Search results

Jump to navigation Jump to search

Page title matches

  • #REDIRECT [[Authentication (information security)#Security token]]
    66 bytes (6 words) - 16:13, 6 May 2010
  • <!-- Text is transcluded from the Security (finance)/Definition subpage-->
    87 bytes (11 words) - 08:36, 22 February 2010
  • === BCPs relevant to email security === ...nd even controversial. Most of the IETF recommendations relevant to email security are found in a series of documents called Best Current Practices (BCPs).
    1 KB (200 words) - 17:37, 9 October 2009
  • <!-- Text is transcluded from the Asset backed security/Definition subpage-->
    90 bytes (12 words) - 05:08, 23 February 2010
  • ...Security Agency (NSA)''', formally the '''National Security Agency/Central Security Service''' is part of the [[United States Department of Defense]] and also In its name, national security was selected as deliberately vague and euphemistic; the very existence of t
    72 KB (10,689 words) - 21:46, 22 June 2024
  • ...f Homeland Security|Department of Homeland Security]] has provided '''Port Security Grants''' to ports within the [[United States of America]], to build [[fire The grants are made under the [[Maritime Transportation Security Act of 2002]].<ref name=PortSecurity2015/> The [[Federal Emergency Manageme
    9 KB (1,108 words) - 08:34, 6 March 2024
  • 81 bytes (10 words) - 09:47, 31 July 2010
  • ...nds dynamic DNS update even more than did IPv4 dynamic addressing, but DNS security features are needed to secure the updates. With convergence of communicatio DNS software and operations should follow the overall DNS security architecture (DNSSEC).<ref name=RFC4033>{{citation
    13 KB (2,037 words) - 16:22, 30 March 2024
  • 107 bytes (10 words) - 08:11, 4 May 2024
  • 300 bytes (47 words) - 13:47, 1 February 2009
  • #REDIRECT [[Information security]]
    34 bytes (3 words) - 23:06, 21 April 2010
  • 62 bytes (6 words) - 18:32, 18 April 2010
  • 34 bytes (4 words) - 02:58, 16 February 2009
  • #REDIRECT [[USCG National Security Cutter]]
    43 bytes (5 words) - 00:36, 17 April 2008
  • ...does have a world-class intelligence analysis capability in the [[Canadian Security Intelligence Service]]. ...were trained through an exchange program with the [[American]] [[National Security Agency]].
    2 KB (206 words) - 22:10, 22 June 2024
  • #REDIRECT [[United Nations Security Council]]
    45 bytes (5 words) - 13:22, 16 February 2009
  • 146 bytes (22 words) - 10:43, 17 June 2011
  • Brief description of email security problems and solutions.
    95 bytes (11 words) - 19:08, 23 September 2009
  • In [[information security]], the processes of [[identification, authentication and credentialing]] ar *Something you '''have''' (e.g., a [[key (lock)]], [[security token]] or credit card)
    2 KB (292 words) - 14:55, 20 May 2010
  • #REDIRECT [[United Nations Security Council]]
    45 bytes (5 words) - 13:23, 16 February 2009

Page text matches

  • ...ited Nations Security Council]] has passed close to 2000 '''United Nations Security Council resolutions'''. | [[United Nations Security Council Resolution 1267|1267]] ||
    623 bytes (72 words) - 07:29, 9 September 2011
  • ...[[National Security Network]]; Guiding Coalition, [[Project for National Security Reform]]; Democratic presidential candidate; General, [[United States Army]
    449 bytes (53 words) - 11:52, 19 March 2024
  • ...p, Atlantic Council; President and CEO, [[Business Executives for National Security]]
    206 bytes (23 words) - 11:52, 19 March 2024
  • ...f Information Security for [[Italy|Italian]] intelligence, responsible for security clearances and serving as the secretariat for the [[CISR]]
    190 bytes (23 words) - 19:49, 4 July 2009
  • ...tre on Global Health Security; formerly Assistant Director-General, Health Security and Environment, [[World Health Organization]]
    203 bytes (23 words) - 14:58, 11 September 2009
  • ...irs 1995-1996; study group for the [[Hart-Rudman Commission]] on national security requirements, 1998-2001
    431 bytes (50 words) - 20:46, 22 August 2009
  • ...] (1998-2002). NSC Senior Director for Combating Terrorism at the National Security Council (2002-3)
    558 bytes (65 words) - 04:34, 21 March 2024
  • ==Social Security Administration== ...tory/collectalt.html Social Security History: Arthur J. Altmeyer]," Social Security Administration.
    1 KB (134 words) - 18:38, 8 June 2010
  • ...xecutive Director of the Security Studies Program and Center for Peace and Security Studies
    431 bytes (55 words) - 14:30, 22 December 2009
  • ...ith this transfer, it must be done over. Also, the simple case provides no security either for access to the computers or to the file information as it moves t ==Security==
    905 bytes (126 words) - 11:04, 11 July 2010
  • {{r|Information Security}} {{r|Director, National Security Agency}}
    1 KB (138 words) - 21:46, 22 June 2024
  • ...ies, Chinese foreign policy, strategic culture, statecraft, and East Asian security in theory and practice; formerA djunct Assistant Professor and Instructor i
    460 bytes (56 words) - 15:36, 13 October 2009
  • ...ity Studies]]; Partner at James & Hoffman and litigator for the [[National Security Archive, George Washington University]]
    204 bytes (26 words) - 18:33, 18 November 2009
  • *[http://www.un.org/Docs/sc/ UN Security Council] — official site **[http://www.un.org/Docs/sc/unsc_background.html UN Security Council – Background]
    1 KB (207 words) - 07:38, 12 February 2009
  • The position of having sold a borrowed [[security (finance)|security]] or [[derivative]] (usually with the intention of buying it back and retur
    223 bytes (34 words) - 04:56, 4 December 2012
  • ==<div id="Father"></div>Who was "The 'Father' of Social Security?"== ...d "this title less than many others." Witte pointed out that the [[Social Security Act]] was a collaborative undertaking:
    2 KB (240 words) - 19:47, 31 May 2010
  • {{r|Computer security||**}} {{r|Communications security||**}}
    316 bytes (34 words) - 10:56, 27 February 2010
  • The primary high-security [[cryptography|cryptographic]] [[communications security]] machine of [[Nazi Germany]]. Unknown to the Germans, it had been substant
    321 bytes (39 words) - 10:20, 14 June 2010
  • *''Aging Gracefully: Ideas to Improve Retirement Security in America'' (2006) *''Saving Social Security: A Balanced Approach'' (2004)
    262 bytes (28 words) - 16:17, 20 September 2009
  • ...heft or corruption, or the preservation of availability, as defined in the security policy. [[Information assurance]] discusses a related topic - how "sure" so ...ive requirements to positive enforceable rules. For this reason, computer security is often more technical and mathematical than some [[computer science]] fie
    2 KB (264 words) - 08:25, 22 June 2024
View ( | ) (20 | 50 | 100 | 250 | 500)