Insecurity

Results: 1427



#Item
771United States Department of Agriculture / Food security / Security / Hunger / Food / Health / Supplemental Nutrition Assistance Program / Food and drink / Federal assistance in the United States / Humanitarian aid

FSP Nutrition Prescription for Better Health Food Insecurity Screening “Please let me know if either of these

Add to Reading List

Source URL: www.childrenshealthwatch.org

Language: English - Date: 2014-07-23 16:39:45
772Timber industry / Lumber / Land use / Land management / Logging / Stumpage / Forestry

The Legal Perspective By Jeff Waatainen, LLB, MA, BA (Hons) The Inherent Insecurity of Log Purchase Transactions

Add to Reading List

Source URL: www.abcfp.ca

Language: English - Date: 2014-11-07 18:19:05
773Earth / Eastern Province /  Sierra Leone / Economic Community of West African States / Sierra Leone / Ebola virus disease / Kailahun District / Freetown / Nzérékoré / World food price crisis / Geography of Africa / Africa / Food politics

Fighting Hunger Worldwide Special mVAM Regional Bulletin #1: November 2014 Guinea, Liberia and Sierra Leone Food insecurity remains high in spite of the harvest

Add to Reading List

Source URL: reliefweb.int

Language: English - Date: 2014-11-25 15:56:44
774Least developed countries / Member states of the African Union / Member states of the United Nations / Horn of Africa / Food politics / Food security / World food price crisis / Famine / Sudan / Africa / Development / Earth

EAST AFRICA Food Security Outlook October 2014 to March 2015 Food insecurity will ease after harvests and October to December rains Projected food security outcomes, October to

Add to Reading List

Source URL: reliefweb.int

Language: English - Date: 2014-11-19 22:17:15
775Computer security / Electronic warfare / Hacking / Military technology / Stuxnet / Cooperative Cyber Defence Centre of Excellence / Computer insecurity / Cyber-security regulation / Department of Defense Strategy for Operating in Cyberspace / Cyberwarfare / Cybercrime / Computer crimes

Cyberspace: An Assessment of Current Threats, Real Consequences and Potential Solutions Alberto Muti and Katherine Tajer with Larry Macfaul

Add to Reading List

Source URL: remotecontrolproject.org

Language: English - Date: 2014-10-10 11:53:03
776Ninawa Governorate / Assyria / Ethnic groups in Iraq / Nineveh plains / Minorities in Iraq / Iraqi Kurdistan / Mosul / Shabak people / Iraq / Asia / Fertile Crescent / Politics of Iraq

CREATING A NINEVEH PLAIN LOCAL POLICE FORCE: OVERCOMING ETHNO-RELIGIOUS MINORITY INSECURITY Iraq Sustainable Democracy Project

Add to Reading List

Source URL: www.assyriacouncil.eu

Language: English - Date: 2014-08-23 05:51:20
777Food and drink / Development / Health / Nutrition / Food security / Urban agriculture / WIC / Supplemental Nutrition Assistance Program / Hunger / Federal assistance in the United States / United States Department of Agriculture / Humanitarian aid

Food Insecurity among Children in Massachusetts

Add to Reading List

Source URL: www.childrenshealthwatch.org

Language: English - Date: 2013-12-18 09:14:16
778Least developed countries / Member states of the African Union / Member states of the United Nations / Horn of Africa / Food politics / Food security / World food price crisis / Famine / Sudan / Africa / Development / Earth

EAST AFRICA Food Security Outlook October 2014 to March 2015 Food insecurity will ease after harvests and October to December rains Projected food security outcomes, October to

Add to Reading List

Source URL: www.fews.net

Language: English - Date: 2014-11-19 17:40:24
779Food and drink / Food politics / Poverty / Nutrition / Sub-Saharan Africa / Food security / World food price crisis / Malnutrition / Famine / Development / Humanitarian aid / Economics

2 How Food Insecurity Persists amid Abundant Resources AFRICA HUMAN DEVELOPMENT REPORT 2012

Add to Reading List

Source URL: www.afhdr.org

Language: English - Date: 2012-05-12 05:16:12
780Computing / Malware / Vulnerability / Network security / Evasion / FireEye /  Inc. / Computer insecurity / Intrusion prevention system / Advanced persistent threat / Computer network security / Cyberwarfare / Computer security

2 How Does Advanced Malware Get Past Traditional Barriers? Addressing Advanced Targeted Threats

Add to Reading List

Source URL: alliance.cisecurity.org

Language: English - Date: 2013-12-10 16:01:41
UPDATE