Security engineering

Results: 11317



#Item
281Security engineering / Smart devices / Security / Radio electronics / Prevention / Physical security / Smart lock / Home automation / Key / Lock / Smart key / Remote keyless system

August Home Ships HomeKit Enabled 2nd Generation Smart Lock New Smart Lock uses voice commands such as “Siri, is my door locked?” to lock, unlock and check the status of doors SAN FRANCISCO, April 28, 2016 — August

Add to Reading List

Source URL: august.com

Language: English - Date: 2016-08-09 19:03:15
282Cameras / Equipment / Technology / Imaging / Video / Optical devices / Pantiltzoom camera / Security engineering / EarthCam / Webcam / Digital camera

EarthCam Webcam Technology GigapixelCam A&E Specifications

Add to Reading List

Source URL: www.earthcam.net

Language: English - Date: 2012-06-13 20:48:23
283Computing / Telecommunications engineering / Data management / Network file systems / Cloud infrastructure / Cloud storage / Storage security / Computer data storage / Storage Networking Industry Association / Storage area network / Backup / ISCSI

Exam Description Document for the SNIA Storage Networking Foundation Exam (S10-110) Exam Title: What is the actual name of the exam? SNIA Storage Networking Foundation (S10-110) exam

Add to Reading List

Source URL: www.snia.org

Language: English - Date: 2016-01-13 20:11:57
284Semantic Web / Computer security / Access control / Security / Computing / Ontology / Knowledge engineering / Computer access control / Role-based access control / Description logic / Web Ontology Language / Lightweight ontology

PhD Dissertation International Doctorate School in Information and Communication Technologies DIT - University of Trento

Add to Reading List

Source URL: disi.unitn.it

Language: English - Date: 2014-09-10 09:40:14
285Misconduct / Spamming / Crime / Computing / Cybercrime / Social engineering / Identity theft / Phishing / Computer virus / Computer security / Email spam / Email

THE FACTS: PHISHING AND SPEARPHISHING What is “phishing?” Email attack is the preferred method for many hackers. Verizon’s 2013 Data Breach Investigations Report found that “more than 95% of all attacks tied to s

Add to Reading List

Source URL: www.arcyber.army.mil

Language: English - Date: 2016-03-15 15:31:42
286Malware / Cyberwarfare / Rogue software / Scareware / Social engineering / Ransomware / Rogue security software / Computer virus / Rootkit / Antivirus software / Winwebsec / Hierarchical clustering

Exploiting Visual Appearance to Cluster and Detect Rogue Software Christian J. Dietrich1,3 , Christian Rossow1,2 , Norbert Pohlmann1 {dietrich|rossow|pohlmann}@internet-sicherheit.de 1

Add to Reading List

Source URL: norbert-pohlmann.com

Language: English - Date: 2015-10-20 13:15:57
287Actuarial science / Economy / Prevention / Risk / Security / Project management / Systems engineering / Risk management / Enterprise risk management / Finance / Insurance / Succession planning

FB Logos-Vector_OpenersBlueWtaglines.eps

Add to Reading List

Source URL: www.crystalco.com

Language: English - Date: 2015-05-14 10:30:03
288Economy / Business / Occupations / Human resource management / Switchboard operator / Occupational Outlook Handbook / Clerk / Social Security / Ten-year occupational employment projections / Standard Occupational Classification System

Change in the Service Industry, post-WWII - present Final Report Kallie Hedberg Undergraduate Major in Environmental Engineering Massachusetts Institute of Technology Cambridge, MassachusettsUSA

Add to Reading List

Source URL: service-science.info

Language: English - Date: 2010-06-28 11:35:33
289Computing / Technology / Wireless networking / Computer network security / Computer networking / Networking hardware / Computer network / Telecommunications engineering / Wi-Fi / Personal computer / Wireless access point / Computer security

CURRICULUM POLO On-site Training for OFWs

Add to Reading List

Source URL: ilab.dole.gov.ph

Language: English - Date: 2015-11-26 00:49:12
290Assault rifles / AR-platform firearms / Firearm actions / Mechanical engineering / Military technology / Security / Gas-operated reloading / Action / M16 rifle / Forward assist / Single-shot / Bolt

BFI OP. MANUAL PDF Version WARNING: BEFORE USING THlS FIREARM, READ AND FOLLOW THESE INSTRUCTIONS. If there is anything you do not understand,

Add to Reading List

Source URL: www.ar15.com

Language: English - Date: 2004-07-29 11:05:56
UPDATE