「Security」の共起表現一覧(1語右で並び替え)21ページ目

Security

<前へ 1 2 .... 12 13 14 15 16 17 18 19 20 21 22 次へ>

1語右で並び替え

該当件数:4206件

  • “The state of food security today is unfortunately trending in the wrong
  • ogramme is one of the major threats to global security today.
  • her groups may deliver products that act as a Security Token Service, or STS.
  • Support for X.509 security tokens and username/password tokens
  • , or grid-based one-time passwords, including security tokens
  • the formats of the messages used to request security tokens and the responses to those messages.
  • ary training was way to poor and the level of security too.
  • The World Summit on Food Security took place in Rome, Italy between 16 and 18 N
  • Ettercap is a free and open source network security tool for man-in-the-middle attacks on LAN.
  • lib is an open source cross-platform software security toolkit library.
  • er and Samuel Johnson to produce the computer security tools SATAN and The Coroner's Toolkit.
  • It is ranked number 11 in the Top 100 Network Security Tools list released by insecure.org in 2006.
  • ny focused on password recovery solutions and security tools.
  • iruses and extended work on other information security topics like content security, Wireless LAN se
  • Security Torx driver
  • 1999: No Security Tour - Rolling Stones
  • olling Stones during a stint of their 1999 No Security tour.
  • In June 2007, Kingsoft Internet Security Traditional Chinese version was launched in H
  • Peace and security: traditional themes of the G8
  • y neighbors opposed it, citing concerns about security, traffic and parking, and developers eventual
  • is to provide relevant and credible Maritime Security Training and Operational Testing and Evaluati
  • @stake academy members formed the information security training company "Safelight Security Advisors
  • elected marines must then undergo specialized security training at the Marine Corps Security Forces
  • Hostile Environment Security Training (5 Days)
  • the Quality of Service requirements, such as Security, Transactions and the use of Reliable Messagi
  • Afghan President Hamid Karzai called for full security transfer in 2014.
  • centers, Army Staff, NATO and Multi-National Security Transition Command.
  • nate to Major General Eaton and the Office of Security Transition (OST), but in June 2004, the Multi
  • Oxford Analytica, for which he covers Russian security, transnational crime and terrorism issues.
  • er is also home to the Department of Homeland Security, Transportation Security Lab, and the United
  • Chief of Security: Travis Bobbitt (Assistant to Warden of Secur
  • Yale University (Avalon Project) - Security Treaty Between the United States and Japan
  • her post-USSR states joined in the Collective Security Treaty Organisation (CSTO).
  • Tokyo, Japan and markets Trend Micro Internet Security, Trend Micro Worry-Free Business Security, Of
  • The KGB Security Troops were the uniformed security troops of
  • The KGB's Security Troops, which numbered about 40,000 in 1989,
  • e said India does not need the distraction of security troubles at a time when it is starting to see
  • in's publications cover software engineering, security, trusted computing in general and formal meth
  • FirstLine Transportation Security, TSA partner operating screening checkpoints
  • olidated Brig (NAVCONBRIG CHASN), is a medium security U.S. military prison.
  • Department of Homeland Security, U.S. Coast Guard
  • The expansion of social security under John Curtin was of such significance th
  • nko, Chebrikov was appointed head of internal security under Mikhail Gorbachev.
  • y of the United States Department of Homeland Security under the Under Secretary of Homeland Securit
  • Environment Study Unit - Environmental Security Unit investigators are available to assist mu
  • was one of the first two inmates of the High Security Unit (HSU), a high-security isolation unit in
  • male medical officer to be assigned to a Port Security Unit (PSU).
  • ore prisoners followed them and attacked jail security unit personnel.
  • The minimum security unit has an annual budget of $7 million.
  • The Arkansas Department of Correction Maximum Security Unit is 25 miles (40 km) north of central Pin
  • e group, and are stopped by a pair of Airport Security Unit officers.
  • Tsui applied three times to join the Airport Security Unit, but failed.
  • The OSP is more restrictive than a maximum security unit, a "highly restrictive form of solitary
  • from Grenz-Division Trier, which was a border security unit.
  • nited States Penitentiary, Beaumont is a high security United States Penitentiary in unincorporated
  • Air Force (retired), Director, Civil Aviation Security, United States Department of Transportation
  • anged its name to Ittihad Alamn Alaam (Public Security United) in 2007.
  • mer of 1995 and is one of the largest maximum security units in Texas housing approximately 3600 off
  • She left her mark by making social security universal and improving health care, educatio
  • e Bolivarian National Police and Experimental Security University.
  • officer and head of Joseph Stalin's personal security until his arrest and execution.
  • are sealed up, and will be kept in a place of security until proper persons are appointed to examine
  • s then responsible for the Oscars' safety and security until the awards ceremony.
  • Update", "Office X Security Update", "Office X 10.1.8
  • ers automatically began downloading Microsoft security updates for Windows without the users' consen
