The Security Institute

Results: 5633



#Item
101Water / Natural environment / Food and drink / Aquatic ecology / Habitat / Wetland / Agriculture / Food security / International Water Management Institute / Soil

Session II – Envisioning New Approaches to Managing Great Deltas, Great Rivers, and Great Lakes 12:00 Noon Spatial Modeling for Decision Support in Selecting the Most Suitable Areas of Inland Valley Wetland Cultivation

Add to Reading List

Source URL: deltas.usgs.gov

Language: English - Date: 2009-07-31 15:24:48
102Food and drink / Agriculture / Personal life / Agronomy / Food security / Agricultural policy / Poverty reduction / Agricultural science / Agricultural productivity / International Food Policy Research Institute / Rainfed agriculture / Irrigation

MAIN PATHWAYS FROM AGRICULTURAL RESEARCH TO POVERTY REDUCTION IN SOUTH ASIA S. Mahendra Dev, Director and Vice Chancellor, IGIDR, Mumbai, India In the last few decades, South Asia has experienced significant economic gro

Add to Reading List

Source URL: www.scienceforum2016.org

Language: English - Date: 2016-04-05 07:39:00
103Education / Security / Computing / Systems engineering / Computer security / Educational technology / Integrated logistics support / Parallel running

TRANSFER OF HIGH TECHNOLOGY TO DEVELOPING COUNTRIES Jane Drummond and Pavao Stefanovic International Institute for Aerospace Survey and Earth Sciences SUMMARY: This paper reviews, on the basis of objectives and constrain

Add to Reading List

Source URL: mapcontext.com

Language: English - Date: 2008-08-30 01:30:42
104International relations / Science and technology / Astronomy / Arms control / Search for extraterrestrial intelligence / International security / Pugwash Conferences on Science and World Affairs / Carl Kaysen / George Kistiakowsky / Massachusetts Institute of Technology / Carl Sagan / Disarmament

Tribute to George Rathjens – by Jim Walsh It has taken me a while to write this remembrance of my mentor, colleague, and friend George Rathjens, who recently died at the age of 90. My procrastination is doubtless due t

Add to Reading List

Source URL: livableworld.org

Language: English - Date: 2016-07-22 11:43:13
105Labour law / Social security / Unemployment benefits / Income distribution / Government / Economy of Canada / Economy / Affordable housing in Canada / Canadian federal budget

Canada Social Report Federal Policy Monitor March 2016 The Caledon Institute of

Add to Reading List

Source URL: www.canadasocialreport.ca

Language: English - Date: 2016-04-05 08:36:05
106Lightning / Lightning strike / Safety / Vulnerability / Computer security / Cyberwarfare / Electrical safety / Risk

Introduction Letter TO WHOM IT MAY CONCERN The purpose of this letter is to introduce to you our company the National Lightning Safety Institute (NLSI). Our focus is Risk Management of the lightning hazard.

Add to Reading List

Source URL: lightningsafety.com

Language: English - Date: 2014-12-02 20:52:43
107Privacy / Internet privacy / Data security / Computing / Computer security / HTTP cookie / Information privacy / Personally identifiable information

gaiagosa.eu User Agreement Summary The GOSA is a citizen science project created by the Institute Astronomical Observatory of the

Add to Reading List

Source URL: www.gaiagosa.eu

Language: English - Date: 2015-06-26 01:43:04
108Politics of the European Union / International relations / European Union / ESADE Business School / ESADE / Javier Solana / Mary Kaldor / Geopolitics / Graduate Institute of International and Development Studies / High Representative of the Union for Foreign Affairs and Security Policy / Global governance

GeoCEO: Geopolitics for CEOs Directed by Javier Solana, President of the ESADE Centre for Global Economy and Geopolitics MADRID ESADE CAMPUS Thursday, 26 January, 2012

Add to Reading List

Source URL: www.esadegeo.com

Language: English
109Computer access control / Computer security / Computing / Electronic authentication / Security token / Authentication / Multi-factor authentication / OpenID / RSA SecurID / Mutual authentication / OAuth / SQRL

Bring Your Own Device For Authentication (BYOD4A) – The Xign–System Norbert Pohlmann  Markus Hertlein  Pascal Manaras Institute for Internet-Security Westphalian University of Applied Sciences {pohlmann | hertl

Add to Reading List

Source URL: www.xignsys.com

Language: English - Date: 2016-03-13 15:17:18
110Military history by country / Geography of Asia / Asia / Politics of Iraq / Foreign relations of Iran / IranIraq relations / IraqUnited States relations / War on Terror / Nouri al-Maliki / Institute for Science and International Security / Quds Force / Iraq War

Iran’s ISIS policy DINA ESFANDIARY AND ARIANE TABATABAI The rise of a new Sunni extremist group in the Middle East has become a significant security threat in an already volatile region. Empowered by conflict and inst

Add to Reading List

Source URL: www.chathamhouse.org

Language: English - Date: 2015-01-14 11:07:11
UPDATE