Security paper

Results: 6621



#Item
891Computing / Password / Remote backup service / Crypt / Encryption / Encrypting File System / FileVault / Cryptographic software / Cryptography / Computer security

White Paper Benefits of Secure Off-Site Online Backup In today’s computing environment, businesses are relying on computers to perform daily business activities as well as mission critical functions. The use of compute

Add to Reading List

Source URL: www.firstbackup.com

Language: English - Date: 2007-03-16 17:00:00
892OpenFlow / Computing / Public safety / Security / Cloud computing / Computer security

The utilization of cloud services by corporate users is increasing year after year. According to the Ministry of Internal Affairs and Communications’ FY 2014 Information and Communications White Paper, the ratio of com

Add to Reading List

Source URL: www.iij.ad.jp

Language: English - Date: 2014-12-26 02:03:30
893Fertility / Population / Regression analysis / Dummy variable / Total fertility rate / Random effects model / Cohort / Social Security / Demography / Statistics / Statistical models

The Effect of the Cost of Children on Recent Fertility Decline in Japan (preliminary) Masako Oyama1 Faculty of Economics, Hitotsubashi University In this paper, the effect of the cost of children on fertility rate is est

Add to Reading List

Source URL: cis.ier.hit-u.ac.jp

Language: English - Date: 2014-07-01 09:04:15
894Employment compensation / Financial economics / British society / Pension / Personal finance / Economics / Social Security / Pensions in Germany / Pensions in the United Kingdom / Financial services / United Kingdom

Civil Service Pension Arrangements in Japan A paper presented to the International Workshop on Civil Service and Military Pension Arrangements in Selected Countries of the Asia-Pacific organized by PIE, Hitotsubashi Uni

Add to Reading List

Source URL: cis.ier.hit-u.ac.jp

Language: English - Date: 2014-07-01 09:06:10
895Security / Computer network security / Payment systems / National security / Tamper resistance / Mobile payment / EMV / Vulnerability / Computer security / Electronic commerce / Cyberwarfare / Technology

Mobile Payment Security discussion paper Executive summary Mobile payment services are evaluated to understand the level of risk they provide. This evaluation is used to provide a transparent level of risk that can be as

Add to Reading List

Source URL: www.gsma.com

Language: English - Date: 2014-10-07 01:51:16
896Association of Southeast Asian Nations / South China Sea / Territorial disputes in the South China Sea / Treaty of Amity and Cooperation in Southeast Asia / Benigno Aquino III / ASEAN Summit / East Asian Community / Asia / International relations / Organizations associated with the Association of Southeast Asian Nations

CSS STRATEGIC BACKGROUND PAPER – REPORT ON THE 5th INTERNATIONAL WORKSHOP ON THE SOUTH CHINA SEA: COOPERATION FOR REGIONAL SECURITY AND DEVELOPMENT Introduction

Add to Reading List

Source URL: www.victoria.ac.nz

Language: English - Date: 2014-04-10 21:53:41
897Law enforcement / Public safety / Crime prevention / Police / Surveillance / Independent Police Complaints Commission / Police Complaints Commissioner for Scotland / National security / Security / Public administration

Briefing Paper for Police and Crime Commissioners: Equality, Diversity and Human Rights The Police Reform and Social Responsibility ActPRSRA) established new arrangements for policing governance in England and Wal

Add to Reading List

Source URL: www.nbpa.co.uk

Language: English - Date: 2014-10-24 10:00:29
898Military science / Technology / Security / International Traffic in Arms Regulations / Export / United States Munitions List / Dual-use technology / Computer security / Arms Export Control Act / Military technology / Identifiers / United States Department of Commerce

The Impact of Export Controls on the Domestic Aerospace Industry: An AIAA Information Paper Abstract Export Control policies originally designed to protect sensitive technologies and capabilities from adversarial regimes

Add to Reading List

Source URL: www.aiaa.org

Language: English - Date: 2011-12-15 15:02:18
899Member states of the Association of Southeast Asian Nations / Member states of the Commonwealth of Nations / Member states of the United Nations / Five Power Defence Arrangements / Anglo-Malayan Defence Agreement / New Zealand Defence Force / Singapore / Malaysia / New Zealand Army / International relations / Political geography / Asia

CSS STRATEGIC BACKGROUND PAPER – FIVE POWER DEFENCE ARRANGEMENTS: A NEW ZEALAND PERSPECTIVE A strong commitment to the security of South-east Asia is in New Zealand’s defence policy DNA. For more than six

Add to Reading List

Source URL: www.victoria.ac.nz

Language: English - Date: 2014-04-10 21:46:49
900Australia / Dick Smith / Food security / Political geography / Pacific Ocean / Australian property bubble / Food politics / Earth / Agriculture in Australia

Speech to Association of Independent Retirees Melbourne North West Branch 18 July 2012 Foreign Ownership and Food Security Yesterday the Australian Government released the National Food Plan Green Paper,

Add to Reading List

Source URL: www.kelvinthomson.com.au

Language: English - Date: 2012-07-18 23:08:20
UPDATE