Results 281 to 290 of about 7,114,774 (349)
Some of the next articles are maybe not open access.
Security? What security? [job security]
Engineering & Technology, 2009The paper discusses about job security. The article looks at two staples of insecurity. First, working for two superiors, both of which are demanding to prioritise their work, and second the budget slashing of the company. Case studies in a generalised situation are also presented. The information and advice given here conforms to what is believe to be
openaire +1 more source
Southeast European and Black Sea Studies, 2003
(2003). Balkan security: What security? Whose security? Southeast European and Black Sea Studies: Vol. 3, No. 3, pp. 105-129.
openaire +1 more source
(2003). Balkan security: What security? Whose security? Southeast European and Black Sea Studies: Vol. 3, No. 3, pp. 105-129.
openaire +1 more source
Securify: Practical Security Analysis of Smart Contracts
Conference on Computer and Communications Security, 2018Permissionless blockchains allow the execution of arbitrary programs (called smart contracts), enabling mutually untrusted entities to interact without relying on trusted third parties.
Petar Tsankov +5 more
semanticscholar +1 more source
City, 2014
During the industrial era, the world's largest private security firm was the Pinkerton National Detective Agency.
openaire +1 more source
During the industrial era, the world's largest private security firm was the Pinkerton National Detective Agency.
openaire +1 more source
The Washington Quarterly, 1999
Belt, Moynihan, and Schieber sketch out middle‐of‐the road proposals that combine a minimum income guarantee—a residue of Social Security—with expanded private savings accounts. This combination, they believe, offers the best compromise between a guarantee against poverty and the benefits of a private system. Nadler disputes the urgency of reform.
openaire +1 more source
Belt, Moynihan, and Schieber sketch out middle‐of‐the road proposals that combine a minimum income guarantee—a residue of Social Security—with expanded private savings accounts. This combination, they believe, offers the best compromise between a guarantee against poverty and the benefits of a private system. Nadler disputes the urgency of reform.
openaire +1 more source
IEEE Transactions on Software Engineering, 1978
Databases may be compromised by asking a set of queries which return only statistical information and making inferences about a specific entry from the results of the set of queries. We present methods of constructing the set of queries to compromise a database where all the queries in the set return the maximum of a set of k elements, or all queries ...
Davida, George I. +3 more
openaire +1 more source
Databases may be compromised by asking a set of queries which return only statistical information and making inferences about a specific entry from the results of the set of queries. We present methods of constructing the set of queries to compromise a database where all the queries in the set return the maximum of a set of k elements, or all queries ...
Davida, George I. +3 more
openaire +1 more source
State Security, Societal Security, and Human Security
Jadavpur Journal of International Relations, 2017Generally speaking, the traditional approach of security mainly regards states as a sole referent object of security and refutes any attempt to broaden the concept of security. This understanding is known as a realist approach. This approach, however, has been recently challenged by the Copenhagen School, the Welsh School, and the human security ...
openaire +1 more source
Software Security: Building Security In
2006 17th International Symposium on Software Reliability Engineering, 2006Summary form only given. Software security has come a long way in the last few years, but we've really only just begun. I will present a detailed approach to getting past theory and putting software security into practice. The three pillars of software security are applied risk management, software security best practices (which I call touchpoints ...
openaire +1 more source
Introduction to Security, 2019
The security field is always evolving. This, given the turbulent world in which we all live, requires the security professional to remain fluid in adjusting protective strategies to protect employees, property, assets, and revenue of the business ...
R. Fischer +2 more
semanticscholar +1 more source
The security field is always evolving. This, given the turbulent world in which we all live, requires the security professional to remain fluid in adjusting protective strategies to protect employees, property, assets, and revenue of the business ...
R. Fischer +2 more
semanticscholar +1 more source
SECURING COMMUNITY, SECURING BUSINESS! MANAGERS SECURITY AWARENESS THROUGH ELEARNING
eLearning and Software for Education, 2012Contemporary approach of the intelligence domain is due to substantial changes that the umbrella concept of security has suffered in postmodern society and to the fact that at present nations have to face an extremely diverse range of threats. Comparing with other country, traditional Romanian academic programs for studying intelligence and security ...
openaire +1 more source