  • ons in January 2010, with several bug-fix and security updates appearing later in the year.
  • Microsoft stopped providing security updates for Windows NT 4.0 Workstation on 30
  • In 2006 Low Newton underwent a security upgrade to become a Category A prison holding
  • e included new turnstiles, ticket offices and security upgrade.
  • The airport received $183,578 in funds for security upgrades in 2006.
  • ic entrance is though the annex due to recent security upgrades.
  • he African Union's commissioner for peace and security urged the U.N. Security Council to approve of
  • The invention is still in worldwide hotel security use under the brand VingCard.
  • The stampede was triggered by club security using pepper spray to break up a fight.
  • A computer security utility going by the name GetAdmin was releas
  • anjaweed' seem to be taking advantage of huge security vacuums on the Chad-Sudan border."
  • Meanwhile, a green security van drives past the window.
  • The TORX head's security variant also has such a pin for the same reas
  • hat had been modified to look like an airport security vehicle through a security checkpoint up to o
  • .A, was discovered on October 30, 2007 by Mac Security Vendor Intego.
  • A security version of the Allen head includes a pin in t
  • my Camp's reputation and it received numerous security vest orders as a result.
  • It is now a well known provider of security vests in London even though the original aim
  • HSBC's security video recordings demonstrated later that secu
  • A security video taken from the high school shows her wa
  • Security: Voice Print, OMA DRM 1.0
  • de the Act anent Peace and War and the Act of Security void, and they were formally repealed in Dece
  • as," with William C. Wohlforth, International Security, Vol.
  • iosecurity," with Kendall Hoyt, International Security, Vol. 28, No. 3: 123-148, Winter 2003/04.
  • with William C. Wohlforth, International Security, Vol. 30, No. 1, Summer 2005.
  • lance," with William Wohlforth, International Security, Vol. 30, No. 3, Winter 2005/06.
  • ncing for child pornography convicts, serious security vulnerabilities in airport security and the a
  • y states a method of contacting vendors about security vulnerabilities found in their products.
  • As of 2009-06-11, no new security vulnerabilities have been reported by Secunia
  • It provides information about security vulnerabilities and aids in penetration testi
  • All security vulnerabilities in software are the result of
  • lementation of floating-point arithmetic, and security vulnerabilities.
  • mers with the ability to test PL/SQL code for security vulnerabilities.
  • technically sophisticated exploits to public security vulnerabilities.
  • The worm was made possible by a software security vulnerability in SQL Server first reported by
  • Cross-site tracing (XST) is a network security vulnerability exploiting the HTTP TRACE metho
  • begins with the discovery of a potential security vulnerability or exposure
  • te presentation at OSCMS 2007, he presented a security vulnerability in each of the projects represe
  • This bug was considered a security vulnerability because malicious web pages cou
  • al Internet protocol, its use is considered a security vulnerability.
  • The security wall was breached on several occasions, thoug
  • were give to people whom the Yemeni Political Security wanted to send to Europe from Yemen.
  • ernational support in restoring stability and security was essential for the well-being of the peopl
  • In February 2009, TrustPort PC Security was tested by PC Security Labs, and was award
  • The first issue of People's Public Security was published on 30 January 1956.
  • The Secretary of Safety and Security was established in 1986 to provide greater ov
  • Security was tightened in Britain, France and Germany.
  • His proposal to privatize Social Security was championed by the George W. Bush administ
  • d on through the rest of 1971, insisting that security was the paramount issue.
  • oth women and children as threats to national security was invalid.
  • Security was of paramount importance.
  • Security was increased, but was removed soon after.
  • Privacy and security was safeguarded through failure and through e
  • Security was provided by the Armed Police Liaoning Con
  • The primary service of security was provided as a person on location.
  • 's findings confirm Buchanan's view, physical security was tightened at the Palace of Holyroodhouse.
  • State Security was dissolved on February 1, 1990.
  • In 2003, the Ministry of Public Safety and Security was renamed the Ministry of Community Safety
  • e was appalled at the conditions, saying that security was only being maintained by an "expensive mu
  • Hotel security was called to his room at 6:00 AM and discove
  • The High-Level Conference on World Food Security was a conference held in June 2008, under the
  • Security was bolstered by a deep ditch on the north si
  • Moezzin added that government security was always present around the university at t
  • The average income from Social Security was $11,524.
  • His record on national defense and homeland security was more centrist.
  • Blatz proposed that the need for security was a normal part of personality, as was the
  • of the editorial committee of People's Public Security was the then Vice-Minister for Public Securit
  • Munich Massacre at the 1972 Summer Olympics, security was tight for the 1976 games.
  • Security was a concern due to turmoil over the issue o
  • A year later, the responsibility for social security was added to her portfolio and she was appoin
