Public security

Results: 63438



#Item
411Cryptography / Key management / Public key infrastructure / Public-key cryptography / E-commerce / Public key certificate / Certificate authority / Professional certification / Conveyancing / Information security

ARNECC Response to Draft v2 MOR Feedback

Add to Reading List

Source URL: www.arnecc.gov.au

Language: English - Date: 2015-12-09 20:42:33
412Identity documents / Human migration / Travel visa / Passport / Security / Cultural globalization

    NOTICE  TO  THE  PUBLIC    

Add to Reading List

Source URL: www.philembassy.org.au

Language: English - Date: 2015-10-04 07:39:08
413Cryptography / Economy / Business / E-commerce / Universal identifiers / Identity documents / Banking / Cheque / Numismatics / Public key certificate / Social Security number / Medallion signature guarantee

Return your completed form to: Azzad Funds C/O Mutual Shareholder Services 8000 Town Centre Drive, Suite 400 Broadview Heights, OH 44147

Add to Reading List

Source URL: www.azzadfunds.com

Language: English - Date: 2011-12-21 08:04:18
414Cryptography / Key management / Applied mathematics / Cryptographic software / Symmetric-key algorithm / Cipher / Key size / Block cipher / Key / Public-key cryptography / Encryption / Data Encryption Standard

A Survey for Solving Security Issues in Mobile Computing Sreenubabu Dasari Assistant Professor Department of CSE AITAM, Tekkali.

Add to Reading List

Source URL: www.ijmetmr.com

Language: English - Date: 2016-08-09 06:22:39
415Auditing / Actuarial science / Risk / IEEE standards / Management / Professional studies / Prevention / Security / Audit / Risk management / Enterprise risk management / Project management

Internal Control and Risk Management Framework: Volume I Internal Control and Risk Management Framework Project Department of Administrative Reforms and Public Grievances (DARPG)

Add to Reading List

Source URL: darpg.gov.in

Language: English - Date: 2016-03-23 01:40:48
416Cryptography / Computer security / Logger / Data / Logfile / Public-key cryptography / Log analysis / Trusted computing / Disk encryption / Trusted Platform Module

Continuous Tamper-proof Logging Using TPM 2.0 Arunesh Sinha1 , Limin Jia1 , Paul England2 , and Jacob R. Lorch2 1 Carnegie Mellon University, Pittsburgh, Pennsylvania, USA

Add to Reading List

Source URL: www.andrew.cmu.edu

Language: English - Date: 2016-01-24 20:37:43
417North Carolina / North Carolina law / Public Facilities Privacy & Security Act / Sex segregation / DREAM Act / Discovery Institute campaigns / Intelligent design movement / United States / Jen Seelig / Ed Lindsey

Legislative UPDATE VOLUME 2 MOST REV. GREGORY M. AYMOND

Add to Reading List

Source URL: www.laccb.org

Language: English - Date: 2014-06-23 18:16:05
418Prevention / Crime prevention / Law enforcement / National security / Security / Safety / Public health / Privacy / Surveillance / Disease surveillance

Entomological Surveillance Working Group Title: Best Practices Guide to Entomological Surveillance: Data Management and Reporting Background: The DoD Global Emerging Infections Surveillance and Response System (part of

Add to Reading List

Source URL: vectormap.si.edu

Language: English - Date: 2015-11-25 23:29:30
419Cryptography / Key management / Public key infrastructure / Public-key cryptography / Transport Layer Security / StartCom / Certificate authority / Extended Validation Certificate / Public key certificate / S/MIME / X.509 / Code signing

StartCom Certification Authority StartSSL™ Certificates & Public Key Infrastructure Tel: +, +Fax: +Policy & Practice Statements Version:

Add to Reading List

Source URL: www.startssl.com

Language: English - Date: 2015-11-26 02:27:34
420Security / Prevention / Safety / Crime prevention / Physical security / Public safety / Security guard / Surveillance

Annex “A” TECHNICAL PARAMETERS Based on GPPB Circular NoSecond Negotiated Procurement)

Add to Reading List

Source URL: www.hgc.gov.ph

Language: English - Date: 2015-11-04 04:11:28
UPDATE