Secure environment

Results: 679



#Item
101Jus ad bellum / Law / International humanitarian law / War / Ethics / Public international law / Laws of war / International relations / International law

Promoting Cooperative Solutions for Space Security International Humanitarian Law: Is It Sufficient for Space Environment? Ben Baseley-Walker, Legal and Policy Advisor, Secure World Foundation

Add to Reading List

Source URL: swfound.org

Language: English - Date: 2010-11-05 15:16:12
102Data security / Computer network security / Crime prevention / National security / Information security management system / Information security / Threat / Vulnerability / FIPS 140-2 / Security / Computer security / Cyberwarfare

The ISM-Benchmark and its effects on secure business environment (ISM-Benchmark = Information Security Management Benchmark) January 09, 2009

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2013-06-13 01:10:15
103Low-carbon economy / Climatology / Energy policy / Energy economics / Carbon dioxide / Renewable energy / Energy development / Sustainable energy / Greenhouse gas / Environment / Technology / Climate change policy

Objectives Global: Safeguard access to modern energy for all Global: Secure minimum supply of 500kWh per capita and year, rising to more than 700kWh by 2050 Global: Ensure expenditure to meet the most elementary energy

Add to Reading List

Source URL: www.wbgu.de

Language: English - Date: 2010-11-29 08:52:12
104Computing / Sudo / Su / OTPW / Environment variable / Command-line interface / Privilege / Secure Shell / Umask / System software / Software / System administration

SUDO(8) OpenBSD System Manager’s Manual SUDO(8)

Add to Reading List

Source URL: www.sudo.ws

Language: English - Date: 2014-01-06 13:00:43
105Backup software / Acronis Secure Zone / Acronis True Image / Acronis / Backup / Windows Recovery Environment / Software / Computing / Microsoft Windows

DATASHEET ACRONIS® BACKUP FOR PC BEST BACKUP FOR LAPTOPS OR DESKTOPS Acronis Backup for PC is built around state-of-the-art imaging technology, allowing you to create a disk-image backup, or

Add to Reading List

Source URL: acronis.cz

Language: English - Date: 2014-09-26 07:29:31
106Disability / Caregiver / Homelessness / Sense / Developmental disability / Schizophrenia Fellowship of NSW / Carers rights movement / Health / Medicine / Family

Care, Accommodation and Transition Services Every young person has the right to a secure, safe and with immediate needs such as food, clothing and medical supportive home environment – homelessness or separation

Add to Reading List

Source URL: www.unitedsynergies.com.au

Language: English - Date: 2014-08-31 21:34:33
107Git / Authentication / Secure Shell / Software / Computer programming / Computing

Choosing an environment Authentication and access control Workflows Git in the enterprise Charles Bailey

Add to Reading List

Source URL: accu.org

Language: English - Date: 2012-05-09 02:40:18
108Computer security / Windows NT / Windows Server / Log analysis / Event Viewer / Microsoft Servers / Event data / Windows / System Center Operations Manager / Software / System software / Computing

DATASHEET Event Log Management for Security and Compliance Keeping track of user and administrator activity is at the heart of keeping your environment secure and complying with various IT regulations. Historically, mon

Add to Reading List

Source URL: ppn.com.hk

Language: English - Date: 2012-09-29 00:22:32
109Marxist theory / Poverty reduction / Food security / Land law / Agrarian reform / Land titling / International Institute for Environment and Development / Economics / Environment / Economic history / Land management / Land reform

LAND IN AFRICA Market asset or secure livelihood? Proceedings and summary of conclusions from the Land in

Add to Reading List

Source URL: pubs.iied.org

Language: English - Date: 2007-09-04 03:41:59
1106to4 / 6over4 / ISATAP / Mobile IP / Tunnel Setup Protocol / DHCPv6 / NAT64 / ICMPv6 / IP address / Internet Protocol / IPv6 / Network architecture

Implementing and Securing IPv6 How to plan implement and secure IPv6 in a multi-vendor commercial environment (5 days) Relevant Platforms:   

Add to Reading List

Source URL: www.erion.co.uk

Language: English - Date: 2015-01-08 05:46:46
UPDATE