54
54
Oct 28, 2013
10/13
by
Gibert, Stephen P
texts
eye 54
favorite 0
comment 0
Includes index
Topics: National security, National security, National security, National security, National security,...
0
0.0
data
eye 0
favorite 0
comment 0
Udemy - CompTIA Security+ Certification (SY0-501) The Total Course.torrent
Topics: Security, Security+
Source: torrent:urn:sha1:cf78f2dbb07ac0bdc4a49f6c65daa0b12e0f2586
33
33
Jan 16, 2018
01/18
by
Peterson, Jonathan,American Association of Retired Persons
texts
eye 33
favorite 4
comment 0
"AARP."
Topics: Social security, Social security, Social security, Social security
Vulnerability has been defined as the characteristics of a person or a group of persons i.e. in terms of their capacity to cope with, anticipate, resist and recover from the impacts of natural or man-made hazards or any external event. Vulnerability is also defined as the inability to withstand the effects of hostile environment. Hostile environment refers to livelihood security in this research. Concept of vulnerability is described within five categories of livelihood security, which are...
Topics: Vulnerability, livelihood security, health security, social security, economic security, food...
Vulnerability has been defined as the characteristics of a person or a group of persons i.e. in terms of their capacity to cope with, anticipate, resist and recover from the impacts of natural or man-made hazards or any external event. Vulnerability is also defined as the inability to withstand the effects of hostile environment. Hostile environment refers to livelihood security in this research. Concept of vulnerability is described within five categories of livelihood security, which are...
Topics: Vulnerability, livelihood security, health security, social security, economic security, food...
187
187
Nov 22, 2016
11/16
by
CBS News; Carousel Films
movies
eye 187
favorite 2
comment 1
Producer, Gene DePoris
favoritefavoritefavoritefavoritefavorite ( 1 reviews )
Topics: Social security, Social security, Social security
655
655
Oct 31, 2012
10/12
by
Aussie Surveillance
movies
eye 655
favorite 2
comment 1
Know about security DVR, security camera, security systems. We are providing you with the information to make the right decision. We contribute our success to supplying customers with the information they need prior to purchase of CCTV and on-going support.
favoritefavoritefavoritefavoritefavorite ( 1 reviews )
Topics: Security DVR, Security Camera, Security Systems
192
192
Nov 6, 2014
11/14
by
United States. Congress. House. Committee on Ways and Means
texts
eye 192
favorite 0
comment 0
In folder: Public laws / Hearings / House / 109th Congress / 1st session / 2005
Topics: Social security, Social security, Social security
Vulnerability has been defined as the characteristics of a person or a group of persons i.e. in terms of their capacity to cope with, anticipate, resist and recover from the impacts of natural or man-made hazards or any external event. Vulnerability is also defined as the inability to withstand the effects of hostile environment. Hostile environment refers to livelihood security in this research. Concept of vulnerability is described within five categories of livelihood security, which are...
Topics: Vulnerability, livelihood security, health security, social security, economic security, food...
14
14
Sep 2, 2019
09/19
by
BizzSecure
movies
eye 14
favorite 0
comment 0
BizzSecure supplies the Cyber Security services that are best. We are aware of the significance of IT Compliance execute compliance risk management for you and risk assessment solutions. Together with the EAID: Generation GRC Solutions that are following, you may be sure about the safety of your business's network . We concentrate on the 3 facets that are key while working on Visibility any job, Automation, and Completeness. Our IT Security options provide your organization the capacity to...
Topics: Cyber Security, Information Security, IT security
4
4.0
Jul 25, 2020
07/20
by
Wallulis, Jerald, 1947-
texts
eye 4
favorite 0
comment 0
xviii, 237 p. : 24 cm
Topics: Job security, Economic security, Social security
45
45
movies
eye 45
favorite 0
comment 0
Darbar Trailers - Security And Police uniforms Kishorsinh Darbar - www.darbartrailers.com Phone No : 8128262243 - 7778982756 Email Id : darbartrailers@gmail.com Shop No. 31, Below HB Kapadia New High School, Near Delhi Gate, Shahibaug Rd, Bhadreshwar Society, Kazipur Dariyapur, Ahmedabad, Gujarat 380004 Darbar Trailers was established in the year 1976. We are the leading Trader, Retailer and Supplier of Security T-shirt, Security Pant, Safety Boot, Security Shirt, Security Cap, Rain Coat,...
