「Security」の共起表現(1語右で並び替え)6ページ目 - Weblio英語共起表現検索


小窓モード

プレミアム

ログイン
設定

設定

Weblio 辞書 > 英和辞典・和英辞典 > Securityの意味・解説 > Securityに関連した共起表現

「Security」の共起表現一覧(1語右で並び替え)6ページ目

該当件数 : 4206



e, formerly Azureus, because of unimplemented security classes.
for the most hardened violent criminals, the security classification at Greensville has been lowere
fied only "secret," a relatively low level of security classification, and could have been seen by t
Kansas City Star, base officials revoked his security clearance and reassigned him to menial duties
In October 2007 El-Ganayni's security clearance was suspended, effectively barring
.S. Department of Energy withdrew Levernier's security clearance and relegated him to administrative
Jim Hacker is chairing a Security Clearance Committee, which is discussing the
Each successful design yields a higher security clearance and a larger budget, ultimately res
He was granted a security clearance once more on July 12, 1954.
At a minimum unit members held secret security clearance with officers and some Noncommissio
- but the OSC could not reinstate Levernier's security clearance, so he was unable to regain work in
tigation records, the job gave him top-secret security clearance.
arrated these films, Hadley held a Top Secret security clearance.
hese employees maintain Secret and Top Secret security clearances, as required to do business with t
other side to those with Scott Air Force Base security clearances.
ined in their positions and continued to hold security clearances.
00 employees nationwide, the majority holding security clearances.
ret status for his person as well as facility security clearances.
uld be given an official reprimand, have [his security clearance] reviewed, and, in the case of Step
If the security closed lower than it opened, the body is blac
Computer Security Club
Cross-border security co-operation
traded on the Tokyo Stock Exchange where its security code is 4535.
He finds pieces of the security code in a room called "The Chamber of Death".
Using Koistinen's keys and security code, the thieves rob a jewellery store at th
ntelligence work on programming languages and security codes for the National Security Agency.
ttack was an attempt by Carl to acquire Sam's security codes.
As the security comes back online, the group simulates an ear
Electronic Security Command (1 Aug 1979-1 Oct 1991)
United States Army Intelligence and Security Command 15.
nt Command (ERADCOM) and the Intelligence and Security Command (INSCOM).
nd of the United States Army Intelligence and Security Command from 1981 to 1984.
al of the United States Army Intelligence and Security Command from 1981 to 1984, when he retired fr
United States Army Intelligence and Security Command, located at Fort Belvoir, Virginia.
Convention Security Commander - Assistant Chief Leslie Sweet
Zabol district appointed the detainee to the security commander position.
He has also been a National Security Commentator for the Fox News Channel since 20
ince 2009, Mr. Marks has served as a National Security commentator for the National Journal.com's
ale was employed with the Oklahoma Employment Security Commission in Tulsa and Oklahoma City for 30
Employment Security Commission
(This National Security Commission replaces the first Coordinating Co
wthorn Leslie and Company and was a member of Security Commission from 1973 to 1982.
He retired from the Security Commission in 1998.
Employment Security Commission chairman Lynn R. Holmes
ber of 1990, according to Michigan Employment Security Commission statistics.
as appointed chairman of the British Columbia Security Commission, a provincial government agency cr
Chairman of President George W. Bush's Social Security Commission.
National Defence and Security Committee
Diaz de la Portilla led the Senate Domestic Security Committee in 2003.
Member of the Qantas Safety, Environment and Security Committee and a Director of a number of contr
vileges (1995-2001); and the Intelligence and Security Committee (1995-2001).
elected by the parliamentary Intelligence and Security Committee (ISC) to be its first Investigator.
n Side of Secrecy: Britain's Intelligence and Security Committee", the first in-depth study of the I
an oversight committee (the Intelligence and Security Committee) composed of nine MPs reporting to
She served on the Health, Housing and Family Security Committee, and on the Higher Education Commit
2006 he was appointed to the Intelligence and Security Committee, replacing James Arbuthnot.
According to the country's National Security Committee, Dzhakishev appropriated 60% of Kaz
e Island Bar Association, chairing its social security committee.
nt and became chairman of the parliamentarian security committee.
se Transportation, Public Safety and Homeland Security Committee.
and 1944 he was secertary of the Histadrut's security committee.
ar, and later became the head of the National Security Committee.
ber of the Constitution Project's Liberty and Security Committee.
Constitution Project's bipartisan Liberty and Security Committee.
inal Justice, and Transportation and Homeland Security Committees.
Both towers contain building security, communications, and life-safety systems.
At the present time, the security community is divided as to the real world pot
