TITLE

IP-based Video Security

PUB. DATE
September 2004
SOURCE
Security: Solutions for Enterprise Security Leaders;Sep2004, Vol. 41 Issue 9, p62
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
Presents a chart depicting Internet Protocol (IP)-based Video Security product specifications commonly used by respondents in the U.S. Security Video Systems; Cameras-IP Addressable; Domes-IP Addressable.
ACCESSION #
14364580

 

Related Articles

  • AEP Netilla Security Platform B-Class. Tullett, Jon // SC Magazine: For IT Security Professionals (UK Edition);Oct2005, p68 

    Evaluates AEP Netilla Security Platform B-Class computer network security architecture from AEP Networks. Capabilities of the appliance; Features of the device; Pros and cons.

  • The 2009-2014 Outlook for Electronic Security Systems in Oceana. Parker, Philip M. // Regional Outlook Reports;1/ 9/2010, pN.PAG 

    Several charts and tables are presented which provide data on the 2009-2014 outlook for electromagnetic brakes in various countries in Oceania, which include information on the estimates for the latent demand or the potential industry earnings (PIE) in millions of U.S. dollars, how the PIE is...

  • The 2009-2014 Outlook for Electronic Security Systems in The Americas & the Caribbean. Parker, Philip M. // Regional Outlook Reports;1/10/2010, pN.PAG 

    Several charts and tables are presented which provide data on the 2009-2014 outlook for electronic security systems in the Americas and the Caribbean, which include information on the estimates for the latent demand or the potential industry earnings (PIE) in millions of U.S. dollars, how the...

  • The 2009-2014 Outlook for Electronic Security Systems in The Middle East. Parker, Philip M. // Regional Outlook Reports;1/10/2010, pN.PAG 

    Several charts and tables are presented which provide data on the 2009-2014 outlook for electronic security systems in various Middle East countries, which include information on the estimates for the latent demand or the potential industry earnings (PIE) in millions of U.S. dollars, how the PIE...

  • LEADERBOARD.  // InfoWorld;5/31/2004, Vol. 26 Issue 22, p46 

    The article presents a chart of computer security systems and storage solutions, including ArcSight 2.0, Netilla Access Series 3000 and Spectra Logic Spectra 2K.

  • If I Build It, Will It Survive?  // Business Communications Review;Feb2003, Vol. 33 Issue 2, p59 

    Focuses on the consideration of security and systems management in internet protocol applications in the U.S. Provision of business requirement and information technology strategies; Use of intrusion detection systems in security technology.

  • A complete characterization of a family of key exchange protocols. Mizuki, Takaaki; Shizuya, Hiroki; Nishizeki, Takao // International Journal of Information Security;2002, Vol. 1 Issue 2, p131 

    Using a random deal of cards to players and a computationally unlimited eavesdropper, all players wish to share a one-bit secret key which is informationtheoretically secure from the eavesdropper. This can be done by a protocol to make several pairs of players share one-bit secret keys so that...

  • Rogue responsibility. Bort, Julie // Network World;5/26/2003, Vol. 20 Issue 21, pS22 

    Focuses on users' concern over rogue access points in relation to the Wi-Fi security computer network protocol. Users' claim that rogue access points deserve the same attention from vendors as encryption and authentication.

  • Linux. Bennett, Geoffrey // Australian Personal Computer;Jan2000, Vol. 21 Issue 1, p122 

    Focuses on the use of Internet protocol firewalling chains with Linux operating system. Packets in the Linux kernel; Manipulation of chains; Logging and accounting.

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics