Vulnerability has been defined as the characteristics of a person or a group of persons i.e. in terms of their capacity to cope with, anticipate, resist and recover from the impacts of natural or man-made hazards or any external event. Vulnerability is also defined as the inability to withstand the effects of hostile environment. Hostile environment refers to livelihood security in this research. Concept of vulnerability is described within five categories of livelihood security, which are...
Topics: Vulnerability, livelihood security, health security, social security, economic security, food...
Vulnerability has been defined as the characteristics of a person or a group of persons i.e. in terms of their capacity to cope with, anticipate, resist and recover from the impacts of natural or man-made hazards or any external event. Vulnerability is also defined as the inability to withstand the effects of hostile environment. Hostile environment refers to livelihood security in this research. Concept of vulnerability is described within five categories of livelihood security, which are...
Topics: Vulnerability, livelihood security, health security, social security, economic security, food...
Vulnerability has been defined as the characteristics of a person or a group of persons i.e. in terms of their capacity to cope with, anticipate, resist and recover from the impacts of natural or man-made hazards or any external event. Vulnerability is also defined as the inability to withstand the effects of hostile environment. Hostile environment refers to livelihood security in this research. Concept of vulnerability is described within five categories of livelihood security, which are...
Topics: Vulnerability, livelihood security, health security, social security, economic security, food...
4
4.0
Apr 18, 2022
04/22
by
Caldwell, Dan
texts
eye 4
favorite 0
comment 0
xii, 327 pages ; 24 cm
Topics: Security, International, National security, Internal security, Economic security, Security...
9
9.0
Jun 3, 2021
06/21
by
Caldwell, Dan
texts
eye 9
favorite 0
comment 0
x, 241 p. ; 23 cm
Topics: Security, International, National security, Internal security, Economic security, Security...
7
7.0
Jul 25, 2020
07/20
by
Wallulis, Jerald, 1947-
texts
eye 7
favorite 1
comment 0
xviii, 237 p. : 24 cm
Topics: Job security, Economic security, Social security
4
4.0
Apr 13, 2022
04/22
by
Zedner, Lucia
texts
eye 4
favorite 0
comment 0
x, 206 p. ; 20 cm
Topics: Security systems industry, Security systems, National security, Security, International
112
112
Nov 9, 2004
11/04
by
http://www.plaxoft.com/en/products/security/
software
eye 112
favorite 0
comment 0
This program helps you identify insecure Web sites and move them to the restricted zone with just one click. The integrated configuration assistant helps you securing your surfing environment. While surfing the Web you confirm any ActiveX usage. You can identify advertising providers and move them into the restricted zone.
Topics: Security Zone Manager, Internet, Security, Security applications, Security Zone Manager
This essay presents the results of a study which surveyed the various aspects of system security hardware, software, and procedural techniques in use in current and proposed automated systems. Its impetus is from the concern for security control that has been generated by the increasing number of time-sharing and resource-sharing systems. The intention is to present the designers, managers, programmers, system implementers, and operational personnel with a consolidated source of data concerning...
Topics: Computer science, Data security, Computer security, Access security, Privacy/security
429
429
Jul 5, 2014
07/14
by
BODUNDE, DAVID OLUWAFEMI, OLA, ADEGBOYEGA A & AFOLABI, MUYIWA BAMIDELE
texts
eye 429
favorite 0
comment 0
There is paucity of literature on internal security in Nigeria unlike other forms of security. Nigeria, a populous country in Africa has put in place certain numbers of security outfits to protect lives and properties of its citizenry yet the trend of criminality and security challenges are on the increase on daily bases. This study examines the security challenges in the country and assesses the role of internal security outfit. The Nigerian Police are the preeminent outfit saddled...
Topics: : Security, Threat, Internal Security, National Security, Challenges
19
19
texts
eye 19
favorite 1
comment 0
439 pages : 22 cm
Topics: Database security, Industries -- Security measures, Corporations -- Security measures --...
138
138
Nov 8, 2004
11/04
by
http://www.cronoslogic.com/product/onux
software
eye 138
favorite 0
comment 0
This security suite includes a virtual keyboard to defeats keylogging viruses, passwords of up to 1024 characters, file shredding and Internet cache file shredding.
