National security

Results: 72580



#Item
271Security / Prevention / Safety / National security / Business continuity / Civil defense / Resilience / Cyberwarfare / Systemically important payment systems / Computer security / Cyber threat intelligence / Cyber-attack

Committee on Payments and Market Infrastructures Board of the International Organization of Securities Commissions

Add to Reading List

Source URL: www.iosco.org

Language: English - Date: 2016-08-16 13:52:59
272Computer security / Prevention / Security / Data security / Safety / Information sensitivity / National security / Information security / Classified information / Security controls / Government Security Classifications Policy

VPDSF Information Assessment Process.indd

Add to Reading List

Source URL: www.cpdp.vic.gov.au

Language: English - Date: 2016-08-09 01:19:52
273Terrorism / Prevention / Safety / Law enforcement / National security / Security / Violence / Public safety / Counter-terrorism / Definitions of terrorism / Internet / State terrorism

Internet Cafés What should I consider suspicious? Suspicious Activities What should I do? Be part of the solution.

Add to Reading List

Source URL: www.homelandsecurity.ohio.gov

Language: English - Date: 2013-01-30 08:13:50
274Emergency management / Firefighting in the United States / Disaster preparedness / United States Department of Homeland Security / Incident management / National Response Framework / Incident Command System / Federal Emergency Management Agency / Crisis communication / Emergency management software

PUBLIC INFORMATION IN AN ALL-HAZARDS INCIDENT MGT -318 Texas A&M Engineering Extension Service National Emergency Response and Rescue Training Center

Add to Reading List

Source URL: www.scemd.org

Language: English - Date: 2016-05-04 08:14:26
275Security / Cyberwarfare / Prevention / Cybercrime / National security / Computer security / Hacking / Cyber-attack / Cyber / Thomas Rid / Stuxnet / Cyberterrorism

REVIEWS It is unlikely that any such organisation will ever be able to completely resolve this predicament, as by their very nature political movements seek to create parallel

Add to Reading List

Source URL: ridt.co

Language: English - Date: 2015-12-18 07:31:23
276Security / Prevention / Safety / Crime prevention / National security / Cryptography / Information governance / Security guards / Computer security

OHIO BUSINESSES FOR A SAFER OHIO What can your business do to increase security? Be Aware of Likely Threats

Add to Reading List

Source URL: homelandsecurity.ohio.gov

Language: English - Date: 2016-07-18 10:06:12
277Security / National security / Prevention / Computer network security / Computer security / Crime prevention / Cryptography / Cyberwarfare / Airport / International Civil Aviation Organization / State Secretariat of Civil Aviation / Directorate General of Civil Aviation

Presentation on Aviation Sector to Stakeholders-PDF

Add to Reading List

Source URL: www.aviation.gov.ng

Language: English - Date: 2016-05-31 08:56:30
278Government / Politics / United States intelligence agencies / International security / National security / Political terminology / Central Intelligence Agency / Military / Center for Strategic and International Studies / The Heritage Foundation / U.S. Commission on National Security/21st Century / Kim Holmes

 THE HERITAGE FOUNDATION Contributors Heritage Experts

Add to Reading List

Source URL: ims-2016.s3.amazonaws.com

Language: English - Date: 2015-10-26 11:48:10
279Freedom of information in the United States / Government / Accountability / Freedom of information laws by country / Government information / Public records / United States Department of Veterans Affairs / Information / Freedom of Information Act / National Security Archive

February 1, 2012 Tennessee Valley Authority (TVA) Chief FOIA Officer Report I. Steps Taken to Apply the Presumption of Openness

Add to Reading List

Source URL: www.tva.com

Language: English - Date: 2015-09-28 12:43:54
280Computer security / Security / Cyberwarfare / Computer network security / Cybercrime / National security / Palo Alto Networks / Palo Alto / Threat

Supporting Command and Control through Federated Mission Networking Preventing disruption of Federated Mission Networking

Add to Reading List

Source URL: www.nitec.nato.int

Language: English - Date: 2016-06-13 09:53:52
UPDATE