「Security」の共起表現一覧(1語右で並び替え)4ページ目
該当件数 : 4206件
ector of Prevention Policy for Marine Safety, | Security and Stewardship, Coast Guard Headquarters whe |
ylov (Deputy Director General for Information | Security and Foreign Cooperation) |
on, Pennsylvania to market the Club and other | security and safety products. |
Also, I need to know that my own | security and the security of members of my family and |
Internal | Security and training |
within their respective areas port safety and | security and marine environmental protection regulatio |
t of National Defence's nationwide network of | Security and Defence Forum (SDF) research Centres, a n |
which will oversee national energy strategy, | security and development. |
, advanced searching, list management, system | security, and correspondence tracking. |
g by way of government checks (SSI and Social | Security) and have been driven to the Slabs through po |
w enforcement and the justice system, and the | security and stability of the country. |
The Hugo Eberlein Guard Regiment provided | security and guard services to the Ministry. |
Now Carl has become the one who needs | security, and Jody must pick up where Carl left off. |
The stump of the service shaft was known to | security and the locals as "the bunker" or simply "the |
any focused on the development of information | security and connectivity solutions. |
nversation and WS-SecurityPolicy focus on the | security and identity management aspects of SOA implem |
pointed Secretary of the Permanent Council on | Security and Defence. |
der of Online Backup, Business Continuity, IT | Security and Helpdesk services, often referred to as C |
en forum for dialogue regarding the issues of | security and liberty. |
on and for a period with the Organisation for | Security and Cooperation in Europe. |
e next many months with respect to change and | security, and jobs and good governance for Kandahar is |
His main research interests are network | security and operating system security. |
numerous articles and five books on computer | security and privacy. |
rmer envoy of terrorism and threatening state | security and began proceedings to extradite him. |
se a number of flying training, intelligence, | security and other RAF support organisations. |
the American delegation to the Conference on | Security and Cooperation in Europe. |
He established social | security and public services to fill the void that was |
lawyer with extensive experience in national | security and nonproliferation issues. |
continued to constitute a threat to peace and | security and the Council was determined to promote a p |
EUISS is a network partner of the European | Security and Defence College. |
Software Engineering, Computational Biology, | Security, and Formal Methods. |
achieving true energy | security; and, |
The two complexes and the CCCF minimum | security annex were operationally combined and became |
In July of 2009 the Department of Homeland | Security announced its intent to contract with WiiKno |
On November 12th, 2009, GE | Security announced that it had signed a definitive agr |
"By that time I realized that the Nigerian | security apparatus had become quite 'sophisticated', q |
ted infiltrating all leading positions of the | security apparatus of the Reich. |
est case in the High Court, when the National | Security Appeals panel ruled that the Data Protection |
Material from Minimum | Security appears in Attitude: The New Subversive Polit |
The solution for medical and | security appliances sometimes meet the halachic requir |
ASDAQ: SCUR) that developed and sold computer | security appliances and hosted services to protect use |
es' Anti-Malware as a method of removing fake | security applications such as MS Antivirus |
Some of the first Net | security applications, and one of the world's first po |
video encoders for smart home and commercial | security applications. |
rge W. Bush signed the Department of Homeland | Security Appropriations Act on September 30, 2006 and |
Hunt had obtained a Covert | Security Approval to handle the firm's affairs during |
FATA's secretary for | security Arbab Mohammad Arif told reporters in Peshawa |
He was employed as the | security architect and senior systems engineer for Ano |
While there, he designed the Bitfrost | security architecture and personally oversaw the proje |
nsen's death have been housed at the National | Security Archive at George Washington University. |
National | Security Archive |
Peter Kornbluh is director of the National | Security Archive's Chile Documentation Project and of |
This denial took place before the National | Security Archive's request and subsequent declassifica |
MK-ULTRA papers, National | Security Archives) |
down, and a handful of protesters crossed the | security area and climbed over the compound wall. |
He was a member of the | Security Area Directorate for the Internet Engineering |
north of the Joint | Security Area (JSA), in the northern half of the Demil |
nces to Panmunjom actually refer to the Joint | Security Area itself. |
ecently for clearly articulating the national | security argument in support of moving away from fossi |
The world leaders discussed issues on | security, armaments, German unification, and stronger |
Deputy minister of | security, Armenian SSR, in April 1952. |
While the government ordered higher | security around the mosques of Baghdad a lack of incre |
s to take care of the animals and to maintain | security around the house. |
nment acted on that information by tightening | security around the independence day ceremonies and pr |
They also accused him of failing to provide | security around the country. |
Security around Hitler was limited at the Berghof. | |
