「Security」の共起表現(1語右で並び替え)4ページ目 - Weblio英語共起表現検索


小窓モード

プレミアム

ログイン
設定

設定

Weblio 辞書 > 英和辞典・和英辞典 > Securityの意味・解説 > Securityに関連した共起表現

「Security」の共起表現一覧(1語右で並び替え)4ページ目

該当件数 : 4206



ector of Prevention Policy for Marine Safety, Security and Stewardship, Coast Guard Headquarters whe
ylov (Deputy Director General for Information Security and Foreign Cooperation)
on, Pennsylvania to market the Club and other security and safety products.
Also, I need to know that my own security and the security of members of my family and
Internal Security and training
within their respective areas port safety and security and marine environmental protection regulatio
t of National Defence's nationwide network of Security and Defence Forum (SDF) research Centres, a n
which will oversee national energy strategy, security and development.
, advanced searching, list management, system security, and correspondence tracking.
g by way of government checks (SSI and Social Security) and have been driven to the Slabs through po
w enforcement and the justice system, and the security and stability of the country.
The Hugo Eberlein Guard Regiment provided security and guard services to the Ministry.
Now Carl has become the one who needs security, and Jody must pick up where Carl left off.
The stump of the service shaft was known to security and the locals as "the bunker" or simply "the
any focused on the development of information security and connectivity solutions.
nversation and WS-SecurityPolicy focus on the security and identity management aspects of SOA implem
pointed Secretary of the Permanent Council on Security and Defence.
der of Online Backup, Business Continuity, IT Security and Helpdesk services, often referred to as C
en forum for dialogue regarding the issues of security and liberty.
on and for a period with the Organisation for Security and Cooperation in Europe.
e next many months with respect to change and security, and jobs and good governance for Kandahar is
His main research interests are network security and operating system security.
numerous articles and five books on computer security and privacy.
rmer envoy of terrorism and threatening state security and began proceedings to extradite him.
se a number of flying training, intelligence, security and other RAF support organisations.
the American delegation to the Conference on Security and Cooperation in Europe.
He established social security and public services to fill the void that was
lawyer with extensive experience in national security and nonproliferation issues.
continued to constitute a threat to peace and security and the Council was determined to promote a p
EUISS is a network partner of the European Security and Defence College.
Software Engineering, Computational Biology, Security, and Formal Methods.
achieving true energy security; and,
The two complexes and the CCCF minimum security annex were operationally combined and became
In July of 2009 the Department of Homeland Security announced its intent to contract with WiiKno
On November 12th, 2009, GE Security announced that it had signed a definitive agr
"By that time I realized that the Nigerian security apparatus had become quite 'sophisticated', q
ted infiltrating all leading positions of the security apparatus of the Reich.
est case in the High Court, when the National Security Appeals panel ruled that the Data Protection
Material from Minimum Security appears in Attitude: The New Subversive Polit
The solution for medical and security appliances sometimes meet the halachic requir
ASDAQ: SCUR) that developed and sold computer security appliances and hosted services to protect use
es' Anti-Malware as a method of removing fake security applications such as MS Antivirus
Some of the first Net security applications, and one of the world's first po
video encoders for smart home and commercial security applications.
rge W. Bush signed the Department of Homeland Security Appropriations Act on September 30, 2006 and
Hunt had obtained a Covert Security Approval to handle the firm's affairs during
FATA's secretary for security Arbab Mohammad Arif told reporters in Peshawa
He was employed as the security architect and senior systems engineer for Ano
While there, he designed the Bitfrost security architecture and personally oversaw the proje
nsen's death have been housed at the National Security Archive at George Washington University.
National Security Archive
Peter Kornbluh is director of the National Security Archive's Chile Documentation Project and of
This denial took place before the National Security Archive's request and subsequent declassifica
MK-ULTRA papers, National Security Archives)
down, and a handful of protesters crossed the security area and climbed over the compound wall.
He was a member of the Security Area Directorate for the Internet Engineering
north of the Joint Security Area (JSA), in the northern half of the Demil
nces to Panmunjom actually refer to the Joint Security Area itself.
ecently for clearly articulating the national security argument in support of moving away from fossi
The world leaders discussed issues on security, armaments, German unification, and stronger
Deputy minister of security, Armenian SSR, in April 1952.
While the government ordered higher security around the mosques of Baghdad a lack of incre
s to take care of the animals and to maintain security around the house.
nment acted on that information by tightening security around the independence day ceremonies and pr
They also accused him of failing to provide security around the country.
Security around Hitler was limited at the Berghof.
