Listing 1 - 10 of 11 | << page >> |
Sort by
|
Choose an application
In June 2013, two classified National Security Agency (NSA) collection programs received increased media attention based on unauthorized disclosures of classified documents by a contractor working for the NSA. Under one program, the NSA collects domestic telephone metadata (i.e., call records) in bulk. Under the other program, implemented under the Foreign Intelligence Surveillance Act (FISA), the government collects the contents of electronic communications, including telephone calls and emails, where the target is reasonably believed to be a non-U.S. person located outside the United States.
Choose an application
Emerging Trends in ICT Security, an edited volume, discusses the foundations and theoretical aspects of ICT security; covers trends, analytics, assessments and frameworks necessary for performance analysis and evaluation; and gives you the state-of-the-art knowledge needed for successful deployment of security solutions in many environments. Application scenarios provide you with an insider's look at security solutions deployed in real-life scenarios, including but limited to smart devices, biometrics, social media, big data security, and crowd sourcing. Provides a
Information technology --- Computer crimes --- Cyberterrorism --- Electronic surveillance. --- Security measures. --- Prevention. --- Electronics in surveillance --- SIGINT (Electronic surveillance) --- Signals intelligence --- Surveillance, Electronic --- Attacks on computers --- Computer attacks --- Cyber attacks --- Cyber terrorism --- Cyber war --- Cyberwarfare --- Remote sensing --- Terrorism --- Electronic terrorism (Cyberterrorism)
Choose an application
The work of a multidisciplinary research team, Transparent Lives explains why and how surveillance is expanding-mostly unchecked-into every facet of our lives.
Electronic surveillance --- Privacy, Right of --- Social control --- Social conflict --- Sociology --- Liberty --- Pressure groups --- Electronics in surveillance --- SIGINT (Electronic surveillance) --- Signals intelligence --- Surveillance, Electronic --- Remote sensing --- The New Transparency Project. --- big brother. --- government regulation. --- privacy. --- telecommunications.
Choose an application
One of the most significant issues in contemporary society is the complex forms and conflicting meanings surveillance takes. This book addresses the need for contextualized social perspectives within the study of mediated surveillance. -- Publisher description.
Social media --- Electronic surveillance --- Group identity --- Social media. --- Electronic surveillance. --- Group identity. --- Collective identity --- Community identity --- Cultural identity --- Social identity --- Identity (Psychology) --- Social psychology --- Collective memory --- Electronics in surveillance --- SIGINT (Electronic surveillance) --- Signals intelligence --- Surveillance, Electronic --- Remote sensing --- User-generated media --- Communication --- User-generated content --- E-books
Choose an application
Electronic surveillance --- Privacy, Right of --- Surveillance detection --- Detection of surveillance --- SD (Surveillance detection) --- Invasion of privacy --- Right of privacy --- Electronics in surveillance --- SIGINT (Electronic surveillance) --- Signals intelligence --- Surveillance, Electronic --- Psychological aspects --- Social aspects --- Law and legislation --- Civil rights --- Libel and slander --- Personality (Law) --- Press law --- Computer crimes --- Confidential communications --- Data protection --- Right to be forgotten --- Secrecy --- Remote sensing
Choose an application
Great Britain is in a great crisis, one that gets worse with every attempt to patch things up. The global spread of technology and international links enables a rapid rise in the traffic of dangerous ideas, dangerous materials and dangerous people. An international journalist ties together the common strands that create the fuse for unquenched violence in Great Britain, culminating in a many-faceted crisis for the British state.
