「Security」の共起表現一覧(1語右で並び替え)6ページ目
該当件数 : 4206件
e, formerly Azureus, because of unimplemented | security classes. |
for the most hardened violent criminals, the | security classification at Greensville has been lowere |
fied only "secret," a relatively low level of | security classification, and could have been seen by t |
Kansas City Star, base officials revoked his | security clearance and reassigned him to menial duties |
In October 2007 El-Ganayni's | security clearance was suspended, effectively barring |
.S. Department of Energy withdrew Levernier's | security clearance and relegated him to administrative |
Jim Hacker is chairing a | Security Clearance Committee, which is discussing the |
Each successful design yields a higher | security clearance and a larger budget, ultimately res |
He was granted a | security clearance once more on July 12, 1954. |
At a minimum unit members held secret | security clearance with officers and some Noncommissio |
- but the OSC could not reinstate Levernier's | security clearance, so he was unable to regain work in |
tigation records, the job gave him top-secret | security clearance. |
arrated these films, Hadley held a Top Secret | security clearance. |
hese employees maintain Secret and Top Secret | security clearances, as required to do business with t |
other side to those with Scott Air Force Base | security clearances. |
ined in their positions and continued to hold | security clearances. |
00 employees nationwide, the majority holding | security clearances. |
ret status for his person as well as facility | security clearances. |
uld be given an official reprimand, have [his | security clearance] reviewed, and, in the case of Step |
If the | security closed lower than it opened, the body is blac |
Computer | Security Club |
Cross-border | security co-operation |
traded on the Tokyo Stock Exchange where its | security code is 4535. |
He finds pieces of the | security code in a room called "The Chamber of Death". |
Using Koistinen's keys and | security code, the thieves rob a jewellery store at th |
ntelligence work on programming languages and | security codes for the National Security Agency. |
ttack was an attempt by Carl to acquire Sam's | security codes. |
As the | security comes back online, the group simulates an ear |
Electronic | Security Command (1 Aug 1979-1 Oct 1991) |
United States Army Intelligence and | Security Command 15. |
nt Command (ERADCOM) and the Intelligence and | Security Command (INSCOM). |
nd of the United States Army Intelligence and | Security Command from 1981 to 1984. |
al of the United States Army Intelligence and | Security Command from 1981 to 1984, when he retired fr |
United States Army Intelligence and | Security Command, located at Fort Belvoir, Virginia. |
Convention | Security Commander - Assistant Chief Leslie Sweet |
Zabol district appointed the detainee to the | security commander position. |
He has also been a National | Security Commentator for the Fox News Channel since 20 |
ince 2009, Mr. Marks has served as a National | Security commentator for the National Journal.com's |
ale was employed with the Oklahoma Employment | Security Commission in Tulsa and Oklahoma City for 30 |
Employment | Security Commission |
(This National | Security Commission replaces the first Coordinating Co |
wthorn Leslie and Company and was a member of | Security Commission from 1973 to 1982. |
He retired from the | Security Commission in 1998. |
Employment | Security Commission chairman Lynn R. Holmes |
ber of 1990, according to Michigan Employment | Security Commission statistics. |
as appointed chairman of the British Columbia | Security Commission, a provincial government agency cr |
Chairman of President George W. Bush's Social | Security Commission. |
National Defence and | Security Committee |
Diaz de la Portilla led the Senate Domestic | Security Committee in 2003. |
Member of the Qantas Safety, Environment and | Security Committee and a Director of a number of contr |
vileges (1995-2001); and the Intelligence and | Security Committee (1995-2001). |
elected by the parliamentary Intelligence and | Security Committee (ISC) to be its first Investigator. |
n Side of Secrecy: Britain's Intelligence and | Security Committee", the first in-depth study of the I |
an oversight committee (the Intelligence and | Security Committee) composed of nine MPs reporting to |
She served on the Health, Housing and Family | Security Committee, and on the Higher Education Commit |
2006 he was appointed to the Intelligence and | Security Committee, replacing James Arbuthnot. |
According to the country's National | Security Committee, Dzhakishev appropriated 60% of Kaz |
e Island Bar Association, chairing its social | security committee. |
nt and became chairman of the parliamentarian | security committee. |
se Transportation, Public Safety and Homeland | Security Committee. |
and 1944 he was secertary of the Histadrut's | security committee. |
ar, and later became the head of the National | Security Committee. |
ber of the Constitution Project's Liberty and | Security Committee. |
Constitution Project's bipartisan Liberty and | Security Committee. |
inal Justice, and Transportation and Homeland | Security Committees. |
Both towers contain building | security, communications, and life-safety systems. |
At the present time, the | security community is divided as to the real world pot |