Topics: Security, uniform, Security T-shirt, Security Pant, Safety Boot, Security Shirt, Security Cap, Rain...
13
13
texts
eye 13
favorite 0
comment 0
439 pages : 22 cm
Topics: Database security, Industries -- Security measures, Corporations -- Security measures --...
125
125
Nov 8, 2004
11/04
by
http://www.cronoslogic.com/product/onux
software
eye 125
favorite 0
comment 0
This security suite includes a virtual keyboard to defeats keylogging viruses, passwords of up to 1024 characters, file shredding and Internet cache file shredding.
Topics: Onux - PC Security, Internet, Security, Security applications, Onux - PC Security
743
743
Nov 9, 2004
11/04
by
http://www.safety-lab.com/en/products/1.htm
software
eye 743
favorite 0
comment 0
This set of security scanning tools audits your network security.
Topics: Shadow Security Scanner, Internet, Security, Security applications, Shadow Security Scanner
17
17
Jul 12, 2018
07/18
by
Bonnell, Ralph
texts
eye 17
favorite 0
comment 0
1 online resource (xxiv, 414 pages) :
Topics: Firewalls (Computer security), COMPUTERS -- Internet -- Security, COMPUTERS -- Networking --...
309
309
movies
eye 309
favorite 0
comment 0
HITBSecConf2003 Panel Discussion A panel discussion comprising (left to right): * HD Moore * Shreeraj Shah * Adam Gowdiak (LSD) * Job De Haas * Kol. Hussin (NISER/MyCERT) * Nitesh Dhanjani * Dr. Dinesh Nair * Shamsul Jafni (MCMC)
Topics: hack, security, vulnerabilities, security conference, security professional
Cyber Security has developed one of the biggest challenges of information technology in the present day. Cyber security consists of controlling physical access of the hardware, application, networks and protecting against harm that may come via networks. It is a mixture of processes, technologies and practices. The objective of cyber Security is to protect programs, application, networks, computers and data from attack. Moreover, various measures of cyber security is quite a very huge concern...
Topics: Computer Security, cyber security, cybercrime, Security Attacks
30
30
Apr 9, 2015
04/15
by
Bernan Press
texts
eye 30
favorite 0
comment 0
Includes index
Topics: United States. Social Security Administration, United States. Social Security Administration,...
316
316
movies
eye 316
favorite 0
comment 0
Simos Xenitellis - Event-driven system security vulnerabilities, an overview and demonstration The event-driven model is used to implement software systems like graphical user interfaces (GUIs). An example of such a GUI is Microsoft Windows which we examine in detail. In an event-driven system, applications communicate with each other and with the system through events. While in Windows NT/2000/XP/2003 there is memory protection between applications belonging to different users, there is no...
Topics: hack, security, vulnerabilities, security conference, security professional
88
88
Nov 9, 2004
11/04
by
http://www.plaxoft.com/en/products/security/
software
eye 88
favorite 0
comment 0
This program helps you identify insecure Web sites and move them to the restricted zone with just one click. The integrated configuration assistant helps you securing your surfing environment. While surfing the Web you confirm any ActiveX usage. You can identify advertising providers and move them into the restricted zone.
Topics: Security Zone Manager, Internet, Security, Security applications, Security Zone Manager
12
12
Nov 16, 2018
11/18
by
Stanger, James
texts
eye 12
favorite 0
comment 0
1 online resource (xxix, 673 pages) :
Topics: Linux, Computer security, COMPUTERS -- Internet -- Security, COMPUTERS -- Networking -- Security,...
58
58
Oct 18, 2018
10/18
by
Ciampa, Mark D
texts
eye 58
favorite 3
comment 0
1 online resource (xvii, 444 pages) :
Topics: Computer security, Computer networks -- Security measures, COMPUTERS -- Internet -- Security,...
