Search results
Jump to navigation
Jump to search
Page title matches
- The '''Security Service''', also known historically if incorrectly as '''MI5''', is the ci314 bytes (44 words) - 08:11, 4 May 2024
- ...will be, or are used. It complements, but does not replace, other forms of security. {{seealso|Intelligence cycle security}}3 KB (427 words) - 15:22, 31 May 2024
- <!-- Text is transcluded from the Security (finance)/Definition subpage-->87 bytes (11 words) - 08:36, 22 February 2010
- 188 bytes (28 words) - 10:54, 27 February 2010
File:Security scope.png (1,466 × 1,029 (53 KB)) - 19:57, 11 March 2022- #REDIRECT [[Security Service]]30 bytes (3 words) - 19:51, 5 June 2008
- #REDIRECT [[Domain Name System security]]41 bytes (5 words) - 08:26, 3 October 2008
- 12 bytes (1 word) - 19:51, 5 June 2008
- #REDIRECT [[Talk:Security Service]]35 bytes (4 words) - 19:51, 5 June 2008
- ...that information be generated by computers or not. It complements computer security, which protects information in computers.650 bytes (95 words) - 16:22, 30 March 2024
- ...is no longer any sharp distinction between communications and information security. In a simpler world, once a user could gain access to a computer, all resou ==The Security Process==13 KB (2,000 words) - 16:21, 30 March 2024
- {{Subgroup|Security|Computers|Military|Engineering}}52 bytes (5 words) - 13:22, 27 February 2010
- #REDIRECT [[Authentication (information security)#Security token]]66 bytes (6 words) - 16:13, 6 May 2010
- 62 bytes (6 words) - 08:38, 13 April 2010
- ...ion", in the sense of "what makes a communication secure". Communications security fell out from pure editing I was doing in cryptography. ...ation security" is an even better title, perhaps reserving "communications security" for [[cipher#bulk encryption]], [[spread spectrum]]/[[frequency agility]],4 KB (594 words) - 20:03, 24 October 2008
- {{Security Subgroup}} {{R|Internet Protocol security architecture}}1 KB (122 words) - 01:39, 2 March 2010
- 12 bytes (1 word) - 11:22, 27 February 2010
- '''Regional security''', in [[international relations]], that focuses on less than global soluti1 KB (151 words) - 23:14, 17 September 2010
- ...heft or corruption, or the preservation of availability, as defined in the security policy. [[Information assurance]] discusses a related topic - how "sure" so ...ive requirements to positive enforceable rules. For this reason, computer security is often more technical and mathematical than some [[computer science]] fie2 KB (267 words) - 05:49, 8 April 2024
- '''Social security''' is a generic term, most commonly used in the USA and UK, referring to di ...Altmeyer]], The Formative Years of Social Security: A Chronicle of Social Security Legislation and Administration, 1934-1954." Madison: University of Wisconsi2 KB (269 words) - 19:21, 8 June 2010
Page text matches
- ...ited Nations Security Council]] has passed close to 2000 '''United Nations Security Council resolutions'''. | [[United Nations Security Council Resolution 1267|1267]] ||623 bytes (72 words) - 07:29, 9 September 2011
- ...[[National Security Network]]; Guiding Coalition, [[Project for National Security Reform]]; Democratic presidential candidate; General, [[United States Army]449 bytes (53 words) - 11:52, 19 March 2024
- ...p, Atlantic Council; President and CEO, [[Business Executives for National Security]]206 bytes (23 words) - 11:52, 19 March 2024
- {{r|Security}} ===Transmission security===697 bytes (85 words) - 11:30, 27 February 2010
- ...tre on Global Health Security; formerly Assistant Director-General, Health Security and Environment, [[World Health Organization]]203 bytes (23 words) - 14:58, 11 September 2009
- ...f Information Security for [[Italy|Italian]] intelligence, responsible for security clearances and serving as the secretariat for the [[CISR]]190 bytes (23 words) - 19:49, 4 July 2009
- ...irs 1995-1996; study group for the [[Hart-Rudman Commission]] on national security requirements, 1998-2001431 bytes (50 words) - 20:46, 22 August 2009
- ...] (1998-2002). NSC Senior Director for Combating Terrorism at the National Security Council (2002-3)558 bytes (65 words) - 04:34, 21 March 2024
- ==Social Security Administration== ...tory/collectalt.html Social Security History: Arthur J. Altmeyer]," Social Security Administration.1 KB (134 words) - 18:38, 8 June 2010
- ...xecutive Director of the Security Studies Program and Center for Peace and Security Studies431 bytes (55 words) - 14:30, 22 December 2009
- ...ith this transfer, it must be done over. Also, the simple case provides no security either for access to the computers or to the file information as it moves t ==Security==905 bytes (126 words) - 11:04, 11 July 2010
- ...ies, Chinese foreign policy, strategic culture, statecraft, and East Asian security in theory and practice; formerA djunct Assistant Professor and Instructor i460 bytes (56 words) - 15:36, 13 October 2009
- ...ity Studies]]; Partner at James & Hoffman and litigator for the [[National Security Archive, George Washington University]]204 bytes (26 words) - 18:33, 18 November 2009
- *[http://www.un.org/Docs/sc/ UN Security Council] — official site **[http://www.un.org/Docs/sc/unsc_background.html UN Security Council – Background]1 KB (207 words) - 07:38, 12 February 2009
- The position of having sold a borrowed [[security (finance)|security]] or [[derivative]] (usually with the intention of buying it back and retur223 bytes (34 words) - 04:56, 4 December 2012
- =Committee on Economic Security= ...ress on . It was known originally as The President's Committee on Economic Security, but has long been known by the shorter title. The committee was appointed543 bytes (80 words) - 14:32, 2 February 2023
- == Job security at the circus ==277 bytes (44 words) - 22:10, 14 August 2010
- ==<div id="Father"></div>Who was "The 'Father' of Social Security?"== ...d "this title less than many others." Witte pointed out that the [[Social Security Act]] was a collaborative undertaking:2 KB (240 words) - 19:47, 31 May 2010
- {{r|Computer security||**}} {{r|Communications security||**}}316 bytes (34 words) - 10:56, 27 February 2010
- The primary high-security [[cryptography|cryptographic]] [[communications security]] machine of [[Nazi Germany]]. Unknown to the Germans, it had been substant321 bytes (39 words) - 10:20, 14 June 2010