Security paper

Results: 6621



#Item
591Stock market / Equity securities / Business law / Types of business entity / Joint venture / Security / Stock / Equity / Corporation / Financial economics / Investment / Finance

[TO BE PRINTED ON E-SYNERGY HEADED PAPER] [COMPANY] SUMMARY OF TERMS FOR SUBSCRIPTION OF [SERIES SEED] SHARES Company

Add to Reading List

Source URL: www.nispofunds.com

Language: English - Date: 2014-08-14 06:09:33
592Electronic commerce / Secure communication / National security / Encryption / Authenticated encryption / Public-key cryptography / Computer security / Transport Layer Security / Information security / Cryptography / Security / Cryptographic protocols

INVITED PAPER Privacy and Cybersecurity: The Next 100 Years This paper discusses the interrelationship of privacy and cybersecurity and

Add to Reading List

Source URL: www.landwehr.org

Language: English - Date: 2014-08-18 18:27:06
593Carbon tax / Emissions trading / Carbon pricing / American Clean Energy and Security Act / Low-carbon economy / Carbon sink / Economics of global warming / Carbon emission trading / Carbon offset / Climate change policy / Environment / Climate change

WORKING PAPER PUTTING A PRICE ON CARBON: A HANDBOOK FOR U.S. POLICYMAKERS KEVIN KENNEDY, MICHAEL OBEITER, AND NOAH KAUFMAN

Add to Reading List

Source URL: www.wri.org

Language: English - Date: 2015-04-29 15:10:23
594Web services / Amazon Web Services / Amazon Elastic Compute Cloud / Amazon Simple Queue Service / Amazon.com / Amazon S3 / Amazon Relational Database Service / Amazon SimpleDB / Amazon Virtual Private Cloud / Cloud computing / Computing / Centralized computing

Amazon Web Services Overview of Security Processes Amazon Web Services: Overview of Security Processes MayPlease consult http://aws.amazon.com/security for the latest version of this paper)

Add to Reading List

Source URL: s3.amazonaws.com

Language: English - Date: 2012-06-11 19:13:26
595Software / Webroot Software / Avira / Sophos / Symantec / Trend Micro / Malware / Webroot Internet Security Complete / Webroot Internet Security Essentials / Antivirus software / Computer security / System software

WHITE PAPER > HOW RESELLERS CAN BECOME THE TRUSTED ADVISORS How Resellers Can Become the Trusted Advisors on Security Issues Boosting Customer Satisfaction and Loyalty with Superior Antivirus Protection

Add to Reading List

Source URL: i.crn.com

Language: English - Date: 2015-03-30 12:52:52
596Caucasus / Foreign relations of Abkhazia / Politics of Georgia / Georgia / International recognition of Abkhazia and South Ossetia / Abkhazia / South Ossetia / Dmitry Medvedev / Ossetia / South Ossetia war / Europe / International relations

SWP Research Paper Stiftung Wissenschaft und Politik German Institute for International and Security Affairs Hans-Henning Schröder (ed.)

Add to Reading List

Source URL: www.swp-berlin.org

Language: English - Date: 2010-11-12 09:06:57
597Surveillance / Private Patrol Operator / Public safety / Security / Crime prevention / Security guard

BACKGROUND PAPER FOR THE Bureau of Security & Investigative Services (Joint Oversight Hearing, March 18, 2015, Senate Committee on Business, Professions and Economic Development and the Assembly Committee on Business and

Add to Reading List

Source URL: abp.assembly.ca.gov

Language: English - Date: 2015-03-11 19:43:36
598Employment / Socioeconomics / Macroeconomics / Labor economics / Business cycle / Unemployment / Economy of Japan / Job security / Late-2000s recession / Economics / Recessions / Economic history

SERIES PAPER DISCUSSION IZA DP No. 6666

Add to Reading List

Source URL: ffj.ehess.fr

Language: English - Date: 2013-01-03 22:44:00
599Russia in the European energy sector / Natural gas / Energy industry / Energy crisis / Energy policy / Energy market / World energy consumption / European Union / Energy superpower / Energy / Energy economics / Energy security

Arctic Energy Resources – Curse or Blessing for European Energy Security? Dag Harald Claes (University of Oslo) and Øistein Harsem (University of Tromsø) Paper written as part of Work package 5: Energy, under the Res

Add to Reading List

Source URL: www.geopoliticsnorth.org

Language: English - Date: 2014-05-15 09:26:20
600Cisco Systems / Deep packet inspection / Videotelephony / Computer security / Identity theft / Computing / International Cybercrime / HITRUST / Security / Computer network security / Crime

Combating Cybercrime in the Healthcare Industry White Paper Insights on Overcoming the Obstacles of

Add to Reading List

Source URL: www.cisco.com

Language: English
UPDATE