and Security Technologies

Results: 1110



#Item
481Climate change policy / Environment / Climate change / American Clean Energy and Security Act / Carbon Pollution Reduction Scheme / Technology / Sustainable energy / Energy development

What if Australia says Yes to making big polluters pay for what they pump into our skies? Then we could reduce carbon pollution and invest in new, cleaner technologies. And that means new industries and more

Add to Reading List

Source URL: www.nuw.org.au

Language: English - Date: 2012-12-10 18:47:11
482Aftermath of the September 11 attacks / Transportation Security Administration / Crime prevention / Measuring instruments / Full body scanner / Airport security / Baggage handling system / Visible Intermodal Prevention and Response team / Covenant Aviation Security / Security / Transportation in the United States / Aviation security

Microsoft Word - TSA Testimony[removed]Hoggan-Checkpoint Technologies-Final

Add to Reading List

Source URL: www.tsa.gov.

Language: English - Date: 2012-10-16 06:45:44
483Computer security / ESET NOD32 / BitDefender / Avast! / ESET / BullGuard / AVG Technologies / Webroot Software / Avira / Antivirus software / Software / System software

Virus & Malicious Code Anti-virus Software, Malicious Code Detection Tools and Internet Security Suites Anti-virus software and malicious code detection tools are commonly used to protect information systems from malicio

Add to Reading List

Source URL: www.infosec.gov.hk

Language: English - Date: 2014-07-22 05:05:37
484Computer security / Data security / National security / United States government secrecy / Information sensitivity / Classified information / Information and communication technologies in education / Privacy / Classified information in the United States / Security / Information / Ethics

Using Classified and/or Sensitive information in Non‑production Environments

Add to Reading List

Source URL: www.cwd.act.gov.au

Language: English - Date: 2014-11-24 22:07:44
485Technology / Concurrent computing / Data center / Information security / Information and communications technology / Information and communication technologies in education / Information Technology Infrastructure Library / Computing / Information technology / Communication

DOC Document

Add to Reading List

Source URL: www.protectivesecurity.gov.au

Language: English - Date: 2014-12-07 22:52:10
486National security / Computer security / Data security / Information technology / Information sensitivity / Classified information / Privacy / Personally identifiable information / Information and communication technologies in education / Security / Ethics / Information

UNCLASSIFIED UNCLASSIFIED ICT Document No. WhoG-126 Using Classified and/or Sensitive Information in Nonproduction Environments

Add to Reading List

Source URL: www.cwd.act.gov.au

Language: English - Date: 2014-11-24 22:09:27
487Molecular biology / Genetic engineering / Emerging technologies / Environmental issues / Energy crops / Genetically modified food / Genetically modified organism / Biotechnology / Food security / Biology / Food and drink / Agriculture

Microsoft Word - What people know about genetically modified foods.doc

Add to Reading List

Source URL: archive.industry.gov.au

Language: English - Date: 2005-04-07 00:46:00
488Information and communications technology / Information and communication technologies in education / Password / Information technology / Communication / Technology

ICT ACCEPTABLE USE POLICY 1 Purpose This Policy provides the framework for the use and the security of AFTRS’ Information and Communications

Add to Reading List

Source URL: www.aftrs.edu.au

Language: English - Date: 2015-02-24 23:14:24
489Public safety / United States Department of Homeland Security / Cyber-security regulation / Computer crimes / Critical infrastructure protection / Computer security / National Cyber Security Division / International Multilateral Partnership Against Cyber Threats / National security / Security / Cyberwarfare

ON: Industry Perspectives on the President’s Cybersecurity Information-Sharing Proposal TO: House Committee on Homeland Security Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies DATE:

Add to Reading List

Source URL: docs.house.gov

Language: English - Date: 2015-03-03 19:33:01
490World Wide Web / EbXML / Universal Description Discovery and Integration / SOAP / WS-Reliability / Web Services Description Language / Service-oriented architecture / WS-Security / Web Services Discovery / Computing / Web services / Web standards

Special Issue Advanced Technologies Driving “Dynamic Collaboration” — Featuring System Technologies Dynamic Collaboration of Businesses Using Web Services By Satoru FUJITA* This paper describes the trends of Web s

Add to Reading List

Source URL: www.nec.com

Language: English - Date: 2013-10-21 08:33:28
UPDATE