Vulnerability has been defined as the characteristics of a person or a group of persons i.e. in terms of their capacity to cope with, anticipate, resist and recover from the impacts of natural or man-made hazards or any external event. Vulnerability is also defined as the inability to withstand the effects of hostile environment. Hostile environment refers to livelihood security in this research. Concept of vulnerability is described within five categories of livelihood security, which are...
Topics: Vulnerability, livelihood security, health security, social security, economic security, food...
Vulnerability has been defined as the characteristics of a person or a group of persons i.e. in terms of their capacity to cope with, anticipate, resist and recover from the impacts of natural or man-made hazards or any external event. Vulnerability is also defined as the inability to withstand the effects of hostile environment. Hostile environment refers to livelihood security in this research. Concept of vulnerability is described within five categories of livelihood security, which are...
Topics: Vulnerability, livelihood security, health security, social security, economic security, food...
7
7.0
Jul 25, 2020
07/20
by
Wallulis, Jerald, 1947-
texts
eye 7
favorite 1
comment 0
xviii, 237 p. : 24 cm
Topics: Job security, Economic security, Social security
Vulnerability has been defined as the characteristics of a person or a group of persons i.e. in terms of their capacity to cope with, anticipate, resist and recover from the impacts of natural or man-made hazards or any external event. Vulnerability is also defined as the inability to withstand the effects of hostile environment. Hostile environment refers to livelihood security in this research. Concept of vulnerability is described within five categories of livelihood security, which are...
Topics: Vulnerability, livelihood security, health security, social security, economic security, food...
9
9.0
Jun 3, 2021
06/21
by
Caldwell, Dan
texts
eye 9
favorite 0
comment 0
x, 241 p. ; 23 cm
Topics: Security, International, National security, Internal security, Economic security, Security...
4
4.0
Apr 18, 2022
04/22
by
Caldwell, Dan
texts
eye 4
favorite 0
comment 0
xii, 327 pages ; 24 cm
Topics: Security, International, National security, Internal security, Economic security, Security...
4
4.0
Apr 13, 2022
04/22
by
Zedner, Lucia
texts
eye 4
favorite 0
comment 0
x, 206 p. ; 20 cm
Topics: Security systems industry, Security systems, National security, Security, International
112
112
Nov 9, 2004
11/04
by
http://www.plaxoft.com/en/products/security/
software
eye 112
favorite 0
comment 0
This program helps you identify insecure Web sites and move them to the restricted zone with just one click. The integrated configuration assistant helps you securing your surfing environment. While surfing the Web you confirm any ActiveX usage. You can identify advertising providers and move them into the restricted zone.
Topics: Security Zone Manager, Internet, Security, Security applications, Security Zone Manager
This essay presents the results of a study which surveyed the various aspects of system security hardware, software, and procedural techniques in use in current and proposed automated systems. Its impetus is from the concern for security control that has been generated by the increasing number of time-sharing and resource-sharing systems. The intention is to present the designers, managers, programmers, system implementers, and operational personnel with a consolidated source of data concerning...
Topics: Computer science, Data security, Computer security, Access security, Privacy/security
19
19
texts
eye 19
favorite 1
comment 0
439 pages : 22 cm
Topics: Database security, Industries -- Security measures, Corporations -- Security measures --...
429
429
Jul 5, 2014
07/14
by
BODUNDE, DAVID OLUWAFEMI, OLA, ADEGBOYEGA A & AFOLABI, MUYIWA BAMIDELE
texts
eye 429
favorite 0
comment 0
There is paucity of literature on internal security in Nigeria unlike other forms of security. Nigeria, a populous country in Africa has put in place certain numbers of security outfits to protect lives and properties of its citizenry yet the trend of criminality and security challenges are on the increase on daily bases. This study examines the security challenges in the country and assesses the role of internal security outfit. The Nigerian Police are the preeminent outfit saddled...
Topics: : Security, Threat, Internal Security, National Security, Challenges
951
951
movies
eye 951
favorite 0
comment 0
Dinesh Nair - From Script Kiddies to Security Consultants Frequently, the press has misrepresented hackers, crackers and script kiddies. There is a lot of myth and aura about practitioners of computer and network security. This presentation traces the journey of one such individual as he progresses from playing with the public switched telephone system to the TCP/IP networks of today, and the mobile and 3G networks of tomorrow.
