security

Ministers of State (Checks for Security Purposes) Bill 2019 / The Senate Finance and Public Administration Legislation Committee

Australia. Parliament. Senate. Finance and Public Administration Legislation Committee, author, issuing body




security

Renewable power systems dynamic security / Gaber Magdy, Gaber Shabib, Adel A. Elbaset, Yasunori Mitani

Online Resource




security

Security stepped up for Narendra Modi’s Agra rally



  • Cities
  • DO NOT USE Uttar Pradesh

security

Living in common and deliberating in common [electronic resource] : foundational issues for sustainable human development and human security / guest editor P.B. Anand and Des Gasper




security

Social Security Legislation Amendment (Community Development Program) Bill 2018 / Community Affairs Legislation Committee

Australia. Parliament. Senate. Community Affairs Legislation Committee, author, issuing body




security

Functional nanostructures and sensors for CBRN defence and environmental safety and security / edited by Anatolie Sidorenko and Horst Hahn

Online Resource




security

Advisory report on the Office of National Intelligence Bill 2018 and the Office of National Intelligence (Consequential and Transitional Provisions) Bill 2018 / Parliamentary Joint Committee on Intelligence and Security

Australia. Parliament. Joint Committee on Intelligence and Security, author




security

Advisory report on the Intelligence Services Amendment Bill 2018 / Parliamentary Joint Committee on Intelligence and Security

Australia. Parliament. Joint Committee on Intelligence and Security




security

Advisory report on the Telecommunications and Other Legslation Amendment (Assistance and Access) Bill 2018 / Parliamentary Joint Committee on Intelligence and Security

Australia. Parliament. Joint Committee on Intelligence and Security




security

Review of the Telecommunications and Other Legislation Amendment (Assistance and Access) Act 2018 / Parliamentary Joint Standing Committee on Intelligence and Security

Australia. Parliament. Joint Committee on Intelligence and Security, author, issuing body




security

Should AAP leaders be given security?

If security is needed for an AAP leader, it should be given. It's not an ideological debate.




security

Personal enmity behind Nitish ignoring Modi security: Hussain

BJP Tuesday accused Bihar Chief Minister Nitish Kumar of not providing adequate security for Narendra Modi''s Hunkar Rally.




security

Union home secy reviews security on Indo-Bangla border

The two sides also discussed the issue of allotment of land for construction of border outposts and BSF battalion headquarters across the state.




security

Experts call for bio-security as pests, diseases enter India

There is a shortage of food across the world and experts are trying to come up with ways in which the shortfall in supplies can be made up.




security

Food Security Mission remains a non-starter in UP

The UPA government''s much-hyped National Food Security Mission launched in 2007 to boost the productivity of rice....




security

In the name of food security

Punjab''s fields, mills and godowns are brimming with 172 lakh tonnes of wheat, rice, paddy. The wheat harvest is set to cross a record 120 lakh tonnes. One-third of it, worth hundreds of crores, will be stored unscientifically




security

Norton 360 Deluxe review: Comprehensive security solution with built-in VPN

The Norton 360 suite includes device protection from viruses and internet security, access to secure virtual private network (VPN), cloud storage for backup, password manager and parental controls




security

Unacademy data hacked, names and passwords put on sale: Security firm

Unacademy says its internal investigation had found e-mail data of around 11 million users was compromised.




security

Security solutions and applied cryptography in smart grid communications / [edited by] Mohamed Amine Ferrag (Guelma University, Algeria), Ahmed Ahmim (University of Larbi Tebessi, Algeria)




security

Wired's Top Five Security Stories Of 2015

2015 showed that the Internet is a dangerous place. Whether it’s your cellular-connected car or personal details on an adulterous dating website, no one seems safe anymore.




security

How to Keep Your iPhone’s Security Countermeasure From Obliterating Your Data

One of the iPhone’s hallmark security features could leave you locked out if you forget your password too many times. Here’s how to keep your data saved, in case you can't always trust your short-term memory.




security

The Frontiers Issue with Guest Editor President Barack Obama - President Barack Obama on What AI Means for National Security

WIRED guest editor President Barack Obama, WIRED editor in chief Scott Dadich and MIT Media Lab director Joi Ito discuss the challenges of cyber security in the age of artificial intelligence.




security

The iOS 11 Privacy and Security Settings You Should Set Up Right Now

Heads up, iPhone owners. iOS 11 comes with a batch of security features that merit your attention.




security

How to Lock Down Your Facebook Security and Privacy Settings

The only way to be truly secure on Facebook is to delete your account. But that's crazy talk! Here's how to lock down your privacy and security and bonus, keep targeted ads at bay.




security

Tech Today and Tomorrow Presented by DXC Technology - Why Cybersecurity is So Critical | Branded Content | Tech Today and Tomorrow | Ep. 4