Topics: Onux - PC Security, Internet, Security, Security applications, Onux - PC Security
332
332
movies
eye 332
favorite 0
comment 0
Simos Xenitellis - Event-driven system security vulnerabilities, an overview and demonstration The event-driven model is used to implement software systems like graphical user interfaces (GUIs). An example of such a GUI is Microsoft Windows which we examine in detail. In an event-driven system, applications communicate with each other and with the system through events. While in Windows NT/2000/XP/2003 there is memory protection between applications belonging to different users, there is no...
Topics: hack, security, vulnerabilities, security conference, security professional
319
319
movies
eye 319
favorite 0
comment 0
HITBSecConf2003 Panel Discussion A panel discussion comprising (left to right): * HD Moore * Shreeraj Shah * Adam Gowdiak (LSD) * Job De Haas * Kol. Hussin (NISER/MyCERT) * Nitesh Dhanjani * Dr. Dinesh Nair * Shamsul Jafni (MCMC)
Topics: hack, security, vulnerabilities, security conference, security professional
Cyber Security has developed one of the biggest challenges of information technology in the present day. Cyber security consists of controlling physical access of the hardware, application, networks and protecting against harm that may come via networks. It is a mixture of processes, technologies and practices. The objective of cyber Security is to protect programs, application, networks, computers and data from attack. Moreover, various measures of cyber security is quite a very huge concern...
Topics: Computer Security, cyber security, cybercrime, Security Attacks
824
824
Nov 9, 2004
11/04
by
http://www.safety-lab.com/en/products/1.htm
software
eye 824
favorite 1
comment 0
This set of security scanning tools audits your network security.
Topics: Shadow Security Scanner, Internet, Security, Security applications, Shadow Security Scanner
951
951
movies
eye 951
favorite 0
comment 0
Dinesh Nair - From Script Kiddies to Security Consultants Frequently, the press has misrepresented hackers, crackers and script kiddies. There is a lot of myth and aura about practitioners of computer and network security. This presentation traces the journey of one such individual as he progresses from playing with the public switched telephone system to the TCP/IP networks of today, and the mobile and 3G networks of tomorrow.
Topics: security, hack, vulnerabilities, security conference, security professional
7
7.0
Jan 12, 2022
01/22
by
Ortmeier, P. J
texts
eye 7
favorite 0
comment 0
xx, 409 p. : 24 cm
Topics: Private security services -- Management, Buildings -- Security measures, Industries -- Security...
48
48
Oct 14, 2017
10/17
by
iaset
texts
eye 48
favorite 0
comment 0
With the invention of the internet and new networking technologies, the world has become more interconnected. The concept of network securities is becoming more eminent due to easily acquirable intellectual properties. Network security covers an assortment of computer networks, both public and private, that are utilized as a part of ordinary activity directing exchanges and interchanges among organizations, government offices and people. In this research, discussion paper on the concept of...
Topics: Network Security, Wireless Network Security, IP Security, Electronic Mail Security, Transport-Level...
This study considers how Serbian border security sector reform illuminates questions of force and statecraft in a southern European nation. In 2006, Serbia became a member of the Partnership for Peace (PfP), a step toward a North Atlantic Treaty Organization (NATO) membership; however, Serbia has indicated no intention to become a full NATO member. Also in 2006, Serbia entered into a Stabilization and Association Agreement (SAA) with the European Union (EU) as part of the process of accession...
Topics: National security, Border security
Border security has become an increasingly public topic since the events of September 11, 2001. Customs and Border Protection (CBP) is one of the Department of Homeland Security's largest and most complex components, with a priority mission of keeping terrorists and their weapons out of the United States (U.S.). It also has a responsibility for securing and facilitating trade and travel while enforcing hundreds of U.S. regulations, including immigration and drug laws. When CBP was created, the...
Topics: National security, Border security
Newberry French Pamphlet Collection
61
61
Dec 14, 2016
12/16
by
France. Corps législatif (1795-1814). Conseil des cinq-cents.; France. Corps législatif (1795-1814). Conseil des cinq-cents
texts
eye 61
favorite 0
comment 0
Caption title. Imprint from colophon
Topics: Internal security, Internal security
18
18
Jul 12, 2018
07/18
by
Bonnell, Ralph
texts
eye 18
favorite 0
comment 0
1 online resource (xxiv, 414 pages) :
Topics: Firewalls (Computer security), COMPUTERS -- Internet -- Security, COMPUTERS -- Networking --...
