitarian UAV Network (UAViators) was founded in the aftermath of Typhoon Haiyan, one of the most powerful Typhoons in recorded human history. It took over 60 hours to acquire, analyze and share satel

Add to Reading List

Source URL: irevolution.files.wordpress.com

Language: English - Date: 2015-02-25 07:11:19
604Internet privacy / Human rights / Crime prevention / Law enforcement / National security / Encryption / Tor / Secure communication / Privacy / Security / Ethics / Espionage

THE NEED FOR DEMOCRATIZATION OF DIGITAL SECURITY SOLUTIONS TO ENSURE THE RIGHT TO FREEDOM OF EXPRESSION Joint submission of the Citizen Lab (Munk School of Global Affairs, University of Toronto) and Collin Anderson to th

Add to Reading List

Source URL: www.ohchr.org

Language: English - Date: 2015-03-16 11:04:17
605Espionage / Backdoor / Rootkit / Code injection / Veracode / Loadable kernel module / Hooking / Eval / Self-modifying code / Malware / System software / Cyberwarfare

Static Detection of Application Backdoors Chris Wysopal, Chris Eng Veracode, Inc. Burlington, MA USA [removed], [removed] Abstract— This paper describes a high level classification of

Add to Reading List

Source URL: www.veracode.com

Language: English - Date: 2014-02-11 00:25:06
606Technology / Payment systems / Finance / Espionage / Hardware security module / Smart cards / Magnetic stripe card / MasterCard / Contactless smart card / ISO standards / Ubiquitous computing / EMV

Simplify the complexity of EMV data preparation Prime Factors makes legacy-system EMV data preparation as easy and familiar as magnetic stripe is today. Now you can control your most sensitive and proprietary information

Add to Reading List

Source URL: primefactors.com

Language: English - Date: 2013-05-09 18:04:22
607National Security Agency / Mass surveillance / Crime prevention / Law enforcement / Surveillance / Cryptography / Cipher / NSA warrantless surveillance controversy / Russ Tice / National security / Security / Espionage

  Big  Data  and  Mass  Surveillance   Dr.  Paul  J.  Ennis,  Trinity  College  Dublin     Big  Data  is  one  of  those  terms  that  comes  along  eve

Add to Reading List

Source URL: www.fact.co.uk

Language: English - Date: 2015-02-19 11:50:52
608Steganalysis / Microdot / Digital watermarking / Child pornography / Watermark / Steganography tools / BPCS-Steganography / Cryptography / Steganography / Espionage

1032562_Update_green_v1#1_V4

Add to Reading List

Source URL: www.ndaa.org

Language: English - Date: 2011-02-11 09:25:27
609Social information processing / Web 2.0 / Social media / Photo sharing / Origin / Internet privacy / Facebook / Internet forum / PlayStation Home / Software / Computing / Espionage

Terms of Service (Last updated on 28 May, 2013) These terms of service ("Terms") constitute a binding agreement between BulkyPix, located at 6 avenue de Sceaux, 78000 Versailles, France ("BulkyPix"), and the user ("User"

Add to Reading List

Source URL: static.bulkypix.com

Language: English - Date: 2013-05-29 04:51:21
610Privacy law / National security / Government / Security / Espionage / Mass surveillance / New Zealand intelligence agencies / Government Communications Security Bureau / Privacy of telecommunications

No 323 House of Representatives Supplementary Order Paper Tuesday, 6 August 2013

Add to Reading List

Source URL: www.legislation.govt.nz

Language: English - Date: 2013-08-05 21:48:18
UPDATE