Vulnerability has been defined as the characteristics of a person or a group of persons i.e. in terms of their capacity to cope with, anticipate, resist and recover from the impacts of natural or man-made hazards or any external event. Vulnerability is also defined as the inability to withstand the effects of hostile environment. Hostile environment refers to livelihood security in this research. Concept of vulnerability is described within five categories of livelihood security, which are...
Topics: Vulnerability, livelihood security, health security, social security, economic security, food...
Vulnerability has been defined as the characteristics of a person or a group of persons i.e. in terms of their capacity to cope with, anticipate, resist and recover from the impacts of natural or man-made hazards or any external event. Vulnerability is also defined as the inability to withstand the effects of hostile environment. Hostile environment refers to livelihood security in this research. Concept of vulnerability is described within five categories of livelihood security, which are...
Topics: Vulnerability, livelihood security, health security, social security, economic security, food...
Vulnerability has been defined as the characteristics of a person or a group of persons i.e. in terms of their capacity to cope with, anticipate, resist and recover from the impacts of natural or man-made hazards or any external event. Vulnerability is also defined as the inability to withstand the effects of hostile environment. Hostile environment refers to livelihood security in this research. Concept of vulnerability is described within five categories of livelihood security, which are...
Topics: Vulnerability, livelihood security, health security, social security, economic security, food...
4
4.0
Apr 13, 2022
04/22
by
Zedner, Lucia
texts
eye 4
favorite 0
comment 0
x, 206 p. ; 20 cm
Topics: Security systems industry, Security systems, National security, Security, International
9
9.0
Jun 3, 2021
06/21
by
Caldwell, Dan
texts
eye 9
favorite 0
comment 0
x, 241 p. ; 23 cm
Topics: Security, International, National security, Internal security, Economic security, Security...
4
4.0
Apr 18, 2022
04/22
by
Caldwell, Dan
texts
eye 4
favorite 0
comment 0
xii, 327 pages ; 24 cm
Topics: Security, International, National security, Internal security, Economic security, Security...
7
7.0
Jul 25, 2020
07/20
by
Wallulis, Jerald, 1947-
texts
eye 7
favorite 1
comment 0
xviii, 237 p. : 24 cm
Topics: Job security, Economic security, Social security
19
19
texts
eye 19
favorite 1
comment 0
439 pages : 22 cm
Topics: Database security, Industries -- Security measures, Corporations -- Security measures --...
112
112
Nov 9, 2004
11/04
by
http://www.plaxoft.com/en/products/security/
software
eye 112
favorite 0
comment 0
This program helps you identify insecure Web sites and move them to the restricted zone with just one click. The integrated configuration assistant helps you securing your surfing environment. While surfing the Web you confirm any ActiveX usage. You can identify advertising providers and move them into the restricted zone.
Topics: Security Zone Manager, Internet, Security, Security applications, Security Zone Manager
This essay presents the results of a study which surveyed the various aspects of system security hardware, software, and procedural techniques in use in current and proposed automated systems. Its impetus is from the concern for security control that has been generated by the increasing number of time-sharing and resource-sharing systems. The intention is to present the designers, managers, programmers, system implementers, and operational personnel with a consolidated source of data concerning...
Topics: Computer science, Data security, Computer security, Access security, Privacy/security
143
143
Nov 8, 2004
11/04
by
http://www.cronoslogic.com/product/onux
software
eye 143
favorite 0
comment 0
This security suite includes a virtual keyboard to defeats keylogging viruses, passwords of up to 1024 characters, file shredding and Internet cache file shredding.
Topics: Onux - PC Security, Internet, Security, Security applications, Onux - PC Security
832
832
Nov 9, 2004
11/04
by
http://www.safety-lab.com/en/products/1.htm
software
eye 832
favorite 1
comment 0
This set of security scanning tools audits your network security.
Topics: Shadow Security Scanner, Internet, Security, Security applications, Shadow Security Scanner
430
430
Jul 5, 2014
07/14
by
BODUNDE, DAVID OLUWAFEMI, OLA, ADEGBOYEGA A & AFOLABI, MUYIWA BAMIDELE
texts
eye 430
favorite 0
comment 0
There is paucity of literature on internal security in Nigeria unlike other forms of security. Nigeria, a populous country in Africa has put in place certain numbers of security outfits to protect lives and properties of its citizenry yet the trend of criminality and security challenges are on the increase on daily bases. This study examines the security challenges in the country and assesses the role of internal security outfit. The Nigerian Police are the preeminent outfit saddled...
