Filtered By
White PaperX
Type of Document [filter]
Results
26 Total
1.0

Netronome SSL Inspector

Document

NtONOME WHITE PAPEk Lommunication NetronomeSS1 Inspector" Solution Overview SSL USECASES SSL has become the ubiquitous choice to secure Web-based transactions. That fact, coupled with the flexibi...
1.0

Katalyst

Document

Building your OSINT Capability T W A R White Paper S O F T W A R E Kapow Katalyst for OSINT Harvest text in any language, images, audio, video from websites, blogs, and social media....
1.0

Jammer

Document

Jammer Principle of Operation CONFIDENTIAL – Subject to–change prior notice!prior notice! CONFIDENTIAL Subjectwithout to change without 1 Jammer – Principle of Operation Generally, there are th...
1.0

Wolfhound

Document

1 l Hirayr M. Kudyan PhD Bvs Senior RF Designer C(, Derrick Kerley Bvs E M 3 Sales Manager How Does One Find Them? PUS DECT 6.0 Iifil+rat1 Introduction Use of DECT 6.0 phones in Europe by U...
1.0

Formation of a Technical Support Unit

Document

G OVE RNM E NTAL SE CU RITY S OL UT I O N S Product Information Formation of a Technical Support Unit Introduction The following report is intended to give an outline to the formation of a Te...
1.0

Private VoIP Exchanges and the IAX Dilemma

Document

# PACKET FORENSICS VOLUME I1 NO. I 2010 DEVELOPMENTS THE NEWSLETTER FROM PACKET FORENSICS COVERING INDUSTRY AND PRODUCT EVOLUTION Private VoIP Exchanges & the IAX Dilemma Explosive Growth of...
1.0

ProxySG

Document

BlueBCoat' Solution Brief: Mobile Operators - How to control Skype '1 Skype Voice over IP threat to Mobile Operators Skype has been installed by over 250.000.000 users worldwide...
1.0

Challenges to Lawful Interception

Document

Lawful Interception Challenges to Lawful Interception With a worldwide landscape characterized by entirely new forms of electronic communication the nature of lawful interception (LI) has changed ...
1.0

The USA Patriot Act: Implications for Lawful Interception

Document

THE USA PATRIOT ACT: IMPLICATIONS FOR LAWFUL INTERCEPTION White Paper Presented Jointly by Intelligence and Information Systems May, 2006 Aqsacom Document No. AQSA050579 Copyright 2006 Aqsacom ...
1.0

DRS

Document

Utimaco DRS™ Data Retention Suite Automated Data Retention for Telecommunications Service Providers DRS – w orl dw i de 2 Utimaco DRS™ Data Retention Data Retention has become a buzzword in i...
1.0

Meeting the Challenges of Data Retention: Now and the Future

Document

MEETING THE CHALLENGES OF DATA RETENTION: NOW AND IN THE FUTURE Contents Abbreviations and Definitions ...............................................................................................
1.0

Virage

Document

Virage Security & Surveillance White Paper [Yj VIRAGE" Security &. Surveillance Contents Introduction 01 Digital/Network Video Recording 02 Electronic Point of Sale Monitoring 05 Contain...
1.0

3D MEMS

Document

Cost-effective method of manufacturing a 3D MEMS optical switch Emily Carr, Ping Zhang, Doug Keebaugh, Kelvin Chau Glimmerglass Networks, 26142 Eden Landing Rd, Hayward, CA 94545 ABSTRACT The deman...
1.0

ALIS

Document

LAWFUL INTERCEPTION FOR IP NETWORKS White Paper March 2010 Aqsacom Document No. 040451 Copyright 2003-2010 Aqsacom Inc. and Aqsacom SA. No portion of this document may be reproduced without the e...
1.0

Lawful Interception Overview

Document

Lawful Interception Overview Lawful Interception Overview Introduction LI deals with two ‘products’, these are; Contents of Communications (CC) and Intercept Related Information (IRI). Contents ...
1.0

Monitoring and Managing Voice over Internet Protocol

Document

/FUXPSL*OTUSVNFOUT8IJUF1BQFS .POJUPSJOHBOE.BOBHJOH 7PJDFPWFS*OUFSOFU1SPUPDPM 7P*1 "TXJUINPTUOFXUFDIOPMPHJFT 7PJDFPWFS*OUFSOFU1SPUPDPM 7P*1  CSJOHTOFXDIBMMFOHFTBMPOHXJUI...
1.0

LIMA

Document

LIMA management system Whitepaper Confidential - Group 2000 Proprietary Document Id: 100-WPR-0030-1v1E Issue Date: 04 May, 2010 100-WPR-0030-1v1E Confidential - Group 2000 Proprietary Discl...
1.0

DRS

Document

Utimaco DRS™ Paquete de retención de datos Retención de datos automatizada para proveedores de servicios de telecomunicaciones DRS – w orl dw i de 2 Utimaco DRS™ Retención de datos La retenci...
1.0

Lawful Interception: A Mounting Challenge for Service Providers and Governments

Document

LAWFUL INTERCEPTION: A MOUNTING CHALLENGE FOR SERVICE PROVIDERS AND GOVERNMENTS Executive Summary Lawful interception is the legally grounded process by which a communications network operator or...
1.0

LIMS

Document

Utimaco L I M S ~ ~ Techpaper Lawful Interception with Umbrella Systems Utimaco LIMS'~ Table of contents ..........................................................................................
1.0

HINTON Locator

Document

Enabling location-based services through passive monitoring techniques: Mobile positioning with the HINTON Locator probe A White Paper from Telesoft Technologies DX-HIN-GEN-MK-WP-32640-02 Conten...
1.0

ALIS

Document

LAWFUL INTERCEPTION FOR 3G AND 4G NETWORKS WHITE PAPER ............................................................................................................................................ J...
1.0

3D MEMS

Document

conference & convention enabling the next generation of networks & services 3D-MEMS PHOTONIC CROSS-CONNECT IN SUBMARINE CABLE LANDING SITES Kelvin Chau and R.W. Lundy Email: [email protected]

e-Highlighter

Click to send permalink to address bar, or right-click to copy permalink.

Un-highlight all Un-highlight selectionu Highlight selectionh