Ironhide destroys the | security around the Sun Harvester, and Optimus defeats |
Security arrangements ahead of the election were tight | |
Security arrangements at the museum were tightened aft | |
The Agreement on | Security Arrangements (or Chapter VI), signed in Naiva |
How Past Trans-boundary | Security Arrangements Can Change the Future of Peace P |
s were made to get rid of Sidqi, however, his | security arrangements and heavy bodyguard always thwar |
eva Samithi took several steps to improve the | security arrangements in the Temple. |
sions on paper, he said, but on on-the-ground | security arrangements carried out by Israelis. |
The Permanent Ceasefire and | Security Arrangements Implementation Modalities and Ap |
ent can survive unless it is anchored on real | security arrangements. |
eware represents a growing problem in network | security as many malicious code threats seek to pilfer |
The incident had to be investigated by league | security as Martz contended that Turley 'threatened to |
xports were being used to guarantee US energy | security, as opposed to Canada using its energy resour |
Company, 3rd Battalion, 3rd Marines, provides | security as Iraqi children observe in Zaidon, Iraq, on |
al collision, and don't have higher levels of | security as compared to, respectively, RIPEMD-128 and |
The Canadian War on Queers: National | Security as Sexual Regulation Vancouver: UBC Press:(20 |
d itself to deliver Software as a Service and | Security as a Service products. |
viation, it is a key focal point for Homeland | Security as well. |
nister in the Department of Health and Social | Security as well as a junior Foreign Office Minister. |
to include economic, environmental and energy | security as well as military matters. |
Bush Administration's efforts to "end Social | Security as we know it," appeared in 2005. |
The information | security aspect of primary interest for an official pu |
ent believes that Balco had been "overlooking | security aspects". |
Court challenge seeking to quash the adverse | security assessment. |
Command is also responsible for carrying out | security assessments on civilian staff employed by tho |
Disposed of through the | Security Assistance Program (SAP), transferred, (Forei |
He then served as Commander, International | Security Assistance Force (ISAF) in Afghanistan from F |
Enduring Freedom as part of the International | Security Assistance Force (ISAF) in Helmand Province, |
Amendment, later International | Security Assistance and Arms Export Control Act of 197 |
Virginia, and transferred to Greece under the | Security Assistance Program. |
, and sold to Spain on 17 July 1971 under the | Security Assistance Program to serve as Guadalete (M41 |
n on a four-year lease under the terms of the | Security Assistance Program. |
cember 1977, she was sold to Brazil under the | Security Assistance Program 1 February 1980. |
Bowen was disposed of through the | Security Assistance Program (SAP), transferred, Foreig |
eral Josef Blotz, who leads the International | Security Assistance Force in Afghanistan, says it is b |
The International | Security Assistance Force (ISAF) was also required to |
lude disaster relief, emergency preparedness, | security assistance to state law enforcement agencies, |
as transferred and sold to Thailand under the | Security Assistance Program on 1 November 1975 and ren |
o U.S. elements in Spain on status of forces, | security assistance programs and other defense and bas |
Bronstein was disposed of through the | Security Assistance Program as a foreign military sale |
k 11 January 1995 and disposed of through the | Security Assistance Program (SAP), transferred to Taiw |
He served with the International | Security Assistance Force as Commander of the Kabul Mu |
Senior officials at Nato's International | Security Assistance Force in Kabul have compared the p |
sident of the American League for Exports and | Security Assistance from 1980 to 1985. |
ansferred (sold) to Turkey under terms of the | Security Assistance Program, 23 August 1948. |
rom football he went on to work as the campus | security assistant at Rio Calaveras Elementary School |
national president of the Information Systems | Security Association and a board member of the Finnish |
2001 Named to the ISSA (Information Systems | Security Association) Hall of Fame. |
Software | Security Assurance is a process that helps design and |
See Software | Security Assurance. |
ads to Russia and associated compensation and | security assurances. |
SO17 is responsible for | security at the Palace of Westminster, along with surr |
Security at the summit was provided by the Royal Canad | |
He fled from the Cuban team's coaches and | security at his hotel before the match. |
06, his arm was broken in an altercation with | security at Charles De Gaulle International Airport. |
Security at the Air Canada Centre later ejected Ford f | |
n July 2009 five homosexual men were asked by | security at the Chico's Tacos location on Montwood to |
He was in charge of | security at the Bank of England during the Gordon Riot |
Security at other premier institutions in India includ | |
s of the case met delays because of increased | security at the courthouse. |
Enhance signage, lighting and | security at Park & Ride lots. |
Sneed is the head of | security at Magic Mountain. |
enforcement, the ACSD is directed to maintain | security at the Albany County Courthouse, Albany Count |
versity and was a Research Fellow in National | Security at Harvard University. |
Zhu worked as the head of | security at the Lingling District post office, and had |
The sign was taken away by | security at the bottom of the 2nd inning. |
Preventive | security at a strategic level |
st in Iraq puts Jordanian national and energy | security at risk. |