ategy for Stable Peace: Toward a Euroatlantic Security Community (co-author with Piet Buwalda and Dm
The PSCAI, the association of security companies based in Iraq, advises its members
resident Karzai's edict demanded that private security companies to be disbanded in his country by t
He also owned a private security company in Los Angeles; Tom Reddin Security.
2010 Prevx was acquired by US based Internet security company Webroot.
the Canadian subsidiary of the second-largest security company in the United States.
A special troops battalion with a security company and signal company
l members of @Stake left to form the computer security company "iSec Partners" in 2004.
He owns a security company in Johannesburg. 
According to internet security company VeriSign, RBN was registered as an in
It was created in 1952 by the Vigilance and Security Company of Submarine Bases (today known as Ba
A Security Company consisting of 124 Nung.
Meteor Parking is an car parking and security company based at Stansted Airport in Essex.
nuary 27, 2009, Websense acquired Defensio, a security company specialized in blog plugins that help
Inter-Con is a U.S. owned security company which provides a full range of physic
In 2002, Cressey founded the corporate security company Good Harbor Consulting.
He runs a security company in Germany called 'Rhein Security' wi
eg (real-estate company), Blockpost (regional security company), and others.
he company acquired another Monroe, Louisiana security company, Century Protection Systems, and also
Secom, a security company, has owned the hotel since 2003, when
Han then arrives with a New Republic security company, chases off the last of the pursuers,
ADT is the UK's leading security company, helping to protect over 250,000 UK f
In 2002 he founded a software security company, Immunity, where he is now the CTO.
ingle, she served as the head of 'Equitativa' security company.
He is a software engineer for an internet security company.
, a good-natured and successful operator of a security company.
e largest privately owned Canadian electronic security company.
his retirement and to have founded a private security company.
Sendio is an Irvine, California-based e-mail security company.
CCCF was replaced by a medium security complex built next to the West Tennessee High
CCCF was replaced by a medium security complex built next to WTHSF.
Y-12 National Security Complex
is the group that operates the Y-12 National Security Complex, and a member of the Los Alamos Natio
Protecting the Business: Software Security Compliance (2008, John Wiley & Sons)
The Social Security component of the FICA tax is regressive, mean
U Savannah server was replaced by FSF after a security compromise.
mpilers, program analysis, operating systems, security, computer architecture, and high-performance
For a security concern, Android users are advised to downloa
ation equipment, which was imposed because of security concerns regarding gear supplied by Chinese c
In 2005, the event was canceled out of security concerns due to the large amount of visitors.
o preserving political neutrality, safety and security concerns were factors in the decision.
RFC 1675 Security Concerns for IPng
e used to allow pedestrians and bicycles, but security concerns after the September 11 attacks had i
due to security concerns related to elections, The match was
n, arguing that since there were no peace and security concerns raised by its neighbours, the questi
cceptance tests at EMCC, but Northrop, citing security concerns, refused to allow any EMCC employees
Despite these security concerns, TRUSTe has included WhenU's adverti
He only came in to look at the security concerns, but there is nothing like impoundin
n national baseball team did not come, citing security concerns.
sion had been previously abandoned because of security concerns.
row inmates are held at Morgan County due to security concerns.
s in a self-destructing bomb pouch to satisfy security concerns.
ss how the statistics were derived because of security concerns.
s was discontinued because of operational and security concerns.
nd that additional drawdowns will be based on security conditions in each part of the country.
The operation's intent was to improve security conditions in southern Baghdad and reduce the
stated "the step was taken because of the bad security conditions in other areas of Iraq, which make
delays, lack of political will and difficult security conditions prolonged the process.
wo conferences per year - the Annual Computer Security Conference and Exhibition and CSI SX.
RSA Security Conference, Cryptography and information secu
Speech by Mark Abene, Hack in the Box security conference, Kuala Lumpur, Malaysia, 2007.
s work won the best paper award at the USENIX Security conference.
He gave various presentations on security conferences like Black Hat or IT Underground.
SecureWorld Expo, A series of regional IT Security conferences offering education, CPE training
rticipated in several local and International security conferences.
has authored several publications on national security, conflict management, and foreign relations.
adequate size (existing or proposed) and the security considerations of providing a single target f
