National security

Results: 72580



#Item
921

琉球大学様向け Digital National Security Archive 講習会 2016年7月8日 本日のセッションの内容

Add to Reading List

Source URL: www.lib.u-ryukyu.ac.jp

Language: Japanese - Date: 2016-07-10 20:47:54
    922Matter / Geology / Mineralogy / Economic geology / Actinides / Chemical elements / Nuclear fuels / Nuclear materials / Granite / Mineral / Zircon / Pegmatite

    Natural Radioactivity in the Geologic Environment Bruce W. Hurley National Nuclear Security Administration Nevada Site Office

    Add to Reading List

    Source URL: cemp.dri.edu

    Language: English - Date: 2009-08-11 14:01:47
    923Security / Prevention / Safety / Computer security / Crime prevention / Cryptography / Information governance / National security / Security breach notification laws / Information security / Breach / Automatic number plate recognition

    TLUpdates to Personal Information Breach Notification Requirements

    Add to Reading List

    Source URL: www.cio.ca.gov

    Language: English - Date: 2016-03-08 17:23:40
    924Welfare economics / Government / Economy / Structure / Social programs / Social systems / Welfare state / Poverty / Mykolas Romeris University / Child poverty / Lithuania / Social security

    Mykolas Romeris University ICSW Europe Lithuanian National Committee of ICSW

    Add to Reading List

    Source URL: www.icsw.org

    Language: English - Date: 2015-08-12 15:56:33
    925Law enforcement / Government / United States intelligence agencies / National security / Military intelligence / Crime prevention / Intelligence-led policing / Intelligence sharing / Information Sharing Environment / Central Intelligence Agency / Intelligence analysis / Secretariat of Intelligence

    Minimum Criminal Intelligence Training Standards for Law Enforcement and Other Criminal Justice Agencies in the United States Findings and Recommendations

    Add to Reading List

    Source URL: www.ncirc.gov

    Language: English - Date: 2009-07-02 11:39:46
    926Security / Prevention / National security / Mass surveillance / Crime prevention / Law enforcement / Surveillance / National Security Agency / Internet privacy / Cloud computing / Internet / Edward Snowden

    On the Feasibility of a Technological Response to the Surveillance Morass Joan Feigenbaum and J´er´emie Koenig Yale University, New Haven CT, USA E-mail: {joan.feigenbaum, jeremie.koenig}@yale.edu

    Add to Reading List

    Source URL: cs-www.cs.yale.edu

    Language: English - Date: 2014-05-31 10:55:23
    927Crime prevention / Prevention / Security / Safety / Criminology / Law enforcement / Security engineering / National security / Crime prevention through environmental design / Surveillance / Defensible space theory / Closed-circuit television

    Published in: Internationale Architecture Biennale Rotterdam (ed.) Open City: Designing Coexistence, Amsterdam: Sun 2009, Michael Zinganel Crime does pay! The Structure-Building Power of Crime for Urban Planning

    Add to Reading List

    Source URL: www.zinganel.mur.at

    Language: English - Date: 2014-03-04 19:28:21
    928Security / Business / Economy / Cyberwarfare / Cybercrime / Computer network security / Computer security / Cryptography / National security / Certified Information Systems Security Professional / Arms industry / Cyber-security regulation

    MarchJob Market Intelligence: Report on the Growth of Cybersecurity Jobs Matching People

    Add to Reading List

    Source URL: burning-glass.com

    Language: English - Date: 2015-06-22 20:11:05
    929WikiLeaks / Security / Politics / News leaks / National security / The Guardian / The New York Times / Cypherpunks / Julian Assange / Chelsea Manning / United States diplomatic cables leak / Afghan War documents leak

    State Secrets: Ben Franklin and WikiLeaks Russ Castronovo By the eve of the American Revolution, the secret correspondence of the colonial governors of Massachusetts, New York, Maryland, Virginia, and North Carolina had

    Add to Reading List

    Source URL: criticalinquiry.uchicago.edu

    Language: English - Date: 2016-01-13 15:17:12
    930Security / Computing / Prevention / Computer network security / Crime prevention / Cryptography / Information governance / National security / Capture the flag / Information security / Vulnerability / Computer security

    Experiences In Cyber Security Education: The MIT Lincoln Laboratory Capture-the-Flag Exercise ∗ Joseph Werther, Michael Zhivich, Tim Leek MIT Lincoln Laboratory POC:

    Add to Reading List

    Source URL: static.usenix.org

    Language: English - Date: 2011-07-08 13:42:25
    UPDATE