Results 281 to 290 of about 7,114,774 (349)
Some of the next articles are maybe not open access.

Security? What security? [job security]

Engineering & Technology, 2009
The paper discusses about job security. The article looks at two staples of insecurity. First, working for two superiors, both of which are demanding to prioritise their work, and second the budget slashing of the company. Case studies in a generalised situation are also presented. The information and advice given here conforms to what is believe to be
openaire   +1 more source

Balkan Security

Southeast European and Black Sea Studies, 2003
(2003). Balkan security: What security? Whose security? Southeast European and Black Sea Studies: Vol. 3, No. 3, pp. 105-129.
openaire   +1 more source

Securify: Practical Security Analysis of Smart Contracts

Conference on Computer and Communications Security, 2018
Permissionless blockchains allow the execution of arbitrary programs (called smart contracts), enabling mutually untrusted entities to interact without relying on trusted third parties.
Petar Tsankov   +5 more
semanticscholar   +1 more source

Securing the security

City, 2014
During the industrial era, the world's largest private security firm was the Pinkerton National Detective Agency.
openaire   +1 more source

Securing social security

The Washington Quarterly, 1999
Belt, Moynihan, and Schieber sketch out middle‐of‐the road proposals that combine a minimum income guarantee—a residue of Social Security—with expanded private savings accounts. This combination, they believe, offers the best compromise between a guarantee against poverty and the benefits of a private system. Nadler disputes the urgency of reform.
openaire   +1 more source

Database Security

IEEE Transactions on Software Engineering, 1978
Databases may be compromised by asking a set of queries which return only statistical information and making inferences about a specific entry from the results of the set of queries. We present methods of constructing the set of queries to compromise a database where all the queries in the set return the maximum of a set of k elements, or all queries ...
Davida, George I.   +3 more
openaire   +1 more source

State Security, Societal Security, and Human Security

Jadavpur Journal of International Relations, 2017
Generally speaking, the traditional approach of security mainly regards states as a sole referent object of security and refutes any attempt to broaden the concept of security. This understanding is known as a realist approach. This approach, however, has been recently challenged by the Copenhagen School, the Welsh School, and the human security ...
openaire   +1 more source

Software Security: Building Security In

2006 17th International Symposium on Software Reliability Engineering, 2006
Summary form only given. Software security has come a long way in the last few years, but we've really only just begun. I will present a detailed approach to getting past theory and putting software security into practice. The three pillars of software security are applied risk management, software security best practices (which I call touchpoints ...
openaire   +1 more source

Security

Introduction to Security, 2019
The security field is always evolving. This, given the turbulent world in which we all live, requires the security professional to remain fluid in adjusting protective strategies to protect employees, property, assets, and revenue of the business ...
R. Fischer   +2 more
semanticscholar   +1 more source

SECURING COMMUNITY, SECURING BUSINESS! MANAGERS SECURITY AWARENESS THROUGH ELEARNING

eLearning and Software for Education, 2012
Contemporary approach of the intelligence domain is due to substantial changes that the umbrella concept of security has suffered in postmodern society and to the fact that at present nations have to face an extremely diverse range of threats. Comparing with other country, traditional Romanian academic programs for studying intelligence and security ...
openaire   +1 more source

Home - About - Disclaimer - Privacy