Current Search:   Security (x)

View All Items

  • CSV Spreadsheet
(1 - 20 of 63)

Pages

An Approach for Measuring the Confidentiality of Data Assured by the Confidentiality of Information Security Systems in Healthcare Organizations
Assessment of Information Security Culture in Higher Education
Stability and the Nth country problem
Concerted action or isolation: Which is the road to peace
REGIONAL READINESS FOR INTELLIGENCE INFORMATION SHARING TO SUPPORT HOMELAND SECURITY
Enhanced Hardware Security Using Charge-Based Emerging Device Technology
Geneva and peace
Social insurance
DESIGN AND HARDWARE IMPLEMENTATION OF A NOVEL SCRAMBLING SECURITY ALGORITHM FOR ROBUST WIRELESS LOCAL AREA NETWORKS
National Security and Political Polarization
On the security of NoSQL cloud database services
Social security in a Soviet America
OPINIONS ON GOVERNMENT SPENDING ON SOCIAL SECURITY: A YEAR AND COHORT ANALYSIS
FOOD AVAILABILITY IN EATONVILLE, FLORIDA
D-FENS: DNS Filtering (&) Extraction Network System for Malicious Domain Names
DEATH AND DISENGAGEMENT: A CRITICAL ANALYSIS OF THE INTERNATIONAL COMMUNITYÂÂ'S INTERVENTION EFFORT IN DARFUR
ENVIRONMENTAL SECURITY IN THE GLOBAL CAPITALIST SYSTEM: A WORLD-SYSTEMS APPROACH AND STUDY OF PANAMA
Game-Theoretic Frameworks and Strategies for Defense Against Network Jamming and Collocation Attacks
ENHANCING MESSAGE PRIVACY IN WIRED EQUIVALENT PRIVACY.
EXTENDING DISTRIBUTED TEMPORAL PROTOCOL LOGIC TO A PROOF BASED FRAMEWORK FOR AUTHENTICATION PROTOCOLS

Pages