Perimeter security

Results: 202



#Item
121Canada / Economy of Mexico / Economy of the United States / Security and Prosperity Partnership of North America / Richard Downie / United States Northern Command / North American Aerospace Defense Command / Foreign relations of Canada / Trilateral Commission / International relations / Canada–United States relations / Economy of North America

1 CHDS Occasional Paper, March 2013 Pushing the Limits of Security and Defense Cooperation Pathway to a North American Security Perimeter? Dr. Richard D. Downie

Add to Reading List

Source URL: chds.dodlive.mil

Language: English - Date: 2013-12-26 10:07:38
122Canada–United States relations

Press Release February 8, 2011 Potential Elements of Perimeter Security Deal Garners Strong Support

Add to Reading List

Source URL: www.harrisdecima.ca

Language: English - Date: 2011-02-08 17:56:11
    123Internet / Computer-mediated communication / Anti-spam / Spamming / Communication software / Email filtering / Email spam / Content filtering / Spam / Computing / Spam filtering / Email

    www.stbernard.com Total Email Perimeter Defense ePrismTM Enterprise is an email security solution that provides organizations of any size with comprehensive email perimeter defense. ePrism delivers a unique combination

    Add to Reading List

    Source URL: www.empath-e.com

    Language: English - Date: 2014-09-09 21:42:02
    124National security / Artificial intelligence / Automatic identification and data capture / Artificial intelligence applications / Automatic number plate recognition / Optical character recognition / Vehicle registration plate / Access control / Threat / Security / Computer security / Surveillance

    www.perceptics.com State ID Proves Vital in LPR for Access Control Vehicle identifications and inspections constitute key components of most perimeter and access control security protocols. The greater the stakes and con

    Add to Reading List

    Source URL: www.perceptics.com

    Language: English - Date: 2012-12-17 07:25:44
    125Data security / Software testing / Prevention / Vulnerability / Information security / Security / Computer security / Cyberwarfare

    Audit of NARA’s Network Perimeter

    Add to Reading List

    Source URL: archives.gov

    Language: English - Date: 2008-04-28 09:23:38
    126Introduction to quantum mechanics / Quantum mechanics / QUEST / Perimeter Institute for Theoretical Physics / Physics of the Impossible / Physics / Introductory physics / Physicist

    Australia 2025: Smart Science Flickr/Jonathan Cohen Physics: a fundamental force for future security Author: Professor Michelle Simmons

    Add to Reading List

    Source URL: www.chiefscientist.gov.au

    Language: English - Date: 2014-03-13 00:19:01
    127Data security / Ethernet / Wireless security / Electronic engineering / Technology / Wireless intrusion prevention system / WIDS / Network switch / Wi-Fi / Computer network security / Wireless networking / Computing

    TECHNICAL DATASHEET VirtualFence Appliance 3e–733A Vulnerability starts at the perimeter. Infrastructure and site surveillance

    Add to Reading List

    Source URL: www.ultra-3eti.com

    Language: English - Date: 2014-05-29 15:39:53
    128Washington /  D.C. / National Capital Planning Commission / Judiciary Square /  Washington /  D.C. / Judiciary Square

    COMMISSION ACTION NCPC File No. MP24/7171 JUDICIARY SQUARE H. CARL MOULTRIE I COURTHOUSE Master Plan Amendment, Building Addition, and Perimeter Security

    Add to Reading List

    Source URL: www.ncpc.gov

    Language: English - Date: 2014-04-16 22:40:38
    129Borders of the United States / Customs services / Geography of Quebec / Quebec City–Windsor Corridor / Via Rail / Corridor / High-speed rail / Montreal / U.S. Customs and Border Protection / Provinces and territories of Canada / Rail transport in Canada / Transport in Canada

    U.S. Canada Border Update January 2012 Perimeter Security Implementation Will Take Time

    Add to Reading List

    Source URL: www.csgeast.org

    Language: English - Date: 2013-02-28 11:00:07
    130Security / Common Criteria / Crime prevention / National security / Security Target / Evaluation Assurance Level / National Information Assurance Partnership / Penetration test / XTS-400 / Evaluation / Computer security / Computer network security

    National Information Assurance Partnership Common Criteria Evaluation and Validation Scheme Validation Report RioRey Perimeter Protection Platform (RE500, RE1500, RX1800, RX2300, RX4400 and RG) with RIOS Software

    Add to Reading List

    Source URL: www.commoncriteriaportal.org

    Language: English - Date: 2013-05-14 14:22:16
    UPDATE