Security constraints will be present, preventing users
inisterial sister-publications such as Public Security Construction and People's Public Security.
rtners; electrical engineering works design & security consultancy was provided by R.A. Mojica & Par
Special Services: Security consultancy, Courier services, International
He has been a security consultant for several organizations, private
In 1999, Chang was a Security Consultant for AllAdvantage.
ter contacted Mark Abene to recruit him for a security consultant position.
Neal was subsequently hired as a security consultant by Drexel University and the Penn'
It is also the area, where a security consultant for British charity Save the Child
e works for the city of Arlington, Texas as a security consultant in preparation for the 2011 Super
As a security consultant, he presented seminars and appeare
James Stanger is a writer, Web technologist, security consultant, and open source advocate.
ert M. Slade and Rob Slade, is an information security consultant, researcher and instructor from No
rnia, and worked as a freelance pentester and security consultant.
Dr. Herbert Hugh Thompson is an application security consultant.
nter is patrolled and secured by Professional Security Consultants The Security Office is located in
Many are also security consultants, but not every security consultan
of the MD-530 helicopters used by Blackwater Security Consulting in Iraq are also operated through
essional Services division, including network security consulting and managed security services.
Inc. is a technical, scientific and national security consulting firm.
Kingsoft Internet Security contains anti-virus, anti-malware, a vulnerab
Renew security context
Security context token created by a security token ser
Security context token created by one of the communica
Security context token created through negotiation/exc
pose of WS-SecureConversation is to establish security contexts for multiple SOAP message exchanges,
pecified by Bitfrost, but dynamic creation of security contexts is required.
S-Policy to allow the creation and sharing of security contexts.
As a result, Exelon terminated the security contract of the Wackenhut security firm that
lving a troubled multibillion-dollar Homeland Security contract.
l of the victims were working for an American security contractor.
distinguish between Afghan and international security contractors.
ork to consolidate Argentine beef quality and security, contributing to the efficiency of productive
$43.6 billion - Social security contributions
The Federal Route 77 was put under strict security control by Malaysian army.
f Afghanistan's deadliest regions have handed security control to United States troops. 
gration with other systems typically involves security control room plots of target position and con
e units or to hand over large areas to Afghan security control.
ateway include trading partner management and security control.
Equality of Treatment (Social Security) Convention, 1962 is an International Labour
This article is about the computer security convention.
Western Hemisphere Institute for Security Cooperation
Task Forces/Joint Interagency Task Force, and Security Cooperation Organizations.
gned with the The NT Police Counter Terrorism Security Coordination Unit (CTSCU) which was formally
EDRi has a focus on privacy, security, copyright, governance and freedom of speech.
corporate finance and has published on social security, corporate and personal taxation, mutual fund
Garda World Security Corporation (TSX: GW) is a private security f
It is the Headquarters of Defence Security Corps now; the place is also known as Burnass
ined the Home Army and became a member of its Security Corps.
The Boston Pre-Release Center is a minimum security correctional facility located on Canterbury S
the John Morony Correctional Centre, a medium security correctional centre for men (John Morony); th
Washington Correctional Facility is a medium security correctional facility that is located in Coms
He was appointed BBC News' security correspondent in 2004.
Frank Gardner, journalist (BBC Security Correspondent)
rfurth also worked for ABC News as a national security correspondent, specializing in arms control,
He is currently the BBC's Security Correspondent.
f London, especially covering fire safety and security, cost an additional £4.5m, and took three yea
dgetary deficits swelled, as did large social security cost overruns and the huge operating losses i
Spokesman McDonald said the Security Council took an important step by visiting Su
He was President of the United Nations Security Council during the war in Yugoslavia.
The Security Council reaffirmed Resolution 1373 (2001) and
The Security Council had considered a report of the Secret
The Security Council reaffirmed its commitment to the sove
African members of the Security Council condemned the actions of the Libyan r
                                                                                                    


こんにちは ゲスト さん

ログイン

Weblio会員(無料)になると

会員登録のメリット検索履歴を保存できる!

会員登録のメリット語彙力診断の実施回数増加!

無料会員に登録する
英→日 日→英
こんにちは ゲスト さん

ログイン

Weblio会員(無料)になると

会員登録のメリット検索履歴を保存できる!

会員登録のメリット語彙力診断の実施回数増加!

無料会員に登録する

©2024 GRAS Group, Inc.RSS