Topics: : Security, Threat, Internal Security, National Security, Challenges
Cyber Security has developed one of the biggest challenges of information technology in the present day. Cyber security consists of controlling physical access of the hardware, application, networks and protecting against harm that may come via networks. It is a mixture of processes, technologies and practices. The objective of cyber Security is to protect programs, application, networks, computers and data from attack. Moreover, various measures of cyber security is quite a very huge concern...
Topics: Computer Security, cyber security, cybercrime, Security Attacks
320
320
movies
eye 320
favorite 0
comment 0
HITBSecConf2003 Panel Discussion A panel discussion comprising (left to right): * HD Moore * Shreeraj Shah * Adam Gowdiak (LSD) * Job De Haas * Kol. Hussin (NISER/MyCERT) * Nitesh Dhanjani * Dr. Dinesh Nair * Shamsul Jafni (MCMC)
Topics: hack, security, vulnerabilities, security conference, security professional
334
334
movies
eye 334
favorite 0
comment 0
Simos Xenitellis - Event-driven system security vulnerabilities, an overview and demonstration The event-driven model is used to implement software systems like graphical user interfaces (GUIs). An example of such a GUI is Microsoft Windows which we examine in detail. In an event-driven system, applications communicate with each other and with the system through events. While in Windows NT/2000/XP/2003 there is memory protection between applications belonging to different users, there is no...
Topics: hack, security, vulnerabilities, security conference, security professional
9
9.0
Jan 12, 2022
01/22
by
Ortmeier, P. J
texts
eye 9
favorite 0
comment 0
xx, 409 p. : 24 cm
Topics: Private security services -- Management, Buildings -- Security measures, Industries -- Security...
12
12
texts
eye 12
favorite 0
comment 0
xiv, 453 p. : 24 cm
Topics: Private security services -- Management, Industries -- Security measures, Corporations -- Security...
52
52
Oct 14, 2017
10/17
by
iaset
texts
eye 52
favorite 0
comment 0
With the invention of the internet and new networking technologies, the world has become more interconnected. The concept of network securities is becoming more eminent due to easily acquirable intellectual properties. Network security covers an assortment of computer networks, both public and private, that are utilized as a part of ordinary activity directing exchanges and interchanges among organizations, government offices and people. In this research, discussion paper on the concept of...
Topics: Network Security, Wireless Network Security, IP Security, Electronic Mail Security, Transport-Level...
18
18
Jul 12, 2018
07/18
by
Bonnell, Ralph
texts
eye 18
favorite 0
comment 0
1 online resource (xxiv, 414 pages) :
Topics: Firewalls (Computer security), COMPUTERS -- Internet -- Security, COMPUTERS -- Networking --...
Border security has become an increasingly public topic since the events of September 11, 2001. Customs and Border Protection (CBP) is one of the Department of Homeland Security's largest and most complex components, with a priority mission of keeping terrorists and their weapons out of the United States (U.S.). It also has a responsibility for securing and facilitating trade and travel while enforcing hundreds of U.S. regulations, including immigration and drug laws. When CBP was created, the...
Topics: National security, Border security
Newberry French Pamphlet Collection
64
64
Dec 14, 2016
12/16
by
France. Corps législatif (1795-1814). Conseil des cinq-cents.; France. Corps législatif (1795-1814). Conseil des cinq-cents
texts
eye 64
favorite 0
comment 0
Caption title. Imprint from colophon
Topics: Internal security, Internal security
10
10.0
texts
eye 10
favorite 0
comment 0
xviii, 290 p. ; 25 cm
Topics: Security, International, National security
Using a set of presented package and properties through the internet is called cloud computing. Data hubs located everywhere the world offer the cloud services. As this field of machinery seen a express growth in current times, security has been the foremost distress. Security is the main issues for all technology both it was from past or newly modernized. The information might be own or executive data stored in the cloud is facing probable dangers from hackers and there is a need to...
Topics: Cloud Computing, Cloud Security, Security Threats, Security Techniques, Cloud Security Principles.