ategy for Stable Peace: Toward a Euroatlantic | Security Community (co-author with Piet Buwalda and Dm |
The PSCAI, the association of | security companies based in Iraq, advises its members |
resident Karzai's edict demanded that private | security companies to be disbanded in his country by t |
He also owned a private | security company in Los Angeles; Tom Reddin Security. |
2010 Prevx was acquired by US based Internet | security company Webroot. |
the Canadian subsidiary of the second-largest | security company in the United States. |
A special troops battalion with a | security company and signal company |
l members of @Stake left to form the computer | security company "iSec Partners" in 2004. |
He owns a | security company in Johannesburg. |
According to internet | security company VeriSign, RBN was registered as an in |
It was created in 1952 by the Vigilance and | Security Company of Submarine Bases (today known as Ba |
A | Security Company consisting of 124 Nung. |
Meteor Parking is an car parking and | security company based at Stansted Airport in Essex. |
nuary 27, 2009, Websense acquired Defensio, a | security company specialized in blog plugins that help |
Inter-Con is a U.S. owned | security company which provides a full range of physic |
In 2002, Cressey founded the corporate | security company Good Harbor Consulting. |
He runs a | security company in Germany called 'Rhein Security' wi |
eg (real-estate company), Blockpost (regional | security company), and others. |
he company acquired another Monroe, Louisiana | security company, Century Protection Systems, and also |
Secom, a | security company, has owned the hotel since 2003, when |
Han then arrives with a New Republic | security company, chases off the last of the pursuers, |
ADT is the UK's leading | security company, helping to protect over 250,000 UK f |
In 2002 he founded a software | security company, Immunity, where he is now the CTO. |
ingle, she served as the head of 'Equitativa' | security company. |
He is a software engineer for an internet | security company. |
, a good-natured and successful operator of a | security company. |
e largest privately owned Canadian electronic | security company. |
his retirement and to have founded a private | security company. |
Sendio is an Irvine, California-based e-mail | security company. |
CCCF was replaced by a medium | security complex built next to the West Tennessee High |
CCCF was replaced by a medium | security complex built next to WTHSF. |
Y-12 National | Security Complex |
is the group that operates the Y-12 National | Security Complex, and a member of the Los Alamos Natio |
Protecting the Business: Software | Security Compliance (2008, John Wiley & Sons) |
The Social | Security component of the FICA tax is regressive, mean |
U Savannah server was replaced by FSF after a | security compromise. |
mpilers, program analysis, operating systems, | security, computer architecture, and high-performance |
For a | security concern, Android users are advised to downloa |
ation equipment, which was imposed because of | security concerns regarding gear supplied by Chinese c |
In 2005, the event was canceled out of | security concerns due to the large amount of visitors. |
o preserving political neutrality, safety and | security concerns were factors in the decision. |
RFC 1675 | Security Concerns for IPng |
e used to allow pedestrians and bicycles, but | security concerns after the September 11 attacks had i |
due to | security concerns related to elections, The match was |
n, arguing that since there were no peace and | security concerns raised by its neighbours, the questi |
cceptance tests at EMCC, but Northrop, citing | security concerns, refused to allow any EMCC employees |
Despite these | security concerns, TRUSTe has included WhenU's adverti |
He only came in to look at the | security concerns, but there is nothing like impoundin |
n national baseball team did not come, citing | security concerns. |
sion had been previously abandoned because of | security concerns. |
row inmates are held at Morgan County due to | security concerns. |
s in a self-destructing bomb pouch to satisfy | security concerns. |
ss how the statistics were derived because of | security concerns. |
s was discontinued because of operational and | security concerns. |
nd that additional drawdowns will be based on | security conditions in each part of the country. |
The operation's intent was to improve | security conditions in southern Baghdad and reduce the |
stated "the step was taken because of the bad | security conditions in other areas of Iraq, which make |
delays, lack of political will and difficult | security conditions prolonged the process. |
wo conferences per year - the Annual Computer | Security Conference and Exhibition and CSI SX. |
RSA | Security Conference, Cryptography and information secu |
Speech by Mark Abene, Hack in the Box | security conference, Kuala Lumpur, Malaysia, 2007. |
s work won the best paper award at the USENIX | Security conference. |
He gave various presentations on | security conferences like Black Hat or IT Underground. |
SecureWorld Expo, A series of regional IT | Security conferences offering education, CPE training |
rticipated in several local and International | security conferences. |
has authored several publications on national | security, conflict management, and foreign relations. |
