Jump to content

Search results

  • Homeland Open Security Technology (HOST) is a five-year, $10 million program by the Department of Homeland Security's Science and Technology Directorate...
    7 KB (584 words) - 18:18, 3 August 2024
  • to establish and implement the Homeland Open Security Technology (HOST) program, which promotes open security. Open Solutions Alliance Open Source Initiative...
    5 KB (314 words) - 21:58, 28 December 2023
  • Thumbnail for Automated fare collection
    originally designed by a group of transit operators CIPURSE, is an open security standard for transit fare collection systems "The ticket to a better...
    16 KB (1,273 words) - 05:27, 1 June 2024
  • Thumbnail for Melanie Rieback
    Radically Open Security provides services regarding code audits, cryptographic analysis, forensics, malware reversing, and more. Radically Open Security is also...
    8 KB (734 words) - 16:06, 14 May 2023
  • Thumbnail for List of Linux adopters
    "What is open security?" (PDF). Institute for Defense Analyses. Open Security. Retrieved 7 September 2013.[permanent dead link] "Open Security Foundation"...
    78 KB (7,398 words) - 19:09, 3 August 2024
  • Thumbnail for IP camera
    comparison". Black Box. Retrieved 2022-06-19. "ONVIF: a guide to the open security platform". IFSEC Global. 2016. Retrieved 18 November 2017. "StackPath"...
    20 KB (2,123 words) - 16:13, 5 July 2024
  • "The State's Only Prison For Women Began as a Working Farm". Connecticut Magazine. Retrieved 2020-10-06. Rogers, Helen (1929-01-01). "History of the Movement...
    9 KB (1,044 words) - 17:13, 28 April 2024
  • Thumbnail for Closed-circuit television
    Journal. 19 November 2020. Retrieved 23 June 2021. "ONVIF: a guide to the open security platform". ifsecglobal.com. IFSEC Global. Retrieved 23 June 2021. "The...
    87 KB (9,104 words) - 15:39, 5 August 2024
  • Thumbnail for Open source
    Kosovo Open Source University Meetup New Zealand Open Source Awards Open security, application of open source philosophies to computer security Open Source...
    105 KB (11,850 words) - 09:36, 2 August 2024
  • Anthony. "The Man Who Broke Charlestown". Boston Sunday Advertiser Green Magazine. December 17, 1939. "Movie Made Escaped Convict Go Back to Charleston Prison"...
    26 KB (2,943 words) - 16:41, 26 July 2024
  • The common quest requires the player to collect magnetic card keys to open security gates. Enemies include raptors and pterosaurs. The game also features...
    14 KB (1,393 words) - 02:56, 16 May 2024
  • Thumbnail for Computer security
    List of computer security certifications List of cyber warfare forces Open security – Open source approach to computer security Outline of computer security –...
    219 KB (22,177 words) - 14:58, 3 August 2024
  • Center web site. patterns & practices Security Engineering Explained Open Security Architecture- Controls and patterns to secure IT systems IWS – Information...
    191 KB (22,096 words) - 17:17, 31 July 2024
  • Avinash Kadam (Network Magazine) Federal Financial Institutions Examination Council (FFIEC) The need for CAAT Technology Open Security Architecture- Controls...
    30 KB (3,981 words) - 16:47, 13 July 2024
  • Teun (22 February 2015). "Dateline Damascus: fighting on all fronts". Open Security. In 12 days travelling some 1,200 km, except for special forces in Aleppo...
    309 KB (19,029 words) - 02:07, 4 August 2024
  • the violence, two inmates had been stabbed and killed. According to Time Magazine, this fight had been sparked by competition among members of rival Chicago...
    28 KB (3,236 words) - 20:08, 3 August 2024
  • Thumbnail for Marion Correctional Institution (Ohio)
    as a boxing promoter after his release in 1971. He partnered with Ring Magazine to create the United States Boxing Championships, an ambitious tournament...
    35 KB (4,640 words) - 14:52, 17 July 2024