Ironhide destroys the security around the Sun Harvester, and Optimus defeats
Security arrangements ahead of the election were tight
Security arrangements at the museum were tightened aft
The Agreement on Security Arrangements (or Chapter VI), signed in Naiva
How Past Trans-boundary Security Arrangements Can Change the Future of Peace P
s were made to get rid of Sidqi, however, his security arrangements and heavy bodyguard always thwar
eva Samithi took several steps to improve the security arrangements in the Temple.
sions on paper, he said, but on on-the-ground security arrangements carried out by Israelis.
The Permanent Ceasefire and Security Arrangements Implementation Modalities and Ap
ent can survive unless it is anchored on real security arrangements.
eware represents a growing problem in network security as many malicious code threats seek to pilfer
The incident had to be investigated by league security as Martz contended that Turley 'threatened to
xports were being used to guarantee US energy security, as opposed to Canada using its energy resour
Company, 3rd Battalion, 3rd Marines, provides security as Iraqi children observe in Zaidon, Iraq, on
al collision, and don't have higher levels of security as compared to, respectively, RIPEMD-128 and
The Canadian War on Queers: National Security as Sexual Regulation Vancouver: UBC Press:(20
d itself to deliver Software as a Service and Security as a Service products.
viation, it is a key focal point for Homeland Security as well.
nister in the Department of Health and Social Security as well as a junior Foreign Office Minister.
to include economic, environmental and energy security as well as military matters.
Bush Administration's efforts to "end Social Security as we know it," appeared in 2005.
The information security aspect of primary interest for an official pu
ent believes that Balco had been "overlooking security aspects".
Court challenge seeking to quash the adverse security assessment.
Command is also responsible for carrying out security assessments on civilian staff employed by tho
Disposed of through the Security Assistance Program (SAP), transferred, (Forei
He then served as Commander, International Security Assistance Force (ISAF) in Afghanistan from F
Enduring Freedom as part of the International Security Assistance Force (ISAF) in Helmand Province,
Amendment, later International Security Assistance and Arms Export Control Act of 197
Virginia, and transferred to Greece under the Security Assistance Program.
, and sold to Spain on 17 July 1971 under the Security Assistance Program to serve as Guadalete (M41
n on a four-year lease under the terms of the Security Assistance Program.
cember 1977, she was sold to Brazil under the Security Assistance Program 1 February 1980.
Bowen was disposed of through the Security Assistance Program (SAP), transferred, Foreig
eral Josef Blotz, who leads the International Security Assistance Force in Afghanistan, says it is b
The International Security Assistance Force (ISAF) was also required to
lude disaster relief, emergency preparedness, security assistance to state law enforcement agencies,
as transferred and sold to Thailand under the Security Assistance Program on 1 November 1975 and ren
o U.S. elements in Spain on status of forces, security assistance programs and other defense and bas
Bronstein was disposed of through the Security Assistance Program as a foreign military sale
k 11 January 1995 and disposed of through the Security Assistance Program (SAP), transferred to Taiw
He served with the International Security Assistance Force as Commander of the Kabul Mu
Senior officials at Nato's International Security Assistance Force in Kabul have compared the p
sident of the American League for Exports and Security Assistance from 1980 to 1985.
ansferred (sold) to Turkey under terms of the Security Assistance Program, 23 August 1948.
rom football he went on to work as the campus security assistant at Rio Calaveras Elementary School
national president of the Information Systems Security Association and a board member of the Finnish
2001 Named to the ISSA (Information Systems Security Association) Hall of Fame.
Software Security Assurance is a process that helps design and
See Software Security Assurance.
ads to Russia and associated compensation and security assurances.
SO17 is responsible for security at the Palace of Westminster, along with surr
Security at the summit was provided by the Royal Canad
He fled from the Cuban team's coaches and security at his hotel before the match.
06, his arm was broken in an altercation with security at Charles De Gaulle International Airport.
Security at the Air Canada Centre later ejected Ford f
n July 2009 five homosexual men were asked by security at the Chico's Tacos location on Montwood to
He was in charge of security at the Bank of England during the Gordon Riot
Security at other premier institutions in India includ
s of the case met delays because of increased security at the courthouse.
Enhance signage, lighting and security at Park & Ride lots.
Sneed is the head of security at Magic Mountain.
enforcement, the ACSD is directed to maintain security at the Albany County Courthouse, Albany Count
versity and was a Research Fellow in National Security at Harvard University.
Zhu worked as the head of security at the Lingling District post office, and had
The sign was taken away by security at the bottom of the 2nd inning.
Preventive security at a strategic level
st in Iraq puts Jordanian national and energy security at risk.
an is the director of the Institute for Human Security at La Trobe University.
