Security Department

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 69516 Experts worldwide ranked by ideXlab platform

Jennifer E. Lake - One of the best experts on this subject based on the ideXlab platform.

Blas Nunez-neto - One of the best experts on this subject based on the ideXlab platform.

  • Homeland Security Department: FY2009 Appropriations
    2009
    Co-Authors: Jennifer E. Lake, Blas Nunez-neto
    Abstract:

    Abstract : This report describes the FY2009 appropriations for the Department of Homeland Security (DHS). The Administration requested a net appropriation of $38, 849 million in budget authority for FY2009. The House Appropriations Committee reported its version of the FY2009 DHS Appropriations bill on June 24, 2008. The bill was filed on September 18, 2008, as H.R. 6947, and the accompanying report has been numbered H.Rept. 110-862. House-reported H.R. 6947 would have provided a net appropriation of $41,137 million in budget authority for DHS for FY2009. This amounted to an increase of $2,288 million, or nearly 6% increase over the President's request. The Senate-reported its version of the bill on June 19, 2008. S. 3181 would have provided $41,314 million in net budget authority for DHS for FY2009, a $2,465 million or 6% increase over the President's request.

  • Homeland Security Department: FY2009 Appropriations [September 25, 2008]
    2008
    Co-Authors: Jennifer E. Lake, Sarah A. Lister, Blas Nunez-neto
    Abstract:

    This report describes the FY2009 appropriations for the Department of Homeland Security(DHS).

  • Homeland Security Department: FY2008 Appropriations
    2007
    Co-Authors: Jennifer E. Lake, Keith Bea, Blas Nunez-neto, Sarah A. Lister, Todd Masse, Alison Siskin, Chad C. Haddal, Francis X. Mccarthy, Harold C. Relyea, Shawn Reese
    Abstract:

    Abstract : This report describes the FY2008 appropriations for the Department of Homeland Security (DHS). The Administration requested a net appropriation of $35.5 billion in net budget authority for FY2008. The requested net appropriation for major components of the Department included the following: $8,783 million for Customs and Border Protection (CBP); $4,168 million for Immigration and Customs Enforcement (ICE); $3,608 million for the Transportation Security Administration (TSA); $8,457 million for the U.S. Coast Guard; $1,399 million for the Secret Service; $1,047 for the National Protection and Programs Directorate (NPP); $5,042 million for the Federal Emergency Management Agency (FEMA); $30 million for US Citizenship and Immigration Services (USCIS); $799 million for the Science and Technology Directorate (ST and $562 million for the Domestic Nuclear Detection Office (DNDO). The House passed H.R. 2638 on June 15, 2007. H.R. 2638 would provide $37.4 billion in net budget authority for DHS for FY2008. H.R. 2638 contains the following in net budget authority for major components of DHS: $8,923 million for CBP; $4,192 million for ICE; $3,842 million for the TSA; $8,352 million for the U.S. Coast Guard; $1,396 million for the Secret Service; $1,035 for the NPP; $7,239 million for FEMA; $30 million for USCIS; $777 million for ST and $556 million for the DNDO. The Senate Appropriations Committee reported its bill, S. 1644, on June 14, 2007. S. 1644 would provide $37.6 billion in net budget authority for DHS for FY2008. The bill contains the following amounts of net budget authority for major components of DHS: $8,841 million for CBP; $4,433 million for ICE; $3,685 million for the TSA; $8,559 million for the U.S. Coast Guard; $1,396 million for the Secret Service; $919 for the NPP; $6,913 million for FEMA; $50 million for USCIS; $838 million for the ST and $550 million for the DNDO. This report will be updated as legislative action occurs.