Source: removedNEL
40
40
May 2, 2012
05/12
by
Rejda, George E., 1931-
texts
eye 40
favorite 1
comment 0
Cover title: Social insurance & economic security
Topics: Social security, Economic security
219
219
Financing the social security system : hearings before the Subcommittee on Social Security of the Committee on Ways and Means, House of Representatives, Ninety-fourth Congress, first session ..., May 7, 14, 15, 20, 21; June 17, 18, and 19, 1975
Aug 21, 2014
08/14
by
United States. Congress. House. Committee on Ways and Means. Subcommittee on Social Security
texts
eye 219
favorite 0
comment 0
James A. Burke, subcommittee chairman
Topics: Social security, Social security
655
655
May 27, 2014
05/14
by
United States. Social Security Administration; United States. Social Security Administration. Office of Research, Evaluation, and Statistics
texts
eye 655
favorite 0
comment 0
Some issues distributed to depository libraries in microfiche
Topics: Social security, Social Security
108
108
Nov 14, 2014
11/14
by
United States. Congress. House. Committee on Ways and Means
texts
eye 108
favorite 0
comment 0
In folder: 90th Congress / 1967-1968
Topics: Social security, Social Security
511
511
Jun 24, 2014
06/14
by
United States. Congress. Senate. Committee on Finance
texts
eye 511
favorite 0
comment 0
Calendar no. 1175
Topics: Social Security, Social security
27
27
data
eye 27
favorite 0
comment 0
Udemy - The Complete Cyber Security Course Network Security
Topics: Cyber Security, Network Security
Source: torrent:urn:sha1:d34a47e2024b3a10ebfc62f8efdf9a32e5d3681e
69
69
movies
eye 69
favorite 0
comment 0
Worried about cyber security breaches? We can help you. Our cyber security solutions are accessible to all at a reasonable cost. Contact us today to undertake a self assessment to understand how protected your business is. Post assessment we can suggest the tailor made solutions to fit your needs. For more information visit us at https://www.paraflare.com/ . ParaFlare Pty Limited PO BOX A1439, Sydney, NSW 1235 Ph. (02) 8385 0439 https://twitter.com/paraflare_cyber/
Topics: cyber security, cyber security sydney, it security, it security sydney, cyber security firms, cyber...
27
27
Oct 14, 2017
10/17
by
iaset
texts
eye 27
favorite 0
comment 0
With the invention of the internet and new networking technologies, the world has become more interconnected. The concept of network securities is becoming more eminent due to easily acquirable intellectual properties. Network security covers an assortment of computer networks, both public and private, that are utilized as a part of ordinary activity directing exchanges and interchanges among organizations, government offices and people. In this research, discussion paper on the concept of...
Topics: Network Security, Wireless Network Security, IP Security, Electronic Mail Security, Transport-Level...
397
397
Jul 5, 2014
07/14
by
BODUNDE, DAVID OLUWAFEMI, OLA, ADEGBOYEGA A & AFOLABI, MUYIWA BAMIDELE
texts
eye 397
favorite 0
comment 0
There is paucity of literature on internal security in Nigeria unlike other forms of security. Nigeria, a populous country in Africa has put in place certain numbers of security outfits to protect lives and properties of its citizenry yet the trend of criminality and security challenges are on the increase on daily bases. This study examines the security challenges in the country and assesses the role of internal security outfit. The Nigerian Police are the preeminent outfit saddled...
Topics: : Security, Threat, Internal Security, National Security, Challenges
Border security has become an increasingly public topic since the events of September 11, 2001. Customs and Border Protection (CBP) is one of the Department of Homeland Security's largest and most complex components, with a priority mission of keeping terrorists and their weapons out of the United States (U.S.). It also has a responsibility for securing and facilitating trade and travel while enforcing hundreds of U.S. regulations, including immigration and drug laws. When CBP was created, the...
Topics: National security, Border security
1,210
1.2K
May 27, 2014
05/14
by
United States. Social Security Administration; United States. Social Security Administration. Office of Research, Evaluation, and Statistics
texts
eye 1,210
favorite 0
comment 0
Some issues distributed to depository libraries in microfiche
Topics: Social security, Social Security
25
25
Jul 12, 2013
07/13
by
Boskin, Michael J
texts
eye 25
favorite 0
comment 0
"A Twentieth Century Fund report."