The incident would provoke increased security at future home games as well as a joint fundr
nd strengthening aviation law enforcement and security at the Federal level;
lihood of riots, Barbee would not provide any security at voting boths.
There he assisted in supervising security at the first weapons test at the Trinity site
lexei Arbatov, Head, Center for International Security at Institute of World Economy and Internation
The county took several measures to tighten security at the building.
Officials say they have stepped up security at Egypt's borders to try to keep the artwork
The investigation primarily concerned security at the camps, youth gangs allegedly operating
ate 1942, America had entered the war and the security at Chequers had improved, including covering
ctionately referred to) worked as the Head of Security at Rangeview High School in Aurora, CO.
ers and journalists, prompting an increase in security at its important moai archeological sites.
1999 until 2010, she specialized in internet security at Sun Microsystems.
Distinguished Visiting Professor in National Security at the U.S. Naval Academy.
Security at the complex was extremely tight during the
rrested on 4 April 2002 following a breach of security at Belfast's police headquarters, but release
f Mannheim Lucks now heads the Chair of Media Security at Bauhaus-University Weimar.
st assigned as assistant, then as the head of security at the Ndjili International Airport.
Security at Wimbledon was increased as a result of the
akes her leave, she meets Michel, the head of security at Leo's steel mill.
The ship sought security at Hampton Roads, Virginia, lest, at sea, she
The attack prompted heightened security at subsequent Olympics beginning with the 197
theists & Freethinkers (MAAF), which provided security at the event;
Nilsson and David Herrera on the feature film Security at the Pacific Film Archive.
His series on the lack of security at airports resulted in the Federal Aviation
ctor was discovered by Tymm Twillman during a security audit of the ProFTPd daemon.
In addition, by applying the security auditing concepts used in OpenBSD to other pr
However, port scanners are the best security auditing tools.
ed for computer network protocol analysis and security auditing.
HM Prison Geelong was a maximum security Australia prison located on the corner of Mye
red on the Australian television show, Border Security: Australia's Front Line.
Broken Hill Correctional Centre is a medium security Australian prison housing males and females,
arrina (Yetta Dhinnakkal) Centre is a minimum security Australian prison for Aboriginal males locate
Karnet Prison Farm is a minimum security Australian prison located 16 kilometres (10 m
Mannus Correctional Centre is a minimum security Australian prison located 10 km south of Tumb
The Adelaide Pre-Release Centre is a minimum security Australian prison facility located in Regency
Lithgow Correctional Centre is a maximum security Australian prison located on the Great Wester
Fulham Correctional Centre is a medium security Australian prison located in Hopkins Road, Sa
HM Prison Won Wron was a minimum security Australian prison located in Won Wron, Victor
The Adelaide Women's Prison is a maximum security Australian prison facility located in Northfi
Marngoneet Correctional Centre is a medium security Australian prison in Lara, Victoria, Australi
Hayes Prison Farm is a minimum security Australian prison located at Hayes, near New
Three national security authorities were modified under title V of th
In 1968, he advised Park Chung-Hee, social security authorities for long time.
National Security Authority
ed Retail Technology Award, the Innovative IT Security Award, and the Early Innovators Award.
ST/NSA gave him the National Computer Systems Security Award.
He is also the president and founder of The Security Awareness Company (formerly known as Interpac
Security Awareness Special Interest Group
This company develops security awareness programs for private and public org
est: information and data controls, personnel security awareness levels, fraud and social engineerin
Tom Kellermann- VP of Security Awareness and Government Affairs
still "catching up" to the U.S. Government in security awareness, and that enterprises needed reliab
al boarding matrix integrated both safety and security background checks.
aced, first by red letters spelling out First Security Bank and more recently by the present Bank of
Security Bank of Crawford on Main Street.
In 1977, Reynie Rutledge purchased First Security Bank and in 1981 created a bank-holding compa
First Security Bank was chartered in 1932 in Searcy, Arkansa
come to own the controlling interest in First Security Bank of Oklahoma City.
He also served as a director of Exchange Security Bank, and Alabama Gas Corporation.
owned by Zion's Bank, The Village Bank, First Security Bank, Wells Fargo Bank, and other corporate c
966, the name was officially changed to First Security Bank.
and investigation services to clients in the security, banking and government sectors.
gaol was built by prisoners who slept on high security barges on Corio Bay during construction.
Since the erection of the security barrier a number of Hizmas Palestinian reside
m municipal boundary and at an opening in the security barrier.
                                                                                                    


こんにちは ゲスト さん

ログイン

Weblio会員(無料)になると

会員登録のメリット検索履歴を保存できる!

会員登録のメリット語彙力診断の実施回数増加!

無料会員に登録する
英→日 日→英
こんにちは ゲスト さん

ログイン

Weblio会員(無料)になると

会員登録のメリット検索履歴を保存できる!

会員登録のメリット語彙力診断の実施回数増加!

無料会員に登録する

©2024 GRAS Group, Inc.RSS