Secrecy

Results: 11054



#Item
701Ethics / Crime prevention / United States government secrecy / Computer security / Security clearance / Network security / Internet privacy / Privacy / Security / National security / Computer network security

company information © aql 2007 E&OE PRIVACY & SECURITY When choosing a partner to handle your communications requirements, including sensitive data sent via voice, SMS, fax or email, a prime

Add to Reading List

Source URL: www.aql.com

Language: English - Date: 2007-05-31 07:51:18
702Journalism sourcing / Secrecy / Non-disclosure agreement / Confidential / Flag / Ethics / Information sensitivity / Confidentiality

AGREEMENT ON THE INTERNATIONAL DOLPHIN CONSERVATION PROGRAM 10TH MEETING OF THE PARTIES LA JOLLA, CALIFORNIA (USA) 11 OCTOBER 2003

Add to Reading List

Source URL: www.iattc.org

Language: English - Date: 2011-05-17 17:33:43
703Government / Classified information / Data security / Information Security Oversight Office / National Archives and Records Administration / Declassification / United States Environmental Protection Agency / Executive Order 13526 / Information security / Security / National security / United States government secrecy

EPA Does Not Adequately Follow National Security Information Classification Standards

Add to Reading List

Source URL: fas.org

Language: English - Date: 2014-05-06 22:58:45
704Espionage / Secrecy / Information sensitivity / Security clearance / Executive agencies of the United Kingdom government / Criminal record / Classified information / Defence Business Services National Security Vetting / Vetting / Security / United States government secrecy / National security

Appendix 2 SECURITY CLEARANCE PROCEDURES AccessNI AccessNI is a Criminal History Disclosure Service within the Department of Justice in Northern Ireland. AccessNI commenced operations in April 2008 and operates in accor

Add to Reading List

Source URL: www.niauditoffice.gov.uk

Language: English - Date: 2015-01-08 10:24:35
705Classified information in the United States / Espionage / Secrecy / Security clearance / Single Scope Background Investigation / Special access program / National Agency Check with Local Agency Check and Credit Check / SAP AG / Polygraph / United States government secrecy / National security / Security

Reciprocal Recognition of Existing Personnel Security Clearances

Add to Reading List

Source URL: fas.org

Language: English - Date: 2014-05-06 23:07:50
706United States government secrecy / Data security / Sensitive Security Information / Sensitive but unclassified / Freedom of Information Act / Classified information / Information sensitivity / Security awareness / Vulnerability / Security / National security / Computer security

Control and Protection of "Sensitive Security Information"

Add to Reading List

Source URL: www.fas.org

Language: English - Date: 2014-05-06 23:09:11
707Bootstrapping / Secure multi-party computation / Cyberwarfare / Encryption / Security / Secrecy / Cryptography / Homomorphic encryption / Ciphertext

Bootstrapping BGV ciphertexts with a wider choice of p and q Emmanuela Orsini, Joop van de Pol, Nigel Smart Department of Computer Science University of Bristol

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2015-03-30 09:31:46
7089/11 Commission / Commissions / Security clearance / Central Intelligence Agency / Politics / Criticism of the 9/11 Commission / Saddam Hussein and al-Qaeda link allegations timeline / Government / United States government secrecy / Presidency of George W. Bush

First Interim Report of the National Commission on Terrorist Attacks Upon the United States Thomas H. Kean, Chair, and Lee H. Hamilton, Vice Chair July 8, 2003 BACKGROUND

Add to Reading List

Source URL: www.iwar.org.uk

Language: English - Date: 2008-11-19 07:57:37
709Electronic commerce / Ethics / Confidentiality / Journalism sourcing / Secrecy / Social Security number / Computer security / Information security / Security / Crime prevention / National security

Microsoft Word - Security and Confidentiality Checklist for University Offices

Add to Reading List

Source URL: registrar.sc.edu

Language: English - Date: 2009-10-26 16:30:59
710Human behavior / Deception / Magic / Microsoft Exchange Server / Secrecy / Culture / Cultural anthropology

1. OpenChange vs Magic I came to magic one year ago I was practicing while waiting for Samba to compile Gave me plenty of time to practice

Add to Reading List

Source URL: www.openchange.org

Language: English - Date: 2015-05-25 11:42:23
UPDATE