Topics: Social security, Social security
Newberry French Pamphlet Collection
32
32
Dec 14, 2016
12/16
by
France. Corps législatif (1795-1814). Conseil des cinq-cents.; France. Corps législatif (1795-1814). Conseil des cinq-cents
texts
eye 32
favorite 0
comment 0
Caption title. Imprint from colophon
Topics: Internal security, Internal security
263
263
Aug 21, 2014
08/14
by
United States. Congress. Senate. Committee on Finance. Subcommittee on Social Security
texts
eye 263
favorite 0
comment 0
Hearings held June 13-July 15, 1977
Topics: Social security, Social security
14
14
Jul 3, 2014
07/14
by
Bernan Press
texts
eye 14
favorite 1
comment 0
Includes index
Topics: United States. Social Security Administration, United States. Social Security Administration,...
932
932
movies
eye 932
favorite 0
comment 0
Dinesh Nair - From Script Kiddies to Security Consultants Frequently, the press has misrepresented hackers, crackers and script kiddies. There is a lot of myth and aura about practitioners of computer and network security. This presentation traces the journey of one such individual as he progresses from playing with the public switched telephone system to the TCP/IP networks of today, and the mobile and 3G networks of tomorrow.
Topics: security, hack, vulnerabilities, security conference, security professional
5
5.0
Aug 25, 2018
08/18
by
Toohey, Bill
texts
eye 5
favorite 2
comment 0
256 pages
Topics: Financial security, Financial security
24
24
May 1, 2012
05/12
by
Morrison, Charles Edward, 1944-; Kojima, Akira, 1942-; Maull, Hanns, 1947-; Trilateral Commission
texts
eye 24
favorite 1
comment 0
"Discussed at the Trilateral Commission meeting in Tokyo on March 22-24, 1997"--T.p. verso
Topics: National security, National security
13
13
Sep 13, 2013
09/13
by
Cossa, Ralph A
texts
eye 13
favorite 1
comment 0
Includes bibliographical references
Topics: National security, National security
33
33
Aug 7, 2012
08/12
by
United States. Congress. Joint Economic Committee
texts
eye 33
favorite 0
comment 0
At head of title: 89th Congress, 1st session. Joint committee print
Topics: Social security, Social security
22
22
Jul 27, 2012
07/12
by
Abraham, Katharine G; Houseman, Susan N., 1956-
texts
eye 22
favorite 0
comment 0
Includes bibliographical references (p. 161-168) and index
Topics: Job security, Job security
73
73
May 18, 2018
05/18
by
Cole, Eric;Krutz, Ronald L., 1938-;Conley, James W
texts
eye 73
favorite 1
comment 0
1 online resource (xxxiv, 660 pages) :
Topics: Computer security, Computer networks -- Security measures, COMPUTERS -- Internet -- Security,...
18
18
audio
eye 18
favorite 0
comment 0
Badlands Security Group is dedicated to protecting your interests at worksites and responding to the varied needs of oil and gas, railway, and construction companies, providing security, safety awareness, and compliance monitoring. They bring decades of experience protecting assets, reporting on safety and compliance issues, and providing on-site training to raise safety and security awareness. private security contractor
Topics: security contractors, security companies
14
14
Mar 23, 2018
03/18
by
Boughton, Harold "Bud."
texts
eye 14
favorite 0
comment 0
xvii, 182 pages ; 24 cm
Topics: Security (Psychology), Security (Psychology)
Newberry French Pamphlet Collection
36
36
Feb 7, 2017
02/17
by
Rhône-et-Loire (France). Directoire; Rhône-et-Loire (France). Directoire; Bruyset, Jean Marie, 1749-1817, publisher
texts
eye 36
favorite 0
comment 0
Caption title
Topics: Internal security, Internal security
100
100
Sep 6, 2012
09/12
by
United States. Congress. Joint Economic Committee
texts
eye 100
favorite 0
comment 0
At head of title: 89th Congress, 1st session. Joint committee print
Topics: Social security, Social security
5
5.0
Jan 29, 2020
01/20
by
Willoughby, William F. (William Franklin), 1867-1960
texts
eye 5
favorite 0
comment 0
xii, 386 pages
Topics: Social security, Social security