Printer Friendly

Browse Security devices topic

Usage subtopic


1-49 out of 49 article(s)
Title Author Type Date Words
Schoolboy who failed A-level computing becomes one of world's richest hackers; Mark Litchfield, who is married to Playboy model Carley Lynn, is an ethical hacker who uses his skills for good. Sep 7, 2019 628
LeClairRyan Aviation Attorney cautions airports, airlines in use of on boarding facial recognition technology. Jul 11, 2019 282
LeClairRyan Aviation Attorney cautions airports, airlines in use of on boarding facial recognition technology. Jul 11, 2019 299
Use of Electronic Security Systems in the Security of Information Resources in Federal University Libraries in Southern Nigeria. Chioma, Ezeabasili Augusta; Nwosu, Obiora Dec 1, 2018 2213
Artificial intelligence has a role in cybersecurity but isn't the magic bullet. Nov 6, 2018 725
Application of Local Outlier Factor Algorithm to Detect Anomalies in Computer Network. Auskalnis, Juozas; Paulauskas, Nerijus; Baskys, Algirdas Report Jun 1, 2018 2994
The Motif-Based Approach to the Analysis of the Employee Trajectories within Organization. Novikova, Evgenia; Bekeneva, Yana; Shorov, Andrey Jan 1, 2018 6753
Network Intrusion Detection with Threat Agent Profiling. Bajtos, Tomas; Gajdos, Andrej; Kleinova, Lenka; Lucivjanska, Katarina; Sokol, Pavol Jan 1, 2018 10263
Smart attendance system using face recognition. Devan, P. Arun Mozhi; Venkateshan, M.; Vignesh, A.; Karthikraj, S.R.M. May 1, 2017 2420
Trends in Cervical Cytology Screening and Reporting Practices: Results From the College of American Pathologists 2011 PAP Education Supplemental Questionnaire. Crothers, Barbara A.; Darragh, Teresa M.; Tambouret, Rosemary H.; Nayar, Ritu; Barkan, Guliz A.; Zha Survey Jan 1, 2016 8191
Quantitative management of financial risk in supplying a health plan/La administracion cuantitativa del riesgo financiero en la provision de un plan de salud/A administracao quantitativa do risco financeiro na provisao de um plano de saude. Castro-Iragorri, Carlos Alberto Jan 1, 2015 5874
Destination News - Europe. Gesar, Aram Mar 3, 2014 1325
Burglar-proof your garage: is your garage door an easy entrance? Wentz, Gary Apr 1, 2013 1164
A privacy-aware graph-based access control system for the healthcare domain. Tian, Yuan; Song, Biao; Hassan, Mohammad Mehedi; Huh, Eui-Nam Oct 1, 2012 9854
Smart object tracking system using MATLAB. Alhadidi, Basim Jul 1, 2012 1528
Forethought central in designing high security spaces. Spector, Scott Oct 7, 2009 756
In the crosshairs: limiting the impact of workplace shootings. Gunther, Will Nov 1, 2008 1394
Airport initiative hopes to speed up wait on lines: fliers can choose security lanes based on travel experience. Brooks, David Aug 29, 2008 385
Emergency notification in an instant: following the recent campus shootings, universities are seeking the most effective and multifaceted electronic alert systems from a host of IT companies. Galuszka, Peter Mar 6, 2008 1950
Safe control for silo parks. Brief article Sep 1, 2007 304
Campus access controlled: in need of an access control system, security at the University of Pittsburgh sought a solution that would support existing ID cards. Anderson, Teresa Jul 1, 2007 806
Thwarting drug thieves: to catch pharmacy thieves, one drug company has funded a Web-based incident database; it also pays rewards for crime tips. Straw, Joseph Feb 1, 2007 1128
The ABCs of USB. Piazza, Peter Jan 1, 2007 505
Convergence: smart cards versus biometrics. Piazza, Peter Brief article Jan 1, 2007 359
Anti-theft solutions. Oct 1, 2006 399
Security is the number one job in corrections: how well-trained is your staff? Brooks, Tonya M. Oct 1, 2006 727
Planters and bollards make for safer buildings. Dawson, Huston Aug 2, 2006 673
High tech, high risk? Property/casualty insurers look at emerging technologies not for their typical uses, but for hidden abuses--and potential exposures. Coyne, Frank J. Jul 1, 2006 657
Anonymous reporting technology. Fratt, Lisa Brief article Apr 1, 2006 252
Old school, new system. Mury, Charles Apr 1, 2006 2180
The Betamax Dilemma. Piazza, Peter Feb 1, 2006 585
Who's listening? Electronic eavesdroppers have many ways to pick up your private conversations. Find out how to catch them. Kaiser, Martin L., III; Stokes, Robert S. Feb 1, 2006 2440
Why your facility needs a visitor management system. Downing, Cindy Jan 1, 2006 629
This facade isn't just a pretty face. Azoulay, Ofer Sep 1, 2005 2041
Security essential: multiple-layer security design for building protection. Stevens, Maxwell A. Aug 1, 2005 2446
Home on the page @ Gips, Michael A. Jul 1, 2005 998
Safeguarding correctional officers and staff while on the job. Smith, Don Jul 1, 2005 951
Department of Energy moving on security initiatives. Pappalardo, Joe May 1, 2005 475
Study questions CCTV's value. Gips, Michael A. May 1, 2005 426
Ports look outward: seaports, shippers, and the government are linking their efforts to maintain a critical infrastructure. DeGaspari, John May 1, 2005 2500
Government mandates key to electronic container tracking's success. Mar 1, 2005 299
MEP and technology innovations for urban living. Lilker, Bruce Feb 16, 2005 643
Biometric scheme trialled for New York-Amsterdam flights. Brief Article Jan 17, 2005 134
Unification theory: how advances in connectivity among markets, companies, and systems are reshaping security operations. Harowitz, Sherry L. Jan 1, 2005 2879
The Magshoe: the Magshoe, a new Israeli-designed invention, aims to fill a void in the security market, and is currently on trial in the UK. Dec 1, 2004 552
Secure devices. Jun 10, 2004 789
Cicero's security philosophy: the Cicero School District's proactive approach to protecting staff and students at one new school offers important lessons for other schools. Timm, Paul D. Nov 1, 2003 2208
The false allure of security technologies. Casella, Ronnie Sep 22, 2003 4500

Terms of use | Privacy policy | Copyright © 2020 Farlex, Inc. | Feedback | For webmasters