Topics: security, hack, vulnerabilities, security conference, security professional
319
319
movies
eye 319
favorite 0
comment 0
HITBSecConf2003 Panel Discussion A panel discussion comprising (left to right): * HD Moore * Shreeraj Shah * Adam Gowdiak (LSD) * Job De Haas * Kol. Hussin (NISER/MyCERT) * Nitesh Dhanjani * Dr. Dinesh Nair * Shamsul Jafni (MCMC)
Topics: hack, security, vulnerabilities, security conference, security professional
Cyber Security has developed one of the biggest challenges of information technology in the present day. Cyber security consists of controlling physical access of the hardware, application, networks and protecting against harm that may come via networks. It is a mixture of processes, technologies and practices. The objective of cyber Security is to protect programs, application, networks, computers and data from attack. Moreover, various measures of cyber security is quite a very huge concern...
Topics: Computer Security, cyber security, cybercrime, Security Attacks
332
332
movies
eye 332
favorite 0
comment 0
Simos Xenitellis - Event-driven system security vulnerabilities, an overview and demonstration The event-driven model is used to implement software systems like graphical user interfaces (GUIs). An example of such a GUI is Microsoft Windows which we examine in detail. In an event-driven system, applications communicate with each other and with the system through events. While in Windows NT/2000/XP/2003 there is memory protection between applications belonging to different users, there is no...
Topics: hack, security, vulnerabilities, security conference, security professional
824
824
Nov 9, 2004
11/04
by
http://www.safety-lab.com/en/products/1.htm
software
eye 824
favorite 1
comment 0
This set of security scanning tools audits your network security.
Topics: Shadow Security Scanner, Internet, Security, Security applications, Shadow Security Scanner
138
138
Nov 8, 2004
11/04
by
http://www.cronoslogic.com/product/onux
software
eye 138
favorite 0
comment 0
This security suite includes a virtual keyboard to defeats keylogging viruses, passwords of up to 1024 characters, file shredding and Internet cache file shredding.
Topics: Onux - PC Security, Internet, Security, Security applications, Onux - PC Security
49
49
Oct 14, 2017
10/17
by
iaset
texts
eye 49
favorite 0
comment 0
With the invention of the internet and new networking technologies, the world has become more interconnected. The concept of network securities is becoming more eminent due to easily acquirable intellectual properties. Network security covers an assortment of computer networks, both public and private, that are utilized as a part of ordinary activity directing exchanges and interchanges among organizations, government offices and people. In this research, discussion paper on the concept of...
Topics: Network Security, Wireless Network Security, IP Security, Electronic Mail Security, Transport-Level...
41
41
Oct 18, 2010
10/10
by
Turnbull, John Gudert, 1913-; Williams, C. Arthur (Chester Arthur), 1924- joint author; Cheit, Earl Frank, joint author
texts
eye 41
favorite 1
comment 0
Includes bibliographical references
Topics: Economic security, Social security
Jude 1-2 Saved, Set Apart, and Secure
Topics: Salvation, security, eternal security
Border security has become an increasingly public topic since the events of September 11, 2001. Customs and Border Protection (CBP) is one of the Department of Homeland Security's largest and most complex components, with a priority mission of keeping terrorists and their weapons out of the United States (U.S.). It also has a responsibility for securing and facilitating trade and travel while enforcing hundreds of U.S. regulations, including immigration and drug laws. When CBP was created, the...
Topics: National security, Border security
Newberry French Pamphlet Collection
61
61
Dec 14, 2016
12/16
by
France. Corps législatif (1795-1814). Conseil des cinq-cents.; France. Corps législatif (1795-1814). Conseil des cinq-cents
texts
eye 61
favorite 0
comment 0
Caption title. Imprint from colophon
Topics: Internal security, Internal security
This thesis presents a wide spectrum of computer data security, including both practical and theoretical aspects of the subject. It was motivated by the concern for the general lack of adequate knowledge, techniques, implementation, and application of computer data security. The objective was to (1) review the pertinent features of data security and the relationship of these features to the computer and its users; (2) generate an awareness of the techniques and problems in data security by...
Topics: Computer science, data security, computer security, access security, security verification system
10
10.0
texts
eye 10
favorite 0
comment 0
xiv, 453 p. : 24 cm
Topics: Private security services -- Management, Industries -- Security measures, Corporations -- Security...
