Security Building

Results: 4307



#Item
121Flood control / Hydrology / Historic preservation / Insurance law / National Flood Insurance Program / United States Department of Homeland Security / Floodplain / Flood insurance / Flood mitigation / National Register of Historic Places / Vermont / Designated landmark

Department of Economic Housing and Community Development Department of Environmental Conservation Before You Repair Flood Damage Important information for Historic Building Owners & Municipalities FEMA sent out a press r

Add to Reading List

Source URL: floodready.vermont.gov

Language: English - Date: 2015-10-21 09:45:26
122Virtual reality / Human communication / Humanmachine interaction / User interface / Building automation / Security alarm / Set-top box / Sensor node

EPA ENERGY STAR Displays Stakeholder Meeting September 25, 2008 Presentation

Add to Reading List

Source URL: nordman.lbl.gov

Language: English - Date: 2010-06-10 17:25:09
123Identity management / Computer access control / Federated identity / Internet Standards / Shibboleth / Security Assertion Markup Language / Privacy policy / Authentication / Internet privacy / Privacy

Building and (inter)operating AA services. A tour into reality TERENA Mini Symposium on AA Prague, 24 October 2002

Add to Reading List

Source URL: papi.rediris.es

Language: English - Date: 2007-10-13 04:03:52
124United States Department of Homeland Security / Internship / Science /  technology /  engineering /  and mathematics / Tor

Building A Successful Application for the DHS HS-STEM Summer Internship Program What’s Included in this guide: • General tips for completing your application • Creating consistency among all the pieces of your appl

Add to Reading List

Source URL: www.orau.gov

Language: English - Date: 2015-04-28 10:18:45
125Culture of Mali / Mali

EXECUTIVE SUMMARY EVOLUTION OF SOCIETAL VALUES – (RE)BUILDING OF TRUST BETWEEN THE CIVILIAN POPULATION AND THE DEFENSE AND SECURITY FORCES: DIAGNOSIS AND SOLUTIONS FOR SUSTAINABLE PEACE IN MALI From November 2013 to Ma

Add to Reading List

Source URL: www.interpeace.org

Language: English - Date: 2016-08-16 12:01:19
126Nuclear weapons / Nuclear proliferation / Nuclear Security Summit / Nuclear safety and security / Nuclear terrorism / International Atomic Energy Agency / Nuclear and radiation accidents and incidents / United Nations Security Council Resolution / Nuclear power / Nuclear Threat Initiative / Nuclear disarmament / Anti-nuclear movement

Addressing the Transnational Nature of Nuclear Incidents Togzhan Kassenova Discussion paper for the NNSGEG workshop on Building International Confidence and Responsibility in Nuclear Security Amman, Jordan

Add to Reading List

Source URL: www.nsgeg.org

Language: English - Date: 2012-11-13 09:17:29
127Antivirus software / Malwarebytes / Malware / Zero-day / Avira

C A S E S T U DY When it comes to malware defense, Gilbane Building Company nails it Gilbane crushes malware and exploits on its endpoints with Malwarebytes Endpoint Security

Add to Reading List

Source URL: br.malwarebytes.com

Language: English - Date: 2016-07-07 18:30:53
128Entergy / Nuclear energy in the United States / Nuclear safety / Anti-nuclear protests / Hudson River / Indian Point Energy Center / Containment building / Nuclear Regulatory Commission / Nuclear safety and security / Nuclear power / Vermont Yankee Nuclear Power Plant

Microsoft WordISE Q&A Composite Response.doc

Add to Reading List

Source URL: nyindianpoint.org

Language: English - Date: 2008-08-26 14:52:29
129Locksmithing / Perimeter security / Physical security / Access control / National security / Key management / Key / Security alarm / Lock / Authorization / Computer security / Electronic key management

Office of the President University Policy SUBJECT: Building Access Control

Add to Reading List

Source URL: www.fau.edu

Language: English - Date: 2015-11-16 11:13:19
130Identity documents / Security / Crime prevention / Cryptography / National security / Internet privacy / Privacy / BlackBerry Priv / Password / Computer security / Identity theft / Privacy concerns with social networking services

End User Concern about Security and Privacy Threats Joshua B. Gross and Mary Beth Rosson College of Information Sciences and Technology311B IST Building The Pennsylvania State University 311B IST Building University Park

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2007-06-22 15:47:38
UPDATE