Results 101 to 110 of about 2,430,883 (250)

Adapting Security Policy at Runtime for Connected Autonomous Vehicles

open access: green, 2016
Hassan Loulou   +3 more
openalex   +2 more sources

Food Security in Developing Countries [PDF]

open access: yes
This paper provides a systematic definition of food security, focusing on its different dimensions; examines the nature and magnitude of the different dimensions of food insecurity in developing countries; discusses the difficult tradeoffs that policy ...
Boughton, Duncan   +2 more
core   +1 more source

Microplastics Pollution as an Invisible Potential Threat to Food Safety and Security, Policy Challenges and the Way Forward. [PDF]

open access: yesInt J Environ Res Public Health, 2020
Usman S   +9 more
europepmc   +1 more source

Smallholder Marketing Behavior and Urban Consumption Patterns in Eastern and Southern Africa [PDF]

open access: yes
Accurate information on farmer and consumer behavior is the foundation for identifying public investments and policies that can effectively promote national food security and income growth objectives.
Anonymous
core   +1 more source

Security Policy of Digital Signature Usage in an Enterprise

open access: yesБезопасность информационных технологий, 2013
Security policy of digital signature usage in an enterprise is developed. It is a part of the information security documents set. This paper presents the text of created document.
Emma Emanuilovna Yandybaeva   +1 more
doaj  

Where Do Consumers in Nairobi Purchase their Food and Why Does this Matter? The Need for Investment to Improve Kenya's "Traditional" Food Marketing System [PDF]

open access: yes
Published by Tegemeo Institute for Agricultural Policy and Developmentfood security, food policy, Kenya, food marketing system, Food Consumption/Nutrition/Food Safety, Q18,
Ayieko, Miltone W.   +3 more
core   +1 more source

The Use of DLP-systems for the Protection of Personal Data

open access: yesБезопасность информационных технологий, 2012
The issues of the principal possibility of the application of DLP-systems (Data Leak Prevention System) for the protection of personal data are considered.
I. S. Boridko   +2 more
doaj  

Home - About - Disclaimer - Privacy