This thesis presents a wide spectrum of computer data security, including both practical and theoretical aspects of the subject. It was motivated by the concern for the general lack of adequate knowledge, techniques, implementation, and application of computer data security. The objective was to (1) review the pertinent features of data security and the relationship of these features to the computer and its users; (2) generate an awareness of the techniques and problems in data security by...
Topics: Computer science, data security, computer security, access security, security verification system
10
10.0
texts
eye 10
favorite 0
comment 0
xiv, 453 p. : 24 cm
Topics: Private security services -- Management, Industries -- Security measures, Corporations -- Security...
7
7.0
Mar 16, 2021
03/21
by
Erik Peterson (keylitho)
data
eye 7
favorite 0
comment 0
This is a rain hood for the Nest Cam Ourdoor. It has a little drip edge on it so water will not run back up the hood.. It works pretty good especially if your camera is tipped down a bit. NOTE: You can NOT see this hood in the camera... so no view is blocked.. Just use some dbl sided thin foam tape to stick it on. See My other uploads for Wire Grommet for this camera.. https://www.thingiverse.com/thing:3170822
Topics: security_camera, security_camera_mount, Household, stl, security, thingiverse, Home_security
46
46
May 2, 2012
05/12
by
Rejda, George E., 1931-
texts
eye 46
favorite 1
comment 0
Cover title: Social insurance & economic security
Topics: Social security, Economic security
Jude 1-2 Saved, Set Apart, and Secure
Topics: Salvation, security, eternal security
41
41
Oct 18, 2010
10/10
by
Turnbull, John Gudert, 1913-; Williams, C. Arthur (Chester Arthur), 1924- joint author; Cheit, Earl Frank, joint author
texts
eye 41
favorite 1
comment 0
Includes bibliographical references
Topics: Economic security, Social security
4
4.0
Jun 6, 2021
06/21
by
Ronald Johnson (gearwarrior)
data
eye 4
favorite 0
comment 0
Another cover. This one has slotted mount. This way it can accept a few different manufacturers. Make sure you look at the complimentary service carrier; https://www.thingiverse.com/thing:3722015 If you bought one of 'those' (Security Cameras) and it came with 'that' (Odd RJ45 plug) and is powered by 'this' (12 volt DC adapter)... Or, you can bolt whatever you want on there. I did put weep holes in it, but I'd still suggest stainless nuts and bolts. I've printed a few in different arrangements...
Topics: Other, security_camera, security, thingiverse, stl, security_camera_mount, Home_security
17,829
18K
Nov 6, 2004
11/04
by
http://www.tropsoft.com/pcsecurity
software
eye 17,829
favorite 2
comment 0
This program offers Explorer control, file lock, folder lock, system lock, Internet lock, shortcut and program Lock, restricted system, Window lock, intruder detection with alarm, flexible and complete password protection and drag-and-drop support.
Topics: PC Security, Internet, Security, System locking, pc, security, pcsecurity, pc security
9
9.0
texts
eye 9
favorite 0
comment 0
xviii, 290 p. ; 25 cm
Topics: Security, International, National security
0
0.0
texts
eye 0
favorite 0
comment 0
302 pages ; 25 cm
Topics: National security -- Pakistan, Internal security -- Pakistan, Internal security, National security,...
Newberry French Pamphlet Collection
62
62
Feb 7, 2017
02/17
by
Rhône-et-Loire (France). Directoire; Bruyset, Jean Marie, 1749-1817, publisher
texts
eye 62
favorite 0
comment 0
Caption title
Topics: Internal security, Internal security
Using a set of presented package and properties through the internet is called cloud computing. Data hubs located everywhere the world offer the cloud services. As this field of machinery seen a express growth in current times, security has been the foremost distress. Security is the main issues for all technology both it was from past or newly modernized. The information might be own or executive data stored in the cloud is facing probable dangers from hackers and there is a need to...
Topics: Cloud Computing, Cloud Security, Security Threats, Security Techniques, Cloud Security Principles.
