Marvin's Underground Lectures
Welcome
Login / Register

Security Technologies


  • 1:30:14 Special Needs Offenders: Cyber Crime And Cyber Terrorism

    Special Needs Offenders: Cyber Crime And Cyber Terrorism

    by Admin Added 29 Views / 0 Likes

    2002 Federal Judicial Center gov.ntis.ava21130vnb1 4328-V/02 Federal Judicial Center - This follow-up to Special Needs Offenders: Introduction to Cyber Crime...

  • 1:06:12 Kevin Fu - Implantable Medical Devices

    Kevin Fu - Implantable Medical Devices

    by Admin Added 9 Views / 0 Likes

    The Dartmouth Institute for Security, Technology and Society Cosponsored with Dartmouth's Computer Science Department presents Kevin Fu - University of Massachusetts Amherst Implantable Medical Devices: Security and Privacy for Pervasive, Wireless Healthc

  • 1:29:27 Christena Nippert-Eng  "Privacy:  how we do it and when it matters most"

    Christena Nippert-Eng "Privacy: how we do it and when it matters most"

    by Admin Added 32 Views / 0 Likes

    How do we think about privacy? How do we actually do it? What, exactly, is the anatomy of a privacy violation and how does technology give us a useful entry point to understanding when privacy really matters? Dr. Nippert-Eng will address these issues and

  • 26:49 DIGITAL AGE - How Ready Are We For A Cyber-War?- Adam Segal.  Feb. 28, 2010

    DIGITAL AGE - How Ready Are We For A Cyber-War?- Adam Segal. Feb. 28, 2010

    by Admin Added 42 Views / 0 Likes

    Chinese hackers recently attacked Google, but no one knows for sure who did it. Cyber- warfare represents a real threat to the Nations interests. What are the attackers motives? Must we heighten our state of readiness? National Security expert and China h

  • 1:22:16 Dartmouth - Civic Technologies and the Future of the Internet

    Dartmouth - Civic Technologies and the Future of the Internet

    by Admin Added 25 Views / 0 Likes

    Dartmouth College Institute for Security, Technology, and Society presentsProfessor Jonathan Zittrain, Harvard Law SchoolCo-Founder and Faculty Co-Director, Berkman Center for Internet & Society"Civic Technologies and the Future of the Internet"May 4,

  • 1:00:23 Adventures in SCADA

    Adventures in SCADA

    by Admin Added 28 Views / 0 Likes

    Speakers: Sergey Bratus (Dartmouth College) and Edmond Rogers (University of Illinois at Urbana-Champaign). Both are associated with the Trustworthy Cyber Infrastructure for the Power Grid (TCIP-G, http://tcipg.org) project.Date: April 30, 2011Event: TROO

  • 25:55 Electronic Prescription for Controlled Substances: A Cybersecurity Perspective

    Electronic Prescription for Controlled Substances: A Cybersecurity Perspective

    by Admin Added 37 Views / 0 Likes

    Samuel Tan, Rebecca Shapiro, and Sean W. Smith, Dartmouth CollegePresented at the 2013 USENIX Workshop on Health Information TechnologiesThe Electronic Prescription for Controlled Substances (EPCS) is a set of rules published by the Drug Enforcement Admin

  • 44:35 Cyber Crime, Cyber Terrorism, Cyber War - Ira Wilsker - APCUG Summer 2012 Virtual Tech Conf

    Cyber Crime, Cyber Terrorism, Cyber War - Ira Wilsker - APCUG Summer 2012 Virtual Tech Conf

    by Admin Added 12 Views / 0 Likes

    Cyber Crime, Cyber Terrorism, Cyber War - Ira Wilsker - APCUG Summer 2012 Virtual Technology Conference VC4 was presented on the internet on 08/04/12. More information at http://apcug.net/virtual/index_vc4.htm

  • 1:21:18 Web accessibility in civil society: Persons with disabilities in today's educational environments

    Web accessibility in civil society: Persons with disabilities in today's educational environments

    by Admin Added 27 Views / 0 Likes

    Today's digital age has shifted traditional notions of how persons with disabilities are included in society. The principle of web accessibility will be explored in the context of educational environments. If we agree that individuals with disabilities sh

  • 1:27:33 SITH3 - Panel 3: Opportunities for mHealth in the Developing World

    SITH3 - Panel 3: Opportunities for mHealth in the Developing World

    by Admin Added 39 Views / 0 Likes

    Securing IT in Healthcare: Part IIIMay 17, 2013Panel 3: Opportunities for mHealth in the Developing WorldPanel AbstractMobile technology provides tremendous opportunities to make health and wellness more accessible to billions of people in developing coun

  • 49:23 Special Needs Offenders: Introduction To Cyber Crime (Part 2)

    Special Needs Offenders: Introduction To Cyber Crime (Part 2)

    by Admin Added 30 Views / 0 Likes

    Federal Judicial Center Special Needs Offenders: Introduction to Cyber Crime (Part 2) AVA20958VNB2, 2000 This program examines the investigation and supervis...