  • In the wake of the thefts security was tightened across all Royal Ordnance Facto
  • Its security was an important factor in saving American li
  • 1996: Core Security was founded in Buenos Aires, Argentina.
  • Security was a priority.
  • Sabri continued onto Cairo, Egypt, where his security was guaranteed by the Egyptian government.
  • Security was complete.
  • Social security was reunited with the portfolio of labour, wh
  • GE Security was a division of General Electric Inc's GE E
  • Police security was put up around the Beijing liaison office
  • Global security watch Turkey: A reference handbook.
  • the personal information in a reasonable and security way.
  • To those who seek peace and security: We support you.
  • already put in place extra measures like, in security, we have improved greatly since the attacks.
  • He identified some key security weaknesses in the Domain Name System; this an
  • Homes that appear to have security weaknesses or security-lax owners are targete
  • While at @stake he looked for security weaknesses in software and led the developmen
  • In 2007 the University's Campus Watch security were called to remove the group.
  • cluded that these accusations by the national security, were exaggerated and based on outdated infor
  • istently showed that the economy and national security were the Coalition's strong areas.
  • On April 7, 1985, Fonseca and his security were located in Puerto Vallarta by the Mexica
  • ted as Director of Inmate Programs at minimum security Westmorland Institution in Dorchester.
  • s the lead author of the book "Foundations of Security: What Every Programmer Needs To Know." (ISBN
  • h people who would lose a sense of control or security when facing danger and the threat of death.
  • serve in the White House Office of Cyberspace Security where he was a staff member of the National S
  • sition at the Department of Health and Social Security, where he remained until 1988, becoming Minis
  • ical or economic matters relating to national security; which includes defense against transnational
  • wned schools and the order's buy-in to Social Security, which became available in 1972.
  • s the establishment of the Office of Homeland Security, which following Congress' approval would bec
  • This event was preceded by high-intensity security, which included fastening down manhole covers
  • Mandil is the author of a report on energy security, which was commissioned by the French Preside
  • Some say the move is necessary for security while others say it is religious discriminati
  • e Egyptian authorities a guarantee of Sabri's security while in Egypt.
  • He has written security whitepapers with ex-Google CIO Douglas Merril
  • the 'Naagar - people in charge of border security, who guarded the city wall and distant fortre
  • Order, work and security will be reborn."
  • Units of SB were re-assigned under the Security Wing (Department B) - Crime and Security.
  • themselves as part of "Islamic Response", the security wing of the "National Islamic Resistance" 192
  • ous prisons in France, with both VIP and high security wings.
  • Proxim's Tsunami MP.11 HS (High Security) wins the 2008 Best Products and Services Awa
  • ought that is going to get national peace and security with the power of Buddhism is called “making
  • "India and Pakistan" (With Achin Vanaik) In: Security with Nuclear Weapons New York, Oxford Univers
  • The company's vision is to upgrade video security with 21st century technology used by the Inte
  • Diamond wrote a book on Social Security with Peter R. Orszag, President Obama's forme
  • research in the wide area of application security with special focus on a holistic approach to
  • rticipated in the development of intelligence security with NATO and the EU, where he invited other
  • the office subsumed the Office of Information Security within the Office of Information Security and
  • “First thing that we expected is (improved) security within the campaign period.
  • ce keeping force to achieve a stable level of security within the country.
  • le guards are on duty for 24 hours to provide security within the hostels and male guards patrol all
  • Police have increased security within the nearby Pakistani capital of Islama
  • llion in additional funds to support national security work carried out in New Mexico
  • There is no mention of Public Security Work Bulletin in known secondary sources.
  • vice, law enforcement experience, or civilian security work experience.
  • In security work, a tiger team is a specialized group tha
  • He's worked for Rover (left in 1998) done security work, worked at the Hippodrome and probably b
  • with the London gay scene as just part of his security work.
  • The person that told me this was a former security worker at the retail store K-Mart.
  • ed different positions in the National Social Security Workers Union (SNTSS) including secretary gen
  • ion S-63 developed by the IHO Data Protection Security Working Group is used to commercially encrypt
  • (Associated Student Body), the Mock National Security Workshop, amongst others.
  • Federated security: WS-Trust, WS-Privacy, WS-Federation, WS-Secu
  • (head of GUGB) - Commissar 1st rank of State Security Yakov Agranov
  • ed attention by performing at several maximum security youth facilities.
  • A perimeter security zone was installed around the facility in 198
  • At present it is in the High Security Zone declared by the security forces of Sri L
<前へ 1 2 .... 12 13 14 15 16 17 18 19 20 21 22 次へ>