Espionage

Results: 3893



#Item
981Security / Public safety / Mobile technology / Sony Watchman / Guard tour patrol system / Security guard / Data logger / Morse / Technology / Crime prevention / Recorders

get more from the tour! Add value to your guard tours with Morse Watchmans’ PowerCheck. Designed to help prevent liability and costly losses from vandalism, theft, espionage and accidents, PowerCheck gives your securit

Add to Reading List

Source URL: www.morsewatchmans.com

Language: English - Date: 2013-05-07 06:30:30
982Microsoft Windows / Malware / Software licenses / Computer law / Microsoft SpyNet / Spyware / Windows Update / Microsoft Security Essentials / Digital rights management / System software / Software / Espionage

MICROSOFT SOFTWARE LICENSE TERMS MICROSOFT SECURITY ESSENTIALS 1.0 These license terms are an agreement between Microsoft Corporation (or based on where you live, one of its affiliates) and you. Please read them. They ap

Add to Reading List

Source URL: dri1.img.digitalrivercontent.net

Language: English - Date: 2010-10-18 16:49:37
983Computing / Espionage / Proprietary software / End-user license agreement / Free software / Software / Application software / Commercial software / Malware / Software licenses / Law / Computer law

END-USER LICENSE AGREEMENT FOR MOTION COMPUTING, INC., THIRD PARTY AND MICROSOFT SOFTWARE Motion End User License Agreement End-User Software License Agreement: This is a legal agreement between you, the user and me, the

Add to Reading List

Source URL: dri1.img.digitalrivercontent.net

Language: English - Date: 2011-12-30 17:13:48
984System software / Computing / Malware / Computer network security / Rogue software / Spyware / Microsoft / Proprietary software / Microsoft litigation / Espionage / Computer law / Software licenses

MICROSOFT SOFTWARE LICENSE TERMS AND SERIVCE AGREEMENT Microsoft Service Agreement Last Updated: September, 2010 THANK YOU FOR CHOOSING MICROSOFT! 1. What the Contract Covers. This is a contract between you and the Micro

Add to Reading List

Source URL: dri1.img.digitalrivercontent.net

Language: English - Date: 2010-11-02 18:25:54
985Cyberwarfare / Signals intelligence / Cryptography / Intelligence gathering disciplines / National Security Agency / Electronic warfare / Traffic analysis / Russian Ground Forces / Radio jamming / National security / Espionage / Military communications

P.L[removed] ~~UV0~~l1 ~(3~rnWVU~ ~~(3~~~

Add to Reading List

Source URL: www.nsa.gov

Language: English - Date: 2013-01-16 14:15:20
986Signals intelligence / Mass surveillance / Intelligence / Intelligence gathering disciplines / National Security Agency / Standardization / Signals intelligence in the Cold War / National security / Security / Espionage

DOO;:IDt 400,)[removed]WUJUUlDWUJl1 ~13lBlDWUU~ UJ~13WlB~

Add to Reading List

Source URL: www.nsa.gov

Language: English - Date: 2013-01-16 14:16:43
987Intelligence / Military intelligence / Indo-Pakistani War / Information sensitivity / Research and Analysis Wing / Central Intelligence Agency / Secretaría de Inteligencia / Inter-Services Intelligence / Intelligence cycle management / National security / Espionage / Data collection

Microsoft Word - Role of Intelligence and Security Chiefs in Crisis Situations - revised.docx

Add to Reading List

Source URL: socialsciences.uottawa.ca

Language: English - Date: 2013-11-13 10:28:59
988Espionage / Metadata / Signals intelligence / Intelligence / Military intelligence / Cryptography / Cryptanalysis / Bearing / National Security Agency / National security / Linguistics / Navigation

WlDum:DWlD(1 LrffiIDU ~l3[BlD(BVU~ (D(Bl3W[B~ ~f]ffiID~f] ~~

Add to Reading List

Source URL: www.nsa.gov

Language: English - Date: 2013-01-16 13:27:52
989Intelligence / Signals intelligence / Military intelligence / National Security Agency / Central Intelligence Agency / Traffic analysis / Cryptography / Signals intelligence in the Cold War / Signals intelligence in modern history / National security / Espionage / Data collection

GJUlUUlJGJUl~ §[$lB(!Jrnuu~ Ul(B~GJlB~ (r(DI]U (B(3(DI](B(3 (B~ OO(3(D(I)(3 v OO(DI]~(b(Drn(I)

Add to Reading List

Source URL: www.nsa.gov

Language: English - Date: 2013-01-16 13:27:05
990Videotelephony / Surveillance / Privacy of telecommunications / Privacy law / Communications Assistance for Law Enforcement Act / Mass surveillance / Telephone tapping / Skype / Secure communication / Software / Voice over IP / Espionage

CALEA  II:  Risks  of  Wiretap  Modifications  to  Endpoints   Ben  Adida   Collin  Anderson   Annie  I.  Anton  (Georgia  Institute  of  Technology)   Matt  Bl

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2015-01-21 19:48:40
UPDATE