Security paper

Results: 6621



#Item
171Human migration / European migrant crisis / European Union law / International law / Politics of the European Union / Dublin Regulation / Asylum seeker / European Council on Refugees and Exiles / Right of asylum / Refugee / European Asylum Support Office / Unaccompanied minor

Position Paper "Freedom, Security and Justice: What will be the future?" – Consultation on priorities for the next five years)

Add to Reading List

Source URL: www.redcross.eu

Language: English - Date: 2014-01-16 05:50:17
172Intellectual property law / Secrecy / Trade secrets / Security / Business law / Directive on the Protection of Trade Secrets / Classified information / Espionage / Industrial espionage / Intellectual property / Unfair competition / Belgium

Working Paper No. 172 – MarchCOUNTERING ECONOMIC ESPIONAGE AND INDUSTRIAL SPYING: A BELGIAN CRIMINAL LAW PERSPECTIVE K. De Schepper, E. Vandebroek and F. Verbruggen

Add to Reading List

Source URL: ghum.kuleuven.be

Language: English - Date: 2016-04-04 04:14:55
173Military history of Germany / Bundeswehr / Ursula von der Leyen

WHITE PAPER 2016 ON GERMAN SECURITY POLICY AND THE FUTURE OF THE BUNDESWEHR ON GERMAN SECURITY POLICY AND THE FUTURE OF THE BUNDESWEHR ON GERMAN SECURITY POLICY AND

Add to Reading List

Source URL: www.ieee.es

Language: English - Date: 2016-07-18 02:25:45
174Biometrics / Security / Computer access control / Identification / Surveillance / Speaker recognition / Password / Authentication / Computer security

Copyright 2013 Society of Photo Optical Instrumentation Engineers. One print or electronic copy may be made for personal use only. Systematic reproduction and distribution, duplication of any material in this paper for a

Add to Reading List

Source URL: www.wjscheirer.com

Language: English - Date: 2013-07-07 22:38:19
175Computer security / Cryptography / Identity management / Computer network security / Security / Password / Information technology controls / Security controls / Access control

Security Strategy White Paper This white paper references Health Insurance Portability and Accounting Act () Security strategies that QSI clients may pursue to help conform their use of the system to meet the Security Pr

Add to Reading List

Source URL: www.qsii.com

Language: English - Date: 2014-01-28 14:18:07
176Crime prevention / Public safety / Surveillance / Abuse / Police brutality / Metropolitan Police Service / Hong Kong Police Force / Police / Crime in South Africa / Security guard / New Orleans Police Department / Police corruption

BROKEN BLUE LINE Broken Blue Line The involvement of the South African Police Force in serious and violent crime in South Africa A research paper by the Unit for Risk Analysis

Add to Reading List

Source URL: shukumisa.org.za

Language: English - Date: 2015-06-29 14:23:20
177Nuclear weapons / Nuclear proliferation / Nuclear Security Summit / Nuclear safety and security / Nuclear terrorism / International Atomic Energy Agency / Nuclear and radiation accidents and incidents / United Nations Security Council Resolution / Nuclear power / Nuclear Threat Initiative / Nuclear disarmament / Anti-nuclear movement

Addressing the Transnational Nature of Nuclear Incidents Togzhan Kassenova Discussion paper for the NNSGEG workshop on Building International Confidence and Responsibility in Nuclear Security Amman, Jordan

Add to Reading List

Source URL: www.nsgeg.org

Language: English - Date: 2012-11-13 09:17:29
178Customer experience management / E-commerce / Marketing / Financial Ombudsman Service / Computer security / Vulnerability / Financial Conduct Authority / Customer service / Customer relationship management / Ombudsman for Banking Services and Investments

Consumer Vulnerability Occasional Paper Appendix 4 Practitioners’ Pack

Add to Reading List

Source URL: fca.org.uk

Language: English - Date: 2016-06-28 06:48:52
179Nuclear proliferation / International Atomic Energy Agency / International Nuclear Information System / Member states of the International Atomic Energy Agency / Nuclear program of Iran

Form for Submission of a Paper International Conference on Nuclear Security: Commitments and Actions Vienna, Austria 5–9 December 2016

Add to Reading List

Source URL: www-pub.iaea.org

Language: English - Date: 2015-12-11 04:30:41
180Computing platforms / Arxan Technologies / Cyberwarfare / Computer network security / .NET Framework / Malware / Computer security / Proprietary software / Cross-platform / Obfuscation / Software / Windows XP

Protecting .NET Software Applications Arxan Best Practices White Paper Arxan Technologies White Paper – Arxan protects your IP from software piracy, tampering, reverse engineering and any manner of theft. 1

Add to Reading List

Source URL: www.arxan.com

Language: English - Date: 2016-08-01 23:55:30
UPDATE