Privacy engineering

Results: 1416



#Item
501Radio-frequency identification / Ubiquitous computing / Wireless / Automation / Logistics / Engineering / Automatic identification and data capture / Technology / Privacy

Subject Description Form Subject Code ISE374 Subject Title Logistics Facility Design

Add to Reading List

Source URL: www.ise.polyu.edu.hk

Language: English - Date: 2014-05-19 23:17:14
502Mobile phone / New media / Telephony / Videotelephony / Internet privacy / Ovi / Antivirus software / Technology / Digital media / Electronic engineering

Fact sheet CYBER SAFETY top ten tips for youth Follow us:

Add to Reading List

Source URL: www.thinkuknow.org.au

Language: English - Date: 2015-03-30 18:18:38
503Internet protocols / Internet standards / Network protocols / Internet privacy / Internet Relay Chat / Proxy server / Session / File Transfer Protocol / User agent / Computing / Network architecture / Internet

Internet Engineering Task Force INTERNET-DRAFT Mark Handley/Eve Schooler UCL/Caltech 22 Feb 1996

Add to Reading List

Source URL: www.cs.columbia.edu

Language: English - Date: 2003-03-25 13:53:13
504Computing / Identity theft / Phishing / Malware / Internet privacy / Social networking service / Social engineering / Computer security / Zeus / Cybercrime / Computer crimes / Crime

Social Networking and Security Risks Victor Law Regional Director, VeriSign User Authentication Services Asia Pacific 1

Add to Reading List

Source URL: www.infosec.gov.hk

Language: English - Date: 2011-08-31 06:18:36
505Design / Human–computer interaction / Computer networks / Internet privacy / Computing / Intranet / User interface design / Website / Systems engineering process / Technical communication / Technology / Usability

GUI DESIGNERS Intranet Service Briefing

Add to Reading List

Source URL: gui-designers.co.uk

Language: English - Date: 2003-05-16 09:55:24
506Australian media / Australia / Electronic engineering / Datacasting / Digital radio / Astra / ACMA / Free-to-air / Digital Forty Four / Communications in Australia / Communication / Australian Communications and Media Authority

POLICY UPDATE MARCH 2014 ASTRA ACTIVITY  South Australian Law Reform Institute – Statutory Cause of Action for Invasion of Privacy –

Add to Reading List

Source URL: www.astra.org.au

Language: English - Date: 2014-09-01 20:28:56
507Internet privacy / Alan Westin / Political privacy / CUPS / Lorrie Cranor / Privacy policy / P3P / Privacy / Ethics / Information privacy

04 - Introduction to Privacy Engineering & Public Policy

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2015-03-03 17:54:07
508Internet privacy / HTTP cookie / Network architecture / World Wide Web / Session / Hypertext Transfer Protocol / Cookie Monster / Transmission Control Protocol / User agent / Computing / Internet / HTTP

Internet Engineering Task Force (IETF) Request for Comments: 6265 Obsoletes: 2965 Category: Standards Track ISSN: [removed]

Add to Reading List

Source URL: www.rfc-editor.org

Language: English - Date: 2011-04-27 19:32:15
509Animal identification / Automatic identification and data capture / Telecommunications engineering / Privacy / Ear tag / Livestock / Traceability / Tamper-evident / Radio-frequency identification / Technology / Identification

Location Numbering Systems Two processes, explained below, support the administration of location identifiers that adhere to the federal standards. State-issued location identifiers are referred to as LIDs, and the locat

Add to Reading List

Source URL: www.tahc.state.tx.us

Language: English - Date: 2014-09-23 16:39:49
510Technology / Computing / Information / Systems engineering process / Project management / Information architecture / Intranet strategies / Intranet portal / Computer networks / Internet privacy / Intranet

KM COLUMN SEPTEMBER[removed]Sixteen steps to a renewed corporate

Add to Reading List

Source URL: www.steptwo.com.au

Language: English - Date: 2012-09-20 02:18:55
UPDATE