Secure Digital

Results: 1590



#Item
241Pentax cameras / Pentax / Camera / Battery charger / Optics / Digital cameras / Pentax K mount / Pentax K10D / Technology / Photography / Secure Digital

PENTAX RICOH IMAGING CO., LTD, Maeno-cho, Itabashi-ku, Tokyo, JAPAN (http://www.pentax.jp) PENTAX RICOH IMAGING 112 Quai de Bezons, B.P. 204, 95106 Argenteuil Cedex, FRANCE S.A.S. FRANCE

Add to Reading List

Source URL: www.ricoh-imaging.co.jp

Language: English - Date: 2013-07-25 13:23:03
242High-definition television / Television technology / Video signal / HDMI / 1080p / Telecine / Red Digital Cinema Camera Company / Serial digital interface / Secure Digital / Television / Terminology / Electronic engineering

  Video and Communications Infrastructure The documents attached provide signal path, camera position and connections diagrams for the installed North Door video production and streaming infrastructure. Also included a

Add to Reading List

Source URL: www.ndvenue.com

Language: English - Date: 2015-02-28 23:50:20
243Cyberwarfare / Applied mathematics / Digital signature / RSA / ID-based encryption / Information security / Elliptic curve cryptography / Cryptography / Public-key cryptography / Security

1 BAF: An Efficient Publicly Verifiable Secure Audit Logging Scheme for Distributed Systems Attila A. Yavuz and Peng Ning Department of Computer Science

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:25:58
244Computer security / Software / Network security / Digital security / Computer network security / EnGarde Secure Linux / Security

GDSN Overviewindd

Add to Reading List

Source URL: www.guardiandigital.com

Language: English - Date: 2010-08-11 14:48:59
245Software / Z / Digital media / Computing / Network file systems / IBM software / OpenAFS

OpenAFS for Windows Status Report

Add to Reading List

Source URL: www.secure-endpoints.com

Language: English - Date: 2007-05-10 16:58:36
246Security / Applied mathematics / Signcryption / Digital signature / Cipher / Elliptic curve cryptography / ID-based encryption / Cryptography / Public-key cryptography / Cyberwarfare

1 Hash-Based Sequential Aggregate and Forward Secure Signature for Unattended Wireless Sensor Networks Attila Altay Yavuz and Peng Ning

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:26:12
247Car theft / Digital media / Crime prevention / Application software / Windows games / Motor vehicle theft / Grand Theft Auto / Theft / Anti-theft system / Action-adventure games / Crimes / Crime

STRATEGIC PLANTowards a Secure System The NMVTRC is an initiative of Australian

Add to Reading List

Source URL: carsafe.com.au

Language: English - Date: 2014-10-07 02:03:30
248Microphone / GPS navigation device / Technology / Recording / Information science / GPS / Secure Digital / Event data recorder

DRAFT #6 (FALKNER) – APRIL 24, 2007 – 10:20 AM CDT

Add to Reading List

Source URL: www.digitalallyinc.com

Language: English - Date: 2012-02-01 11:20:14
249Email / Technology / Digital media

IAPCO SURVEY 2013 METHODOLOGY •Internet secure server •Easy questions •Little time to fill in…

Add to Reading List

Source URL: www.iapco.org

Language: English - Date: 2014-05-22 06:50:31
250GUI widget / Secure Digital

Intrepid Control Systems, Inc. Log Collections of Messages with Different Rates Document Number: AN-ICSIRev

Add to Reading List

Source URL: banner.intrepidcs.net

Language: English - Date: 2015-01-26 07:22:03
UPDATE