Security teams used to be able to patrol on-site to ensure their company’s premises were kept safe – now it’s about building teams that can predict potential cyber threats and sabotage from individuals, companies or even hostile nations. In Part 4 of this series, WIRED Brand Lab aims to uncover what businesses can do to evolve their security techniques within a digitally enabled business world. Produced by WIRED Brand Lab for DXC Technology.




security

How Google Cloud Uses Multi-Layer Security To Protect Businesses

Produced by WIRED Brand Lab with Google Cloud | How Google Cloud Uses Multi-Layer Security To Protect Businesses




security

Insights to Improve Food Security in Malawi

Senior Researcher Kristen Velyvis highlights the long-term impact of a program designed to improve nutrition and food security for more than 200,000 households with chronic food insecurity in southern Malawi.




security

From Lambda Calculus to cybersecurity through program analysis: essays dedicated to Chris Hankin on the occasion of his retirement / Alessandra Di Pierro, Pasquale Malacaria, Rajagopal Nagarajan (eds.)

Online Resource




security

Letter to BS: Enact laws offering social security to migrant workers

The states where they migrate to earn their livelihood treat them as uninvited guests




security

ATM robbery attempt in Bangalore foiled as brave security guard fights thieves

ATM robbery attempt in Bangalore foiled as brave security guard fights thieves




security

Lack of security at military bases alarms Parl committee

Lack of security at military bases alarms Parl committee




security

Implications of artificial intelligence for cybersecurity: proceedings of a workshop / Anne Johnson and Emily Grumbling, rapporteurs ; Computer Science and Telecommunications Board ; Intelligence Community Studies Board, Division on Engineering and Physic

Online Resource




security

Risks and security of internet and systems: 14th International Conference, CRiSIS 2019, Hammamet, Tunisia, October 29-31, 2019, Proceedings / Slim Kallel, Frédéric Cuppens, Nora Cuppens-Boulahia, Ahmed Hadj Kacem (Eds.)

Online Resource




security

Trusted computing and information security: 13th Chinese conference, CTCIS 2019, Shanghai, China, October 24-27, 2019 / Weili Han, Liehuang Zhu, Fei Yan (eds.)

Online Resource




security

Trusted computing and information security: 13th Chinese Conference, CTCIS 2019, Shanghai, China, October 24-27, 2019, Revised selected papers / Weili Han, Liehuang Zhu, Fei Yan (eds.)

Online Resource




security

Privacy and security in the 21st century: who knows and controls: proceedings of a forum / prepared by Steve Olson for the National Academy of Engineering

Online Resource




security

Computer Security: ESORICS 2019 International Workshops, CyberICPS, SECPRE, SPOSE, and ADIoT, Luxembourg City, Luxembourg, September 26-27, 2019, Revised selected papers / Sokratis Katsikas, Frédéric Cuppens, Nora Cuppens, Costas Lambrinoudakis

Online Resource




security

Industrial control systems security and resiliency: practice and theory / Craig Rieger, Indrajit Ray, Quanyan Zhu, Michael A. Haney, editors

Online Resource




security

Risk and the theory of security risk assessment / Carl S. Young

Online Resource




security

[ASAP] Design of a Broadband NIR Phosphor for Security-Monitoring LEDs: Tunable Photoluminescence Properties and Enhanced Thermal Stability

Crystal Growth & Design
DOI: 10.1021/acs.cgd.0c00154




security

Aarogya Setu absolutely robust app in terms of privacy protection, security of data: Ravi Shankar Prasad

Rejecting charges by the opposition that the Aarogya Setu application breaches privacy, Union IT Minister Ravi Shankar Prasad has asserted that the platform is "absolutely robust, safe and secure" in terms of privacy protection and data security.




security

Sustaining social security in an era of population aging / John A. Turner

Online Resource




security

Labor policy to promote good jobs in Tunisia: revisiting labor regulation, social security, and active labor market programs / Diego F. Angel-Urdinola, Antonio Nucifora, and David Robalino, editors

Online Resource




security

Enhancing Retirement Success Rates in the United States: Leveraging Reverse Mortgages, Delaying Social Security, and Exploring Continuous Work / Chia-Li Chien

Online Resource




security

Insecurity, precarious work and labour markets: challenging the orthodoxy / Joseph Choonara

Online Resource




security

Salman takes his security team through 'highs, lows'

Superstar Salman Khan takes his fitness seriously. He made sure his security team helps him do that too.




security

Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA), IEEE International Conference on [electronic journal].




security

Second International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing [electronic journal].

IEEE Computer Society




security

Proceedings of the Computer Security Foundations Workshop II [electronic journal],.

IEEE Computer Society




security

Proceedings of SNDSS '97: Internet Society 1997 Symposium on Network and Distributed System Security [electronic journal].

IEEE Computer Society