Showing 521 - 540 results of 583 for search '"security policy"', query time: 0.20s Refine Results
  1. 521
    Published 2010
    Table of Contents: “…TRADE""; ""Wheat""; ""Beef""; ""Swine""; ""Softwood lumber""; ""Byrd Amendment""; ""HUMAN AND POLITICAL RIGHTS""; ""China/the Koreas""; ""Zahra Kazemi""; ""Maher Arar""; ""The Khadrs""; ""Ukrainian elections""; ""Sudan""; ""Asian Tsunami""; ""DEFENCE POLICY""; ""Federal election and defence issues""; ""DOMESTIC AND CONTINENTAL SECURITY""; ""Canadaâ€?s national-security policy""; ""The military and the north""; ""Ballistic Missile Defence""; ""Bi-National Planning Group ""…”
    Connect to this title online (unlimited users allowed)
    Electronic eBook
  2. 522
  3. 523
  4. 524
    Published 2000
    Table of Contents: “…Hanson Women in Francophone West Africa in the 1930's: Unraveling a Neglected Report -- Ghislaine Lydon; Labor Migration, Gender, and Social Transformation in Rural Mali -- Maria Grosz-Ngate; Economic and Agricultural Policy Reform; Overview-MSU's Food Security Research and Outreach Program in Mali -- John M. Staatz; Food Security Policy Reform in Mali and the Sahel -- Josue Dione.…”
    Connect to this title online (unlimited users allowed)
    Electronic eBook
  5. 525
    Published 2015
    Table of Contents: “…Japan’s and South Korea's Nuclear Decision Making Models -- Overview of the Cooperative Projects Implemented by the European Commission Joint Research Centre in the Nuclear Security Area Outside Europe -- Proliferation Resistance and Physical Protection (Pr&Pp) Evaluation Methodology and Applications -- Next Generation Nuclear Security Policy: Education, Research, and Experience -- The Management of Radioactive Waste in France – What is the Threat? …”
    Connect to this title online
    Electronic eBook
  6. 526
  7. 527
    Published 2015
    Table of Contents: “…: Seeking Adequate Policy Analysis in Japan / Sukehiro Hosono -- Policy Research Movement in Local Governments / Kimie Tsuchiyama -- Policy Analysis and Normative Theory: With a Focus on Social Security Policies / Wataru Sano -- Law and public policy in contemporary Japan / Makoto Usami -- Part Two: Policy Analysis in Japanese Governments. …”
    Connect to this title online (unlimited users allowed)
    Electronic eBook
  8. 528
    Published 2015
    Table of Contents: “…An Efficient Privacy-Preserving E-coupon System -- Spatial Bloom Filters: Enabling Privacy in Location-Aware Applications -- Security of Direct Anonymous Authentication Using TPM 2.0 Signature -- Revocation in Publicly Verifiable Outsourced Computation -- Private Aggregation with Custom Collusion Tolerance -- Ring Signatures of Constant Size Without Random Oracles -- Universally Composable Identity Based Adaptive Oblivious Transfer with Access Control -- Three-Round Public-Coin Bounded-Auxiliary-Input Zero-Knowledge Arguments of Knowledge -- A Model-Driven Security Requirements Approach to Deduce Security Policies Based on OrBAC -- Optimal Proximity Proofs -- Simpler CCA-Secure Public Key Encryption from Lossy Trapdoor Functions -- Attacking RSA with a Composed Decryption Exponent Using Unravelled Linearization -- Fully Homomorphic Encryption with Auxiliary Inputs -- Trapdoors for Ideal Lattices with Applications -- Speeding Up the Search Algorithm for the Best Differential and Best Linear Trails -- The Boomerang Attacks on BLAKE and BLAKE2 -- Second Preimage Analysis of Whirlwind -- Boomerang Attack on Step-Reduced SHA-512 -- Collision Attack on 4-Branch, Type-2 GFN Based Hash Functions Using Sliced Biclique Cryptanalysis Technique -- Rig: A Simple, Secure and Flexible Design for Password Hashing -- Efficient Hardware Accelerator for AEGIS-128 Authenticated Encryption -- Fully Collusion-Resistant Traceable Key-Policy Attribute-Based Encryption with Sub-linear Size Ciphertexts -- Integrating Ciphertext-Policy Attribute-Based Encryption with Identity-Based Ring Signature to Enhance Security and Privacy in Wireless Body Area Networks -- Parallelized Software Implementation of Elliptic Curve Scalar Multiplication -- A Note on Diem’s Proof -- Stand-by Attacks on E-ID Password Authentication -- Stegomalware: Playing Hide and Seek with Malicious Components in Smartphone Apps -- A Lightweight Security Isolation Approach for Virtual Machines Deployment -- A Novel Approach to True Random Number Generation in Wearable Computing Environments Using MEMS Sensors.…”