  • Homeland Security Department: FY2008 Request for Appropriations
    2007
    Co-Authors: Jennifer E. Lake, Keith Bea, Blas Nunez-neto, Sarah A. Lister, Todd Masse, Alison Siskin, Chad C. Haddal, Francis X. Mccarthy, Harold C. Relyea, Shawn Reese
    Abstract:

    Abstract : The annual consideration of appropriations bills (regular, continuing, and supplemental) by Congress is part of a complex set of budget processes that also encompasses the consideration of budget resolutions, revenue and debt-limit legislation, other spending measures, and reconciliation bills. In addition, the operation of programs and the spending of appropriated funds are subject to constraints established in authorizing statutes. Congressional action on the budget for a fiscal year usually begins following the submission of the President's budget at the beginning of each annual session of Congress. Congressional practices governing the consideration of appropriations and other budgetary measures are rooted in the Constitution, the standing rules of the House and Senate, and statutes, such as the Congressional Budget and Impoundment Control Act of 1974. This report is a guide to one of the regular appropriations bills that Congress considers each year. It is designed to supplement the information provided by the House and Senate Appropriations Subcommittees on Homeland Security. It summarizes the status of the bill, its scope, major issues, funding levels, and related congressional activity, and is updated as events warrant. The report lists the key CRS staff relevant to the issues covered and related CRS products.

  • Homeland Security Department: FY2007 Appropriations
    2006
    Co-Authors: Jennifer E. Lake, Blas Nunez-neto
    Abstract:

    This report is a guide to one of the regular appropriations bills that Congress considers each year. It is designed to supplement the information provided by the House and Senate Appropriations Subcommittees on Homeland Security. It summarizes the status of the bill, its scope, major issues, funding levels, and related congressional activity, and is updated as events warrant.

Jim Dawson - One of the best experts on this subject based on the ideXlab platform.

David Wall - One of the best experts on this subject based on the ideXlab platform.

  • Chapter 8 – WLAN Rogue Access Point Detection and Mitigation
    Managing and Securing a Cisco SWAN, 2004
    Co-Authors: David Wall
    Abstract:

    Publisher Summary The chapter discusses problems of wireless local area networks (WLANs). These problems include rogue access points and unauthorized people using otherwise legitimate access points. The chapter explains wireless-aware product features that address both of these problems, as well as how to set up and use them. The chapter also discusses mitigation of the threat of rogue access points that pose significant Security threats to businesses and their networks. Rogue access points are unauthorized access points that are installed by employees without approval from the information technology (IT) and Security Department or by an intruder trying to trick valid users to gain sensitive information. Unauthorized access points can pose a significant threat by creating a back door into sensitive corporate networks. Several manual techniques—such as wireless sniffers and wired network scanner—exist for detecting rogue access points are described in the chapter.

  • chapter 8 wlan rogue access point detection and mitigation
    Managing and Securing a Cisco SWAN, 2004
    Co-Authors: David Wall
    Abstract:

    Publisher Summary The chapter discusses problems of wireless local area networks (WLANs). These problems include rogue access points and unauthorized people using otherwise legitimate access points. The chapter explains wireless-aware product features that address both of these problems, as well as how to set up and use them. The chapter also discusses mitigation of the threat of rogue access points that pose significant Security threats to businesses and their networks. Rogue access points are unauthorized access points that are installed by employees without approval from the information technology (IT) and Security Department or by an intruder trying to trick valid users to gain sensitive information. Unauthorized access points can pose a significant threat by creating a back door into sensitive corporate networks. Several manual techniques—such as wireless sniffers and wired network scanner—exist for detecting rogue access points are described in the chapter.

Christian Zinner - One of the best experts on this subject based on the ideXlab platform.

  • SAFECOMP Workshops - Approach for Demonstrating Safety for a Collision Avoidance System
    Lecture Notes in Computer Science, 2014
    Co-Authors: Thomas Gruber, Christian Zinner
    Abstract:

    For many years, the Digital Safety and Security Department of the Austrian Institute of Technology has been developing stereo vision algorithms for various application purposes. Recently, these algorithms have been adapted for use in a collision avoidance system for tramways. The safety validation of such a system is a specific challenge as - like in the automotive domain - the rate of false positives cannot be lowered to zero. While automotive suppliers typically tackle with this problem by reducing the sensitivity of the system and validating it in hundreds of thousands of test kilometres, this paper presents an approach how it is possible to demonstrate safety with a carefully chosen functionality and less field test kilometres.