Results 301 to 310 of about 5,759,507 (353)
Some of the next articles are maybe not open access.

Securing the security

City, 2014
During the industrial era, the world's largest private security firm was the Pinkerton National Detective Agency.
openaire   +1 more source

Securing social security

The Washington Quarterly, 1999
Belt, Moynihan, and Schieber sketch out middle‐of‐the road proposals that combine a minimum income guarantee—a residue of Social Security—with expanded private savings accounts. This combination, they believe, offers the best compromise between a guarantee against poverty and the benefits of a private system. Nadler disputes the urgency of reform.
openaire   +1 more source

Database Security

IEEE Transactions on Software Engineering, 1978
Databases may be compromised by asking a set of queries which return only statistical information and making inferences about a specific entry from the results of the set of queries. We present methods of constructing the set of queries to compromise a database where all the queries in the set return the maximum of a set of k elements, or all queries ...
Davida, George I.   +3 more
openaire   +1 more source

State Security, Societal Security, and Human Security

Jadavpur Journal of International Relations, 2017
Generally speaking, the traditional approach of security mainly regards states as a sole referent object of security and refutes any attempt to broaden the concept of security. This understanding is known as a realist approach. This approach, however, has been recently challenged by the Copenhagen School, the Welsh School, and the human security ...
openaire   +1 more source

Software Security: Building Security In

2006 17th International Symposium on Software Reliability Engineering, 2006
Summary form only given. Software security has come a long way in the last few years, but we've really only just begun. I will present a detailed approach to getting past theory and putting software security into practice. The three pillars of software security are applied risk management, software security best practices (which I call touchpoints ...
openaire   +1 more source

SECURING COMMUNITY, SECURING BUSINESS! MANAGERS SECURITY AWARENESS THROUGH ELEARNING

eLearning and Software for Education, 2012
Contemporary approach of the intelligence domain is due to substantial changes that the umbrella concept of security has suffered in postmodern society and to the fact that at present nations have to face an extremely diverse range of threats. Comparing with other country, traditional Romanian academic programs for studying intelligence and security ...
openaire   +1 more source

Security Regimes: Collective Security and Security Communities

2017
The twentieth century was marked by the proliferation of security regimes, and collective security in particular. Under a collective security arrangement, all states at either a regional or global level agree to resolve their disputes peacefully, collectively oppose acts of aggression, and actively defend those who are victims of such aggression. It is
openaire   +1 more source

Data Security

Journal of Chemical Information and Computer Sciences, 1975
Data security is a rich and complex subject dealing with the protection of the computing capability from all threats to its continuity. Some fundamental elements of the process of achieving a reasonable, prudent measure of that protection are considered.
openaire   +2 more sources

Hospital security

Nursing Standard, 1991
Following the attack on a nursing auxiliary at Manchester's Christie Hospital nurses are calling for Government action on security.
openaire   +2 more sources

Food Security

2020
This chapter presents a history of food crises to illustrate the need for greater food security, and it urges government leaders to learn from the past and take action when the next inevitable crisis arises. Six priorities for action are presented, recognizing the roles of violent conflict, water, weather patterns, inequality, women, and waste ...
openaire   +1 more source

Home - About - Disclaimer - Privacy