Electronic surveillance --- Terrorism --- Acts of terrorism --- Attacks, Terrorist --- Global terrorism --- International terrorism --- Political terrorism --- Terror attacks --- Terrorist acts --- Terrorist attacks --- World terrorism --- Direct action --- Insurgency --- Political crimes and offenses --- Subversive activities --- Political violence --- Terror --- Electronics in surveillance --- SIGINT (Electronic surveillance) --- Signals intelligence --- Surveillance, Electronic --- Remote sensing --- Prevention. --- Great Britain --- Racism. --- Prevention --- E-books
Choose an application
Intelligence service --- Electronic surveillance --- National security --- Data protection --- Privacy, Right of --- National security policy --- NSP (National security policy) --- Security policy, National --- Economic policy --- International relations --- Military policy --- Invasion of privacy --- Right of privacy --- Civil rights --- Libel and slander --- Personality (Law) --- Press law --- Computer crimes --- Confidential communications --- Right to be forgotten --- Secrecy --- Electronics in surveillance --- SIGINT (Electronic surveillance) --- Signals intelligence --- Surveillance, Electronic --- Remote sensing --- Law and legislation --- Technological innovations --- Government policy
Choose an application
Tracking the evolution of digital technology is no easy task; changes happen so fast that keeping pace presents quite a challenge. This is, nevertheless, the aim of the Digital Enlightenment Yearbook.This book is the third in the series which began in 2012 under the auspices of the Digital Enlightenment Forum. This year, the focus is on the relationship of individuals with their networks, and explores "Social networks and social machines, surveillance and empowerment". In what is now the well-established tradition of the yearbook, different stakeholders in society and various disciplinary comm
Internet --- Information society. --- Internet governance. --- Social media. --- Electronic data management. --- Electronic surveillance. --- Big data. --- Data sets, Large --- Large data sets --- Data sets --- Electronics in surveillance --- SIGINT (Electronic surveillance) --- Signals intelligence --- Surveillance, Electronic --- Remote sensing --- User-generated media --- Communication --- User-generated content --- Governance, Internet --- DARPA Internet --- Internet (Computer network) --- Wide area networks (Computer networks) --- World Wide Web --- Sociology --- Information superhighway --- Social aspects. --- Political aspects. --- Government policy. --- Management
Choose an application
"We cannot discount the risk, in light of the lessons of our own history, that at some point in the future, high-level government officials will decide that this massive database of extraordinarily sensitive private information is there for the plucking. Americans must never make the mistake of wholly 'trusting' our public officials."--The NSA Report This is the official report that is helping shape the international debate about the unprecedented surveillance activities of the National Security Agency. Commissioned by President Obama following disclosures by former NSA contractor Edward J. Snowden, and written by a preeminent group of intelligence and legal experts, the report examines the extent of NSA programs and calls for dozens of urgent and practical reforms. The result is a blueprint showing how the government can reaffirm its commitment to privacy and civil liberties--without compromising national security.
Data protection -- Law and legislation -- United States. --- Electronic surveillance -- Law and legislation -- United States. --- Intelligence service -- Law and legislation -- United States. --- National security -- Law and legislation -- United States. --- United States. National Security Agency. --- Constitutional Law - U.S. --- #SBIB:340H20 --- Electronics in surveillance --- SIGINT (Electronic surveillance) --- Signals intelligence --- Surveillance, Electronic --- National Security Agency --- N.S.A. --- Intelligence service --- Electronic surveillance --- National security --- Data protection --- #SBIB:35H24 --- Law and legislation --- Informatiemanagement bij de overheid --- Burgerlijk recht --- United States. --- NSA --- Remote sensing --- Service des renseignements --- Surveillance électronique --- Sécurité nationale --- Protection de l'information (Informatique) --- Droit
Choose an application
This book introduces resource aware image decomposition, registration, fusion, object detection and tracking algorithms along with their applications in security, monitoring and integration in 3rd Generation Surveillance Systems. All algorithms are evaluated through experimental and simulation results and a parallel and pipelined efficient architecture for implementing the algorithms is described. • Describes a new type of image processing algorithms that are suited for low power and low memory platforms such as wireless sensor networks or mobile devices; • Uses simulation and experimental results to evaluate algorithms presented; • Includes hardware architecture for critical components in the algorithms described.
Electronic surveillance. --- Video surveillance. --- Electronics in surveillance --- SIGINT (Electronic surveillance) --- Signals intelligence --- Surveillance, Electronic --- Electronic digital computers -- Circuits. --- Integrated circuits -- Very large scale integration. --- Video surveillance --- Systems engineering. --- Electronics. --- Circuits and Systems. --- Electronics and Microelectronics, Instrumentation. --- Electrical engineering --- Physical sciences --- Engineering systems --- System engineering --- Engineering --- Industrial engineering --- System analysis --- Design and construction --- Remote sensing --- Electronic surveillance --- Video recording --- Electronic circuits. --- Microelectronics. --- Electron-tube circuits --- Electric circuits --- Electron tubes --- Electronics --- Microminiature electronic equipment --- Microminiaturization (Electronics) --- Microtechnology --- Semiconductors --- Miniature electronic equipment --- Image processing --- Sensor networks. --- Image analysis. --- Electrical engineering. --- Digital techniques.
Listing 1 - 10 of 11 | << page >> |
Sort by
|