This study considers how Serbian border security sector reform illuminates questions of force and statecraft in a southern European nation. In 2006, Serbia became a member of the Partnership for Peace (PfP), a step toward a North Atlantic Treaty Organization (NATO) membership; however, Serbia has indicated no intention to become a full NATO member. Also in 2006, Serbia entered into a Stabilization and Association Agreement (SAA) with the European Union (EU) as part of the process of accession...
Topics: National security, Border security
47
47
May 2, 2012
05/12
by
Rejda, George E., 1931-
texts
eye 47
favorite 1
comment 0
Cover title: Social insurance & economic security
Topics: Social security, Economic security
25
25
Dec 17, 2019
12/19
by
Speed, Tim
texts
eye 25
favorite 2
comment 0
1 online resource (xviii, 398 pages) :
Topics: Internet -- Security measures, Computer networks -- Security measures, Computer security, COMPUTERS...
951
951
movies
eye 951
favorite 0
comment 0
Dinesh Nair - From Script Kiddies to Security Consultants Frequently, the press has misrepresented hackers, crackers and script kiddies. There is a lot of myth and aura about practitioners of computer and network security. This presentation traces the journey of one such individual as he progresses from playing with the public switched telephone system to the TCP/IP networks of today, and the mobile and 3G networks of tomorrow.
Topics: security, hack, vulnerabilities, security conference, security professional
This thesis presents a wide spectrum of computer data security, including both practical and theoretical aspects of the subject. It was motivated by the concern for the general lack of adequate knowledge, techniques, implementation, and application of computer data security. The objective was to (1) review the pertinent features of data security and the relationship of these features to the computer and its users; (2) generate an awareness of the techniques and problems in data security by...
Topics: Computer science, data security, computer security, access security, security verification system
4
4.0
Jun 6, 2021
06/21
by
Ronald Johnson (gearwarrior)
data
eye 4
favorite 0
comment 0
Another cover. This one has slotted mount. This way it can accept a few different manufacturers. Make sure you look at the complimentary service carrier; https://www.thingiverse.com/thing:3722015 If you bought one of 'those' (Security Cameras) and it came with 'that' (Odd RJ45 plug) and is powered by 'this' (12 volt DC adapter)... Or, you can bolt whatever you want on there. I did put weep holes in it, but I'd still suggest stainless nuts and bolts. I've printed a few in different arrangements...
Topics: Other, security_camera, security, thingiverse, stl, security_camera_mount, Home_security
18,294
18K
Nov 6, 2004
11/04
by
http://www.tropsoft.com/pcsecurity
software
eye 18,294
favorite 2
comment 0
This program offers Explorer control, file lock, folder lock, system lock, Internet lock, shortcut and program Lock, restricted system, Window lock, intruder detection with alarm, flexible and complete password protection and drag-and-drop support.
Topics: PC Security, Internet, Security, System locking, pc, security, pcsecurity, pc security
Newberry French Pamphlet Collection
66
66
Feb 7, 2017
02/17
by
Rhône-et-Loire (France). Directoire; Bruyset, Jean Marie, 1749-1817, publisher
texts
eye 66
favorite 0
comment 0
Caption title
Topics: Internal security, Internal security
7
7.0
Mar 16, 2021
03/21
by
Erik Peterson (keylitho)
data
eye 7
favorite 0
comment 0
This is a rain hood for the Nest Cam Ourdoor. It has a little drip edge on it so water will not run back up the hood.. It works pretty good especially if your camera is tipped down a bit. NOTE: You can NOT see this hood in the camera... so no view is blocked.. Just use some dbl sided thin foam tape to stick it on. See My other uploads for Wire Grommet for this camera.. https://www.thingiverse.com/thing:3170822
Topics: security_camera, security_camera_mount, Household, stl, security, thingiverse, Home_security
0
0.0
texts
eye 0
favorite 0
comment 0
302 pages ; 25 cm
Topics: National security -- Pakistan, Internal security -- Pakistan, Internal security, National security,...
3
3.0
texts
eye 3
favorite 0
comment 0
xxii, 232 pages : 23 cm
Topics: Social security -- India, Economic security -- India, Economic security, Social security, India
135
135
Sep 17, 2018
09/18
by
Brenton, Chris
texts
eye 135
favorite 7
comment 0
1 online resource (xvi, 490 pages) :
Topics: Computer networks -- Security measures, Computer security, COMPUTERS -- Internet -- Security,...