    Connect to this title online
    Electronic eBook
  9. 529
  10. 530
    Published 2017
    Table of Contents: “…., Zhu, Q., Optimal Security Policy for Protection against Heterogeneous Malware -- Wu, H., Zhou, F., Zhu, Z., Chen, Y., An Experimental Comparison of Routing and Spectrum Assignment Algorithms in Elastic Optical Networks -- Zhang, C., Varma, V., Lasaulce, S., Robust Power Modulation for Channel State Information Exchange.…”
    Connect to this title online
    Electronic eBook
  11. 531
    Published 2023
    Table of Contents: “…-- References -- Russia's Challenge to Central and Eastern Europe -- 1 Introduction -- 2 The Starting Point: Roots of Putin's Revisionism -- 3 Russia's Strategic Culture -- 4 Doomed to Be an Enemy -- 5 Signals Missed -- 6 The Point of no Return -- 7 Implications for Central and Eastern Europe -- References -- Militarization of Security Policies in Central and Eastern Europe -- 1 Introduction -- 2 Theoretical Framework…”
    Connect to this title online (unlimited simultaneous users allowed; 325 uses per year)
    Electronic eBook
  12. 532
    Published 2007
    Table of Contents: “…to Environmental Security Challenges -- to environmental security -- Environmental Security: Priority Issues and Challenges in Romania and European Transition Countries -- Strategies and Methods/Approaches -- Developing highly effective environmental security policies for a sustainable development of the future. …”
    Connect to this title online
    Electronic eBook
  13. 533
    by Bne Saad, Majda
    Published 2013
    Table of Contents: “…Note continued: Gender and Food Security: Policy Implications -- Rural Women's Voice -- 10. …”
    Connect to this title online (unlimited users allowed)
    Electronic eBook
  14. 534
    by Calder, Alan
    Published 2013
    Table of Contents: “…Controls and Annex AControls (6.1.3.b); Residual risks; Control objectives; Plan for security incidents; Chapter 14: Implementation; Chapter 15: Check and Act; Monitoring; Auditing; Reviewing; Act -- maintain and improve the ISMS; Chapter 16: Management Review; Chapter 17: ISO27001 Annex A; Annex A control areas and controls; Clause A5: Information security policies; Clause A6: Organisation of information security; Clause A7: Human resource security; Clause A8: Asset management; Clause A9: Access control; Clause A10: Cryptography; ITG Resources.…”
    Connect to this title online (unlimited users allowed)
    Electronic eBook
  15. 535
    Published 1994
    Table of Contents: “…The medieval times to World War I ; The interwar years ; World War II ; The communist era -- National security policy. Threat perception ; Military doctrine ; Strategy and tactics ; Military cooperation and exchanges -- Defense organization. …”
    Connect to this title via HeinOnline
    Government Document Electronic eBook
  16. 536
    by Stallings, William
    Published 2014
    Table of Contents: “…IP Security Overview -- 9.2. IP Security Policy -- 9.3. Encapsulating Security Payload -- 9.4.Combining Security Associations -- 9.5. …”
    Book
  17. 537
    by Kevany, Sebastian
    Published 2020
    Table of Contents: “…. -- Borders and travel -- Macro-level public health security policies -- Media and public health information -- Feasible and enforceable individual-level efforts…”
    Connect to this title online (unlimited simultaneous users allowed; 325 uses per year)
    Electronic eBook
  18. 538
    by Calder, Alan
    Published 2020
    Table of Contents: “…10.2 Third-party threat example: Target data breach -- Part 3: The CRF processes -- Chapter 11: An overview of the CRF processes -- Chapter 12: Manage and protect -- 12.1 Asset management -- 12.2 Information security policies -- 12.3 Physical and environmental security -- 12.4 Identity and access control -- 12.5 Malware protection -- 12.6 Configuration and patch management -- 12.7 Encryption -- 12.8 System security -- 12.9 Network and communications security -- 12.10 Security competence and training -- 12.11 Staff awareness training -- 12.12 Comprehensive risk management programme…”
    Connect to this title online (unlimited users allowed)
    Electronic eBook
  19. 539
    Published 2017
    View this video online
    Electronic Video
  20. 540