an is the director of the Institute for Human | Security at La Trobe University. |
The incident would provoke increased | security at future home games as well as a joint fundr |
nd strengthening aviation law enforcement and | security at the Federal level; |
lihood of riots, Barbee would not provide any | security at voting boths. |
There he assisted in supervising | security at the first weapons test at the Trinity site |
lexei Arbatov, Head, Center for International | Security at Institute of World Economy and Internation |
The county took several measures to tighten | security at the building. |
Officials say they have stepped up | security at Egypt's borders to try to keep the artwork |
The investigation primarily concerned | security at the camps, youth gangs allegedly operating |
ate 1942, America had entered the war and the | security at Chequers had improved, including covering |
ctionately referred to) worked as the Head of | Security at Rangeview High School in Aurora, CO. |
ers and journalists, prompting an increase in | security at its important moai archeological sites. |
1999 until 2010, she specialized in internet | security at Sun Microsystems. |
Distinguished Visiting Professor in National | Security at the U.S. Naval Academy. |
Security at the complex was extremely tight during the | |
rrested on 4 April 2002 following a breach of | security at Belfast's police headquarters, but release |
f Mannheim Lucks now heads the Chair of Media | Security at Bauhaus-University Weimar. |
st assigned as assistant, then as the head of | security at the Ndjili International Airport. |
Security at Wimbledon was increased as a result of the | |
akes her leave, she meets Michel, the head of | security at Leo's steel mill. |
The ship sought | security at Hampton Roads, Virginia, lest, at sea, she |
The attack prompted heightened | security at subsequent Olympics beginning with the 197 |
theists & Freethinkers (MAAF), which provided | security at the event; |
Nilsson and David Herrera on the feature film | Security at the Pacific Film Archive. |
His series on the lack of | security at airports resulted in the Federal Aviation |
ctor was discovered by Tymm Twillman during a | security audit of the ProFTPd daemon. |
In addition, by applying the | security auditing concepts used in OpenBSD to other pr |
However, port scanners are the best | security auditing tools. |
ed for computer network protocol analysis and | security auditing. |
HM Prison Geelong was a maximum | security Australia prison located on the corner of Mye |
red on the Australian television show, Border | Security: Australia's Front Line. |
Broken Hill Correctional Centre is a medium | security Australian prison housing males and females, |
arrina (Yetta Dhinnakkal) Centre is a minimum | security Australian prison for Aboriginal males locate |
Karnet Prison Farm is a minimum | security Australian prison located 16 kilometres (10 m |
Mannus Correctional Centre is a minimum | security Australian prison located 10 km south of Tumb |
The Adelaide Pre-Release Centre is a minimum | security Australian prison facility located in Regency |
Lithgow Correctional Centre is a maximum | security Australian prison located on the Great Wester |
Fulham Correctional Centre is a medium | security Australian prison located in Hopkins Road, Sa |
HM Prison Won Wron was a minimum | security Australian prison located in Won Wron, Victor |
The Adelaide Women's Prison is a maximum | security Australian prison facility located in Northfi |
Marngoneet Correctional Centre is a medium | security Australian prison in Lara, Victoria, Australi |
Hayes Prison Farm is a minimum | security Australian prison located at Hayes, near New |
Three national | security authorities were modified under title V of th |
In 1968, he advised Park Chung-Hee, social | security authorities for long time. |
National | Security Authority |
ed Retail Technology Award, the Innovative IT | Security Award, and the Early Innovators Award. |
ST/NSA gave him the National Computer Systems | Security Award. |
He is also the president and founder of The | Security Awareness Company (formerly known as Interpac |
Security Awareness Special Interest Group | |
This company develops | security awareness programs for private and public org |
est: information and data controls, personnel | security awareness levels, fraud and social engineerin |
Tom Kellermann- VP of | Security Awareness and Government Affairs |
still "catching up" to the U.S. Government in | security awareness, and that enterprises needed reliab |
al boarding matrix integrated both safety and | security background checks. |
aced, first by red letters spelling out First | Security Bank and more recently by the present Bank of |
Security Bank of Crawford on Main Street. | |
In 1977, Reynie Rutledge purchased First | Security Bank and in 1981 created a bank-holding compa |
First | Security Bank was chartered in 1932 in Searcy, Arkansa |
come to own the controlling interest in First | Security Bank of Oklahoma City. |
He also served as a director of Exchange | Security Bank, and Alabama Gas Corporation. |
owned by Zion's Bank, The Village Bank, First | Security Bank, Wells Fargo Bank, and other corporate c |
966, the name was officially changed to First | Security Bank. |
and investigation services to clients in the | security, banking and government sectors. |
gaol was built by prisoners who slept on high | security barges on Corio Bay during construction. |
Since the erection of the | security barrier a number of Hizmas Palestinian reside |
m municipal boundary and at an opening in the | security barrier. |
こんにちは ゲスト さん
ログイン |
Weblio会員(無料)になると 検索履歴を保存できる! 語彙力診断の実施回数増加! |
こんにちは ゲスト さん
ログイン |
Weblio会員(無料)になると 検索履歴を保存できる! 語彙力診断の実施回数増加! |