Interception

Results: 776



#Item
171Earth / Physical geography / Stemflow / Canopy interception / Ecohydrology / Interception / Throughfall / Soil / Erosion / Hydrology / Forestry / Water

Hydrol. Earth Syst. Sci., 13, 1133–1144, 2009 www.hydrol-earth-syst-sci.net[removed]/ © Author(s[removed]This work is distributed under the Creative Commons Attribution 3.0 License. Hydrology and

Add to Reading List

Source URL: www.hydrol-earth-syst-sci.net

Language: English - Date: 2014-12-04 02:28:44
172Law / Privacy / Mass surveillance / USA PATRIOT Act / Computer law / Section summary of the USA PATRIOT Act /  Title II / Regulation of Interception of Communications and Provision of Communication-related Information Act / Privacy of telecommunications / Privacy law / National security

Government Communications Security Bureau Amendment Bill Government Bill As reported from the committee of the whole House

Add to Reading List

Source URL: www.legislation.govt.nz

Language: English - Date: 2013-08-20 17:28:58
173Law / Regulation of Interception of Communications and Provision of Communication-related Information Act / Privacy / Constitutional amendment / United States Bill of Rights / Section summary of the USA PATRIOT Act /  Title II / Official Secrets Act / Privacy of telecommunications / National security / Privacy law

No 306 House of Representatives Supplementary Order Paper

Add to Reading List

Source URL: www.legislation.govt.nz

Language: English - Date: 2013-08-05 19:54:28
174Physical geography / Evapotranspiration / Watershed / Drainage basin / Canopy interception / Hydrology / Water / Earth

egu_logo_without_circle_grey

Add to Reading List

Source URL: www.hydrol-earth-syst-sci.net

Language: English - Date: 2014-12-04 03:48:26
175Public safety / Crime prevention / Law enforcement / Surveillance / Independent Commission Against Corruption / Section summary of the USA PATRIOT Act /  Title II / USA PATRIOT Act /  Title II / National security / Privacy of telecommunications / Security

立法會 Legislative Council LC Paper No. LS103[removed]Comparison of provisions governing authorization to carry out interception of communications or covert surveillance in the Telecommunications Ordinance (Cap. 106), I

Add to Reading List

Source URL: www.legco.gov.hk

Language: English - Date: 2005-10-19 22:42:50
176Crime prevention / Law enforcement / Mass surveillance / Regulation of Investigatory Powers Act / Surveillance / Security / Law / National security

The Interception of Communications Commissioner’s 2014 Report Big Brother Watch response Daniel Nesbitt, research director of Big Brother Watch, said: “It is telling that on the same day the Intelligence and Security

Add to Reading List

Source URL: www.bigbrotherwatch.org.uk

Language: English - Date: 2015-03-18 08:37:00
177Privacy of telecommunications / Human rights / Crime prevention / Law enforcement / National security / Telecommunications data retention / Data Retention Directive / Mass surveillance / Regulation of Interception of Communications and Provision of Communication-related Information Act / Ethics / Security / Law

Telecommunications (Interception and Access) Amendment (Data Retention) Bill 2014 Submission 129 JOINT COMMITTEE ON INTELLIGENCE AND SECURITY INQUIRY INTO THE TELECOMMUNICATIONS (INTERCEPTION AND ACCESS) AMENDMENT (DATA

Add to Reading List

Source URL: libertyvictoria.org

Language: English - Date: 2015-01-23 08:21:13
178Security Target / Microsoft Cluster Server / Computing / National security / Ethics / Common Criteria / Evaluation / Lawful interception

Microsoft Word - ZXWN MSCS ZXUN iCX Security Target V1.1.doc

Add to Reading List

Source URL: sertit.no

Language: English - Date: 2013-09-19 06:43:37
179Limited liability partnership / Jurisdiction / Bird / Extraterritorial jurisdiction / Law / International law / Bird & Bird

Extraterritorial interception and communications data acquisition CLIP Launch Workshop Graham Smith Bird & Bird LLP @cyberleagle

Add to Reading List

Source URL: clip.blogs.sas.ac.uk

Language: English - Date: 2015-03-10 09:07:43
180Certificate authority / X.509 / Root certificate / Extended Validation Certificate / Public key certificate / HTTP Secure / Self-signed certificate / Phishing / Verisign / Cryptography / Public-key cryptography / Key management

Certified Lies: Detecting and Defeating Government Interception Attacks Against SSL∗ Christopher Soghoian and Sid Stamm† “Cryptography is typically bypassed, not penetrated.”

Add to Reading List

Source URL: cryptome.org

Language: English - Date: 2010-03-24 15:24:37
UPDATE