  • 1:15:58 Latanya Sweeney-Trustworthy Designs for the Nationwide Health Information Network  4/15/10

    Latanya Sweeney-Trustworthy Designs for the Nationwide Health Information Network 4/15/10

    by Admin Added 20 Views / 0 Likes

    The Dartmouth Institute for Security, Technology and Society presents Latanya SweeneyThis talk describes a techno-policy pursuit to design a minimally invasive Nationwide Health Information Network (NHIN) that achieves guarantees of real-world applicabili

  • 59:36 Sam Gustman - "Cloud Archives" at the University of Southern California

    Sam Gustman - "Cloud Archives" at the University of Southern California

    by Admin Added 33 Views / 0 Likes

    "Cloud Archives" at the University of Southern California: The USC Shoah Foundation and the USC Digital Repository.Friday, October 26, 2012 at 4:00pmThe Loew Auditorium - Black Family Visual Arts CenterSam GustmanCTO Shoah FoundationAssociate Dean, Univer

  • 1:28:57 Over-Exposure in the Digital World: Drawing the Line between our Public and Private Selves

    Over-Exposure in the Digital World: Drawing the Line between our Public and Private Selves

    by Admin Added 15 Views / 0 Likes

    Co-sponsored by the ISTS and I3P.October 22, 2009The panel moderated by Denise Anthony, Chair of the Department of Sociology and Research Director of ISTS will feature:- Hans Brechbuhl, Adjunct Associate Professor of Business Administration at Tuck- James

  • 49:10 Exploiting the hard-working DWARF

    Exploiting the hard-working DWARF

    by Admin Added 26 Views / 0 Likes

    Speakers: James Oakley and Sergey BratusDate: January 29, 2011Event: Shmoocon 2011, hacker/infosec conference in Washington, DC,keynoted this year by Peiter 'Mudge' Zatko, a senior DARPAproject manager.Sponsors: Many software and security companies such a

  • 21:35 Capability Exchange: Improving Access Control Usability in Health IT

    Capability Exchange: Improving Access Control Usability in Health IT

    by Admin Added 40 Views / 0 Likes

    Chen Qin, Emily Freebairn, and Sean Smith, Dartmouth CollegePresented at the 2013 USENIX Workshop on Health Information TechnologiesClinicians report usability problems in modern health IT systems in part because the strictness of computerization eliminat

  • 43:12 American Greed   S04E012   Cybercrime

    American Greed S04E012 Cybercrime

    by Admin Added 18 Views / 0 Likes

    Cybercrime: Max ButlerThe IcemanMax Butler is the don of the digital under underworld. He's a computer genius and an accomplished hacker. As a teenager he hacked for fun, but Butler turned his skill into a lucrative career.The CareerButler works as a comp

  • 19:09 ShmooCon 2011: ZigBee Security: Find, Fix, Finish

    ShmooCon 2011: ZigBee Security: Find, Fix, Finish

    by Admin Added 19 Views / 0 Likes

    Speakers: Ryan Speers and Ricky MelgaresZigBee is a low-power, low-data rate wireless protocol based on IEEE 802.15.4. It connects lightweight embedded technology like HVAC, smart energy, security, and process automation systems, and is an attractive targ

  • 1:25:44 SITH3 - Panel 2: Evolving Business Models in mHealth

    SITH3 - Panel 2: Evolving Business Models in mHealth

    by Admin Added 44 Views / 0 Likes

    Securing IT in Healthcare: Part IIIMay 17, 2013Panel 2: Evolving Business Models in mHealthPanel AbstractHow are device manufacturers, new service providers, and existing EHR players building business models for mHealth? What are the opportunities for hom

  • 1:01:55 The Cyber Threat

    The Cyber Threat

    by Admin Added 16 Views / 0 Likes

    Jack Landman Goldsmith, Henry L. Shattuck Professor of Law, Harvard Law SchoolIn his lecture, Jack Goldsmith will describe the cyber threat, explain why it is so serious, and argue that it requires us to rethink many core assumptions about crime, war, con

  • 1:52:59 Lawrence Lessig - Rebooting Democracy

    Lawrence Lessig - Rebooting Democracy

    by Admin Added 14 Views / 0 Likes

    Rebooting Democracya public lecture byLawrence LessigMay 27, 2010Filene Auditorium, Dartmouth CollegeThe Ronna and Edward J. Goldstein 1962 Fund for Distinguished Visitors in Film StudiesCo-sponsored withThe Nelson A. Rockefeller Center, The Dartmouth Col

  • 1:13:47 Maintaining Grid Resilience with the Adoption of Smart Grid Technologies

    Maintaining Grid Resilience with the Adoption of Smart Grid Technologies

    by Admin Added 42 Views / 0 Likes

    A talk given at Dartmouth College by Jeff Dagle of Pacific Northwest National Laboratory Wednesday January 23, 2013Co-sponsored by the Institute for Security, Technology, and Society and the CS ColloquiumAbstract:The interconnected electric power grid was

  • 1:00:05 Cyber Security Policy: Keeping the Broad View

    Cyber Security Policy: Keeping the Broad View

    by Admin Added 14 Views / 0 Likes

    The Dartmouth College Institute for Security, Technology and Society presentsAndrew CuttsDirector of Cyber Security Policy, Department of Homeland Security"Cyber Security Policy: Keeping the Broad ViewOctober 13, 2009Haldeman 041Dartmouth Collegevideo pro

  • 1:06:45 Real-Time Crowd Support for People with Disabilities - Jeffrey Bigham

    Real-Time Crowd Support for People with Disabilities - Jeffrey Bigham

    by Admin Added 41 Views / 0 Likes

    Real-Time Crowd Support for People with DisabilitiesTuesday, November 15, 2011Jeffrey BighamUniversity of RochesterCo-sponsored by the CS Colloquium and ISTS AbstractJeffrey BighamUniversity of Rochester The past few decades have seen the development of w

Categories

| Kids Playground | Events Schedule |Image Galleries | Games | Radios |Animations | Chat | Classifieds | Blog Post | Free Content | News
Copyright @ 2005-2006 Marvin A. Hendricks Inc. All Rights Reserved