14
14
Jun 23, 2018
06/18
by
Cady, Glee Harrah
texts
eye 14
favorite 0
comment 0
1 online resource (xix, 652 pages) :
Topics: Computer security, Digital communications -- Security measures, COMPUTERS -- Internet -- Security,...
104
104
May 18, 2018
05/18
by
Cole, Eric;Krutz, Ronald L., 1938-;Conley, James W
texts
eye 104
favorite 5
comment 0
1 online resource (xxxiv, 660 pages) :
Topics: Computer security, Computer networks -- Security measures, COMPUTERS -- Internet -- Security,...
63
63
texts
eye 63
favorite 2
comment 0
1 online resource (xxxiv, 787 pages) :
Topics: Computer networks -- Security measures, Computer security, COMPUTERS -- Internet -- Security,...
The current understanding of the concept of homeland security in the United States—measures taken to protect the United States from terrorist attacks and to recover from natural disasters—has resulted in a practical approach that largely ignores many threats to the security of the average American. A deeper analysis of the insecurities faced by the American people reveals that the security of the homeland is a complex system of interconnected varieties of security including food, health,...
Topics: homeland security, homeland security theory, department of homeland security, DHS, homeland...
Jude 1-2 Saved, Set Apart, and Secure
Topics: Salvation, security, eternal security
42
42
Oct 18, 2010
10/10
by
Turnbull, John Gudert, 1913-; Williams, C. Arthur (Chester Arthur), 1924- joint author; Cheit, Earl Frank, joint author
texts
eye 42
favorite 1
comment 0
Includes bibliographical references
Topics: Economic security, Social security
Security mechanisms on contemporary database systems typically inhibit system performance. However, without security, the database system which stores classified data of different classifications, will pass through classified data of different levels in order to find the properly classified data. This 'pass through 1 inhibits performance (i.e., reduces access precision) because unnecessary material has been retrieved which does not aid in the resolution of the guery. Further, the pass-through...
Topics: database security, multilevel security, computer security, access control
45
45
Jan 30, 2017
01/17
by
IASET JOURNALS
texts
eye 45
favorite 0
comment 0
After working many years on the computer security, I have seen most of the systems in service extremely vulnerable to attach. Actually installing security on the system is very expensive, that’s why peoples are far away from this according to my experience. Since there’s been small damage, people decide that they don’t want much security. Security is playing crucial role in their life, but it is very difficult to have security on all the systems. Nowadays peoples are...
Topics: Security, Network Security Model, Network Security Life Cycle
9
9.0
texts
eye 9
favorite 0
comment 0
1 online resource (xiv, 313 pages) :
Topics: Computer security, Computer networks -- Security measures, COMPUTERS -- Internet -- Security,...
96
96
Oct 18, 2018
10/18
by
Ciampa, Mark D
texts
eye 96
favorite 4
comment 0
1 online resource (xvii, 444 pages) :
Topics: Computer security, Computer networks -- Security measures, COMPUTERS -- Internet -- Security,...
Source: removedNEL
4
4.0
Oct 7, 2021
10/21
by
Reveron, Derek S
texts
eye 4
favorite 0
comment 0
xv, 255 p. : 23 cm
Topics: Security, International, National security, National security -- United States
512
512
movies
eye 512
favorite 0
comment 0
Suresh Ramasamy (TimeDotCom) Cryptography Demystified
Topics: hack, security, vulnerabilities, cryptography, security conference, security professional
579
579
movies
eye 579
favorite 0
comment 0
Shreeraj Shah - Defending Web Applications: Strategies, methods and practices Web applications can not be defended by firewall or any other security products. Web application defense strategies require secure coding at application level, knowing your application and protecting them by human intelligence. Knowing your application can lead to profiling your web assets in logical way. Profiling web assets provides better picture of various possible attacks set. Knowing entire attack set greatly...
Topics: hack, web, security, vulnerabilities, security conference, security professional
40
40
Apr 27, 2020
04/20
by
Newman, Robert C
texts
eye 40
favorite 1
comment 0
xxviii, 453 p. : 24 cm
Topics: Database security, Computer security, Computer networks -- Security measures