• No results found

Security Matters

Public Cloud Computing vs. Private Cloud Computing: How Security Matters. Public Cloud Computing vs. Private Cloud Computing: How Security Matters

Public Cloud Computing vs. Private Cloud Computing: How Security Matters. Public Cloud Computing vs. Private Cloud Computing: How Security Matters

... applications, security and compliance considerations and then decide what is more appropriate for a private Cloud and what is more appropriate for a public ...

14

Screening and 'frisk searches' as part of airport security: Matters of choice? The need for 'checks and balances' in aviation security legislation

Screening and 'frisk searches' as part of airport security: Matters of choice? The need for 'checks and balances' in aviation security legislation

... airport security guards, but have additional powers which are in some ways quite specific and in other respects quite ...airport security guards, 77 – an important power when people are often in a hurry to ...

25

The Policing You Don t See. Covert policing and the accountability gap: Five years on from the transfer of national security primacy to MI5

The Policing You Don t See. Covert policing and the accountability gap: Five years on from the transfer of national security primacy to MI5

... ‘national security’ ...‘national security’ and transferring it to another agency outside of the PSNI was always going to further limit the role of the ...

114

Commissioner for Law Enforcement Data Security. Review of Information Governance within Victoria Police. Final Report. April 2009

Commissioner for Law Enforcement Data Security. Review of Information Governance within Victoria Police. Final Report. April 2009

... Organisational Security Committee (OSC) was established late last year and is also chaired by Deputy Commissioner ...a Security Executive to oversight protective security matters for Victoria ...

56

Search and Seizure:  The Wiretap Cases:  United States v  United States District Court, 407 U S  297 (1972), Gelbard v  United States, 408 U S  41 (1972)

Search and Seizure: The Wiretap Cases: United States v United States District Court, 407 U S 297 (1972), Gelbard v United States, 408 U S 41 (1972)

... United States District Court the Court denied the power of the President, acting through the Attorney General, to authorize electronic surveillance in domestic security matters without p[r] ...

8

Assembly of Western European Union Proceedings, Thirty Sixth Ordinary Session, Second Part  Volume III: Assembly Documents  Paris, December 1990

Assembly of Western European Union Proceedings, Thirty Sixth Ordinary Session, Second Part Volume III: Assembly Documents Paris, December 1990

... In assessing what may be expected of the strengthening and institutionalisation of the CSCE process in security matters, it must be recalled that it was first a matter of finding a means[r] ...

348

Secure wireless communication between PC and android mobile device

Secure wireless communication between PC and android mobile device

... on security matters with Android ...a security channel of communication with VPN had been done [Angel Alonso ‐ Parrizas, ...the security of communication between the host and ...

24

If it matters to you, it matters to us.

If it matters to you, it matters to us.

... Your home is probably the most valuable thing you have. We’ll help you rest easy, by covering what matters. So although we can’t be there to stop a spillage, divert a water leak or prevent damage to plants in your ...

7

Child support and the SSAT: an Anglo Australian comparison

Child support and the SSAT: an Anglo Australian comparison

... This article discusses the new arrangements for reviewing decisions of the Child Support Agency, which came into force on 1 January 2007. Since that date the jurisdiction of the SSAT has been expanded to include merits ...

30

Bring Your Own Device and Expense Management

Bring Your Own Device and Expense Management

... Deployment of new devices is not a "one-time" activity, so managers need to identify the most efficient way for the enterprise to maintain an accurate inventory of employees in the program, their devices, ...

12

Saving Ghana's revolution : the demise of Kwame Nkrumah and the evolution of Soviet policy in Africa, 1966–1972

Saving Ghana's revolution : the demise of Kwame Nkrumah and the evolution of Soviet policy in Africa, 1966–1972

... information about high-level Soviet policy in Africa as the records of decision-making bodies such as the Presidium of the Central Committee of the Communist Party of the Soviet Union (CC CPSU) and the CC CPSU ...

18

Consumption matters

Consumption matters

... In short, the moral and historical element in the value of labour power as a material standard of living – as opposed to a level of social necessary labour-time – is not determined by[r] ...

32

Repair matters

Repair matters

... In this editorial, we articulate a specific position that brings feminist materialist politics as both critique and proposition at the centre of repair matters. We share with other fem[r] ...

25

Repair matters

Repair matters

... In this editorial, we articulate a specific position that brings feminist materialist politics as both critique and proposition at the centre of repair matters. We share with other fem[r] ...

262

Kinship that matters

Kinship that matters

... Antigone therefore permits us, so Butler argues, to ask which kinship arrangements should be seen as legitimate, because she refuses to acknowledge any law that does not acknowledge her [r] ...

5

A Software Development Methodology for Secure Web Application

A Software Development Methodology for Secure Web Application

... end, security emphasized modeling language UMLsec and O-R mapping for relational database design is ...of security, we implemented the role-based access control using DDL and DCL syntax of Java EE and ...

6

Markets, Food Security and Early Warning Reporting FEWS NET Markets Guidance, No 6 October 2009

Markets, Food Security and Early Warning Reporting FEWS NET Markets Guidance, No 6 October 2009

... food security, largely anomalous patterns and behaviors, as well as provide an indication of expected food security conditions or how the food security conditions are likely to evolve in the ...

44

The Role of Europe in Enhancing Cooperative Security in Asia and the Pacific: A View from Japan  Egmont Security Policy Brief No  50, October 2013

The Role of Europe in Enhancing Cooperative Security in Asia and the Pacific: A View from Japan. Egmont Security Policy Brief No. 50, October 2013

... and security-building measures, and not to touch upon the human rights issues which would be a non-starter in ...and security-building measures should not include exchange of naval military information and ...

10

Ghostly matters in organizing

Ghostly matters in organizing

... ghostly matters in organizing, we learn that a ghostly methodology requires us to pay attention to the senses (Blackman, ...ghostly matters is to become ‘enchanted’ – to have an experience of being ...

33

Ghostly matters in organization

Ghostly matters in organization

... ghostly matters opens up inquiries into those things in organizations that we consciously or unconsciously ‘unsee’, that we no longer talk about or understand, but that still touch us now and then in affective ...

246

Show all 10000 documents...

Related subjects