Security University

Results: 12075



#Item
641Crimes / Criminal law / Crime in the United States / Hate crime / Murder of Jeanne Clery / Crime / Burglary / Manslaughter / Murder / Clery Act / National Incident Based Reporting System

Cornell University Police Statistical Crime Record Reported in compliance with the Jeanne Clery Disclosure of Security Policy and Campus Crime Statistics Act for calendar years 2009, 2010 andOn Campus: including R

Add to Reading List

Source URL: www.cupolice.cornell.edu

Language: English - Date: 2012-09-28 13:50:34
642Student migration / Student exchange / United States Department of Homeland Security / F visa / I-20 / J-1 visa / Knoxville /  Tennessee / University of Tennessee / International student / Student and Exchange Visitor Program

THE UNIVERSITY OF TENNESSEE International Student Pre-Arrival Handbook

Add to Reading List

Source URL: international-utk-edu.wpengine.netdna-cdn.com

Language: English
643Agriculture in Pakistan / Ministry of National Food Security & Research / Animal husbandry in India / Ministry of Agriculture and Rural Development / Ministry of Agriculture & Farmers Welfare / Institute of fisheries / Ministry of Agriculture /  Fisheries and Food / Aquaculture / Department of Agriculture / Department of Animal Husbandry /  Dairying and Fisheries / Karnataka Veterinary /  Animal and Fisheries Sciences University

Annual ReportEnglish)

Add to Reading List

Source URL: indianfisheries.icsf.net

Language: English - Date: 2012-04-16 01:25:14
644OpenVAS / Crime prevention / Cryptography / Information governance / National security / Computer security / Vulnerability / Free software / Munich

Greenbone Case Study Vulnerability Management German Armed Forces University, Munich (Universität der Bundeswehr München) Greenbone Security Manager:

Add to Reading List

Source URL: greenbone.net

Language: English - Date: 2016-08-19 11:06:48
645Public-key cryptography / Hypertext Transfer Protocol / Computer network security / Public key infrastructure / Internet privacy / HTTP cookie / Email / Computer security

Techniques for Visual Feedback of Security State Tara Whalen and Kori Inkpen Dalhousie University Halifax, NS, Canada {whalen, inkpen}@cs.dal.ca Introduction and Overview

Add to Reading List

Source URL: dimacs.rutgers.edu

Language: English
646Standardized tests / SAT / ACT / Graduate Record Examinations / University and college admission

Portfolio Procedures for DEHP Home Educated Applicants Please complete the following information so that your documents may be correctly matched with your application packet. Full Legal Name: Social Security Number:

Add to Reading List

Source URL: admissions.kennesaw.edu

Language: English - Date: 2016-05-23 15:36:45
647Crime prevention / Law enforcement / National security / Police / Security / Surveillance

Institute of Criminology, University of Cambridge In Association with the Society for Evidence Based Policing 9th International Conference on Evidence Based PolicingJuly 2016, Venue: The Faculty of Law, Sidgwick

Add to Reading List

Source URL: www.crim.cam.ac.uk

Language: English - Date: 2016-05-16 09:58:59
648Network architecture / Electronic voting / Server / Clientserver model / Communications protocol / Computer networking / Internet protocol suite / IMS security

Bilkent University Senior Design Project Smart-Vote: Electronic Voting System for Smartphones Department of Computer Engineering

Add to Reading List

Source URL: ivoteturkey.eu.pn

Language: English - Date: 2014-05-14 18:12:29
649Manhattan Project / Jemez Mountains / Bechtel / Los Alamos National Laboratory / Los Alamos /  New Mexico / Cerro Grande Fire / New Mexico State Road 501 / Los Alamos National Security / Geographic information system / University of California / Pajarito Plateau / Enterprise GIS

LAMS Approved for public release; distribution is unlimited. Geographic Information System (GIS) Emergency Support for the

Add to Reading List

Source URL: gislab.lanl.gov

Language: English - Date: 2005-10-21 20:06:09
650Crime prevention / National security / Cryptography / Information governance / Cybercrime / Computer security / Internet privacy / National Security Agency / Network security

Network Security Activities Under the University’s Electronic Communications Policy This guidance is intended to assist the Campuses and Laboratories in undertaking additional network security efforts. This guidance sp

Add to Reading List

Source URL: security.ucop.edu

Language: English - Date: 2016-02-01 23:11:50
UPDATE