adequate size (existing or proposed) and the | security considerations of providing a single target f |
Security constraints will be present, preventing users | |
inisterial sister-publications such as Public | Security Construction and People's Public Security. |
rtners; electrical engineering works design & | security consultancy was provided by R.A. Mojica & Par |
Special Services: | Security consultancy, Courier services, International |
He has been a | security consultant for several organizations, private |
In 1999, Chang was a | Security Consultant for AllAdvantage. |
ter contacted Mark Abene to recruit him for a | security consultant position. |
Neal was subsequently hired as a | security consultant by Drexel University and the Penn' |
It is also the area, where a | security consultant for British charity Save the Child |
e works for the city of Arlington, Texas as a | security consultant in preparation for the 2011 Super |
As a | security consultant, he presented seminars and appeare |
James Stanger is a writer, Web technologist, | security consultant, and open source advocate. |
ert M. Slade and Rob Slade, is an information | security consultant, researcher and instructor from No |
rnia, and worked as a freelance pentester and | security consultant. |
Dr. Herbert Hugh Thompson is an application | security consultant. |
nter is patrolled and secured by Professional | Security Consultants The Security Office is located in |
Many are also | security consultants, but not every security consultan |
of the MD-530 helicopters used by Blackwater | Security Consulting in Iraq are also operated through |
essional Services division, including network | security consulting and managed security services. |
Inc. is a technical, scientific and national | security consulting firm. |
Kingsoft Internet | Security contains anti-virus, anti-malware, a vulnerab |
Renew | security context |
Security context token created by a security token ser | |
Security context token created by one of the communica | |
Security context token created through negotiation/exc | |
pose of WS-SecureConversation is to establish | security contexts for multiple SOAP message exchanges, |
pecified by Bitfrost, but dynamic creation of | security contexts is required. |
S-Policy to allow the creation and sharing of | security contexts. |
As a result, Exelon terminated the | security contract of the Wackenhut security firm that |
lving a troubled multibillion-dollar Homeland | Security contract. |
l of the victims were working for an American | security contractor. |
distinguish between Afghan and international | security contractors. |
ork to consolidate Argentine beef quality and | security, contributing to the efficiency of productive |
$43.6 billion - Social | security contributions |
The Federal Route 77 was put under strict | security control by Malaysian army. |
f Afghanistan's deadliest regions have handed | security control to United States troops. |
gration with other systems typically involves | security control room plots of target position and con |
e units or to hand over large areas to Afghan | security control. |
ateway include trading partner management and | security control. |
Equality of Treatment (Social | Security) Convention, 1962 is an International Labour |
This article is about the computer | security convention. |
Western Hemisphere Institute for | Security Cooperation |
Task Forces/Joint Interagency Task Force, and | Security Cooperation Organizations. |
gned with the The NT Police Counter Terrorism | Security Coordination Unit (CTSCU) which was formally |
EDRi has a focus on privacy, | security, copyright, governance and freedom of speech. |
corporate finance and has published on social | security, corporate and personal taxation, mutual fund |
Garda World | Security Corporation (TSX: GW) is a private security f |
It is the Headquarters of Defence | Security Corps now; the place is also known as Burnass |
ined the Home Army and became a member of its | Security Corps. |
The Boston Pre-Release Center is a minimum | security correctional facility located on Canterbury S |
the John Morony Correctional Centre, a medium | security correctional centre for men (John Morony); th |
Washington Correctional Facility is a medium | security correctional facility that is located in Coms |
He was appointed BBC News' | security correspondent in 2004. |
Frank Gardner, journalist (BBC | Security Correspondent) |
rfurth also worked for ABC News as a national | security correspondent, specializing in arms control, |
He is currently the BBC's | Security Correspondent. |
f London, especially covering fire safety and | security, cost an additional £4.5m, and took three yea |
dgetary deficits swelled, as did large social | security cost overruns and the huge operating losses i |
Spokesman McDonald said the | Security Council took an important step by visiting Su |
He was President of the United Nations | Security Council during the war in Yugoslavia. |
The | Security Council reaffirmed Resolution 1373 (2001) and |
The | Security Council had considered a report of the Secret |
The | Security Council reaffirmed its commitment to the sove |
African members of the | Security Council condemned the actions of the Libyan r |
こんにちは ゲスト さん
ログイン |
Weblio会員(無料)になると 検索履歴を保存できる! 語彙力診断の実施回数増加! |
こんにちは ゲスト さん
ログイン |
Weblio会員(無料)になると 検索履歴を保存できる! 語彙力診断の実施回数増加! |