100
100
May 18, 2018
05/18
by
Cole, Eric;Krutz, Ronald L., 1938-;Conley, James W
texts
eye 100
favorite 5
comment 0
1 online resource (xxxiv, 660 pages) :
Topics: Computer security, Computer networks -- Security measures, COMPUTERS -- Internet -- Security,...
23
23
Dec 17, 2019
12/19
by
Speed, Tim
texts
eye 23
favorite 2
comment 0
1 online resource (xviii, 398 pages) :
Topics: Internet -- Security measures, Computer networks -- Security measures, Computer security, COMPUTERS...
512
512
movies
eye 512
favorite 0
comment 0
Suresh Ramasamy (TimeDotCom) Cryptography Demystified
Topics: hack, security, vulnerabilities, cryptography, security conference, security professional
579
579
movies
eye 579
favorite 0
comment 0
Shreeraj Shah - Defending Web Applications: Strategies, methods and practices Web applications can not be defended by firewall or any other security products. Web application defense strategies require secure coding at application level, knowing your application and protecting them by human intelligence. Knowing your application can lead to profiling your web assets in logical way. Profiling web assets provides better picture of various possible attacks set. Knowing entire attack set greatly...
Topics: hack, web, security, vulnerabilities, security conference, security professional
4
4.0
Oct 7, 2021
10/21
by
Reveron, Derek S
texts
eye 4
favorite 0
comment 0
xv, 255 p. : 23 cm
Topics: Security, International, National security, National security -- United States
3
3.0
texts
eye 3
favorite 0
comment 0
xxii, 232 pages : 23 cm
Topics: Social security -- India, Economic security -- India, Economic security, Social security, India
61
61
texts
eye 61
favorite 2
comment 0
1 online resource (xxxiv, 787 pages) :
Topics: Computer networks -- Security measures, Computer security, COMPUTERS -- Internet -- Security,...
5
5.0
texts
eye 5
favorite 0
comment 0
xii, 168 p. : 27 cm
Topics: Computer security, Internet -- Security measures, Telecommunication -- Security measures
1,577
1.6K
movies
eye 1,577
favorite 0
comment 0
Roberto Preatoni (Zone-H) and Fabio Ghioni Asymmetric Warfare and Interception Revealed (presentation material in zip)
Topics: hack, security, warfare, interception, security conference, security professional
This article analyzes the fact that national spiritual security, especially the spiritual security of youth, is becoming the most urgent and global problem today, and offers solutions on this issue Zarina Boytemirova 2020. YOUTH AND SPIRITUAL SECURITY. International Journal on Integrated Education. 3, 12 (Dec. 2020), 181-183. DOI:https://doi.org/10.31149/ijie.v3i12.968 Pdf Url : https://journals.researchparks.org/index.php/IJIE/article/view/968/911 Paper Url :...
Topics: security, moral security, youth spiritual security, social consciousness
39
39
Apr 27, 2020
04/20
by
Newman, Robert C
texts
eye 39
favorite 1
comment 0
xxviii, 453 p. : 24 cm
Topics: Database security, Computer security, Computer networks -- Security measures
2,096
2.1K
movies
eye 2,096
favorite 0
comment 0
Last Stage of Delirium (LSD) - Security Myths The presentation will discuss various security myths that are still common in the security community. The talk will be strongly based upon history and experiences of the LSD Research Group and most well known projects and events the group participated in. Using the specific case studies, impact of several dangerous security myths related to specific technologies or a general approach to security problems will be presented. Finally, the holistic view...
Topics: security, hack, vulnerability, myth, security professional, security conference
9
9.0
texts
eye 9
favorite 0
comment 0
1 online resource (xiv, 313 pages) :
Topics: Computer security, Computer networks -- Security measures, COMPUTERS -- Internet -- Security,...
14
14
Jun 23, 2018
06/18
by
Cady, Glee Harrah
texts
eye 14
favorite 0
comment 0
1 online resource (xix, 652 pages) :
Topics: Computer security, Digital communications -- Security measures, COMPUTERS -- Internet -- Security,...
133
133
Sep 17, 2018
09/18
by
Brenton, Chris
texts
eye 133
favorite 6
comment 0
1 online resource (xvi, 490 pages) :
Topics: Computer networks -- Security measures, Computer security, COMPUTERS -- Internet -- Security,...