Security paper

Results: 6621



#Item
871Motivation / Earth / Adaptation to global warming / Global warming / Food security / Hunger / Emergency management / Psychological resilience / Food / Environment / Climate change / Humanitarian aid

Climate Change, Food Insecurity and Hunger Key Messages for UNFCCC Negotiators Technical Paper of the IASC Task Force on Climate Change Submitted by WFP, FAO, IFRC and OXFAM, as well as WVI,

Add to Reading List

Source URL: www.careclimatechange.org

Language: English - Date: 2009-11-02 21:30:09
872Social issues / Religion / Organized crime / Violence / Corporatism / Islamic terrorism / Terrorism in Australia / Sectarianism / Al-Qaeda / Religion and violence / Religious discrimination / Sectarian violence

S E C TA R I A N V I O L E N C E The Threat to Australia Rodger Shanahan National Security College Occasional Paper, No 7 JulyNational Security

Add to Reading List

Source URL: nsc.anu.edu.au

Language: English - Date: 2014-07-23 02:36:49
873Agricultural economics / Economics / Energy crops / Biofuels / Economy of Africa / World food price crisis / Food security / Common Agricultural Policy / Agricultural subsidy / Food and drink / Food politics / Agriculture

The Impact of Food Price Volatility and Food Inflation on Southern and Eastern Mediterranean Countries CIDOB paper for Union for the Mediterranean (UfM) Barcelona, October 2014

Add to Reading List

Source URL: ufmsecretariat.org

Language: English - Date: 2015-04-29 05:21:34
874European Space Agency / Environmental chemistry / Ozone depletion / Oxygen / Weather satellites / Global Monitoring for Environment and Security / Atmospheric chemistry / Atmospheric physics / Envisat / Spaceflight / Earth / Meteorology

6 March 2006 Issue 0 Draft H Position Paper on Post-EPS Atmospheric Chemistry Data User Requirements

Add to Reading List

Source URL: www.knmi.nl

Language: English - Date: 2011-03-10 08:46:56
875Software / Computer network security / Nimda / Trend Micro Internet Security / Computer virus / Trend Micro / Internet security / Computer worm / Network security / Malware / System software / Antivirus software

WHITE PAPER TREND MICRO™ ENTERPRISE PROTECTION STRATEGY™ DECEMBER 2002

Add to Reading List

Source URL: www.biznetvigator.com

Language: English - Date: 2008-04-24 04:40:57
876Denial-of-service attacks / Computer network security / Internet standards / Multihoming / Stream Control Transmission Protocol / Streaming / Transmission Control Protocol / Transport layer / Denial-of-service attack / Network architecture / Computing / Internet

SCTP: An innovative transport layer protocol for the web (Position paper) P. Natarajan, J. Iyengar, P. Amer, & R. Stewart

Add to Reading List

Source URL: www2006.org

Language: English - Date: 2006-09-05 12:42:57
877Computer network security / Wireless access points / Electronic engineering / IEEE 802.11 / Wireless security / Rogue access point / Wireless bridge / Wireless LAN / Evil twin / Wireless networking / Technology / Wireless

Who Is Peeping at Your Passwords at Starbucks? – To Catch an Evil Twin Access Point Yimin Song, Chao Yang, and Guofei Gu Texas A&M University {songym,yangchao,guofei}@cse.tamu.edu Abstract—In this paper, we consider

Add to Reading List

Source URL: faculty.cs.tamu.edu

Language: English - Date: 2010-04-12 21:21:15
878Security / Microchip implant / Animal identification / CASPIAN / VeriChip / Cancer / Animal testing / Digital Angel / Radio-frequency identification / Medicine / Health

Synopsis of "Microchip­Induced Tumors in Laboratory Rodents and Dogs:  A Review of the Literature 1990–2006" By Katherine Albrecht, Ed.D. Overview This document summarizes a paper titled "Microc

Add to Reading List

Source URL: www.chipmenot.org

Language: English - Date: 2010-10-15 16:17:43
879Energy policy / Sustainable energy / Energy security / Energy industry / Science Foundation Ireland / Renewable energy / Marine Institute Ireland / Energy policy of the European Union / Energy economics / Energy / Technology

ENERGY RESEARCH STRATEGY Printed on Recycled Paper IRISH ENERGY RESEARCH COUNCIL AN ENERGY RESEARCH STRATEGY FOR IRELAND

Add to Reading List

Source URL: www.dcenr.gov.ie

Language: English - Date: 2015-05-16 22:13:29
880Data security / Computer storage media / Destruction / Paper recycling / Paper shredder / Security / Data remanence / USB flash drive / Hard disk drive / Computer hardware / Computing / Technology

PDF Document

Add to Reading List

Source URL: www.semshred.com

Language: English - Date: 2015-04-01 16:35:57
UPDATE