Sensor and detection technology, including, principles of operation and signal analysis, Alarm devices, searching aids and systems, Monitoring, command, control and communication systems, Computer systems security and privacy, Information security, Communication security and privacy, including modulation techniques, spectrum management and encryption, Biometric identification systems, utilizing voice, handwriting, fingerprints, hand geometry, facial recognition, Entry control systems, access delay technology and surveillance and more on the
42nd Annual Conference 2008 IEEE International Carnahan Conference on Security Technology. Diplomat Hotel Prague (Czech Republic, Europe), October 13 – 16, 2008.Registration. Program:
– Sensor and detection technology, including, principles of operation and signal analysis
– Alarm devices, searching aids and systems
– Monitoring, command, control and communication systems
– Computer systems security and privacy
– Information security
– Communication security and privacy, including modulation techniques, spectrum management and encryption
– Biometric identification systems, utilizing voice, handwriting, fingerprints, hand geometry, facial recognition, etc.
– Entry control systems, access delay technology and surveillance
– Counter-terrorism techniques and technology
– Impact on society of security systems and technology
– User experiences of operating security systems including their introduction and testing
– Police and forensic technology
– Cryptology
– Less-than-lethal weapons technology
– Counter proliferation of weapons of mass destruction
– Port and airport security
– Emergency management
– Network intrusion detection technology and virus protection
– Border security
Similar Posts:
- MiFare Subway Hack
- Sniffing networks and data analysis
- Bluetooth Security & Vulnerabilities
- WPA broken PACSEC 2008 + Aircrack-PTW
- AirDrop-ng video presentation – security conference Shmoocon 2010
- BackTrack 5 Revolution released
- BackTrack 5 ARM Linux on Android devices
- Wireless Hacking – Ultimate Ubuntu Guide
- Exploiting with Metasploit – Hacking Windows XP Box
- AiroWizard GUI Tool for Windows WLAN hacking