This study considers how Serbian border security sector reform illuminates questions of force and statecraft in a southern European nation. In 2006, Serbia became a member of the Partnership for Peace (PfP), a step toward a North Atlantic Treaty Organization (NATO) membership; however, Serbia has indicated no intention to become a full NATO member. Also in 2006, Serbia entered into a Stabilization and Association Agreement (SAA) with the European Union (EU) as part of the process of accession...
Topics: National security, Border security
7
7.0
Jan 12, 2022
01/22
by
Ortmeier, P. J
texts
eye 7
favorite 0
comment 0
xx, 409 p. : 24 cm
Topics: Private security services -- Management, Buildings -- Security measures, Industries -- Security...
9
9.0
texts
eye 9
favorite 0
comment 0
xviii, 290 p. ; 25 cm
Topics: Security, International, National security
3
3.0
texts
eye 3
favorite 0
comment 0
xxii, 232 pages : 23 cm
Topics: Social security -- India, Economic security -- India, Economic security, Social security, India
4
4.0
Jun 6, 2021
06/21
by
Ronald Johnson (gearwarrior)
data
eye 4
favorite 0
comment 0
Another cover. This one has slotted mount. This way it can accept a few different manufacturers. Make sure you look at the complimentary service carrier; https://www.thingiverse.com/thing:3722015 If you bought one of 'those' (Security Cameras) and it came with 'that' (Odd RJ45 plug) and is powered by 'this' (12 volt DC adapter)... Or, you can bolt whatever you want on there. I did put weep holes in it, but I'd still suggest stainless nuts and bolts. I've printed a few in different arrangements...
Topics: Other, security_camera, security, thingiverse, stl, security_camera_mount, Home_security
17,845
18K
Nov 6, 2004
11/04
by
http://www.tropsoft.com/pcsecurity
software
eye 17,845
favorite 2
comment 0
This program offers Explorer control, file lock, folder lock, system lock, Internet lock, shortcut and program Lock, restricted system, Window lock, intruder detection with alarm, flexible and complete password protection and drag-and-drop support.
Topics: PC Security, Internet, Security, System locking, pc, security, pcsecurity, pc security
7
7.0
Mar 16, 2021
03/21
by
Erik Peterson (keylitho)
data
eye 7
favorite 0
comment 0
This is a rain hood for the Nest Cam Ourdoor. It has a little drip edge on it so water will not run back up the hood.. It works pretty good especially if your camera is tipped down a bit. NOTE: You can NOT see this hood in the camera... so no view is blocked.. Just use some dbl sided thin foam tape to stick it on. See My other uploads for Wire Grommet for this camera.. https://www.thingiverse.com/thing:3170822
Topics: security_camera, security_camera_mount, Household, stl, security, thingiverse, Home_security
18
18
Jul 12, 2018
07/18
by
Bonnell, Ralph
texts
eye 18
favorite 0
comment 0
1 online resource (xxiv, 414 pages) :
Topics: Firewalls (Computer security), COMPUTERS -- Internet -- Security, COMPUTERS -- Networking --...
Newberry French Pamphlet Collection
62
62
Feb 7, 2017
02/17
by
Rhône-et-Loire (France). Directoire; Bruyset, Jean Marie, 1749-1817, publisher
texts
eye 62
favorite 0
comment 0
Caption title
Topics: Internal security, Internal security
Using a set of presented package and properties through the internet is called cloud computing. Data hubs located everywhere the world offer the cloud services. As this field of machinery seen a express growth in current times, security has been the foremost distress. Security is the main issues for all technology both it was from past or newly modernized. The information might be own or executive data stored in the cloud is facing probable dangers from hackers and there is a need to...
Topics: Cloud Computing, Cloud Security, Security Threats, Security Techniques, Cloud Security Principles.
100
100
May 18, 2018
05/18
by
Cole, Eric;Krutz, Ronald L., 1938-;Conley, James W
texts
eye 100
favorite 5
comment 0
1 online resource (xxxiv, 660 pages) :
Topics: Computer security, Computer networks -- Security measures, COMPUTERS -- Internet -- Security,...
The current understanding of the concept of homeland security in the United States—measures taken to protect the United States from terrorist attacks and to recover from natural disasters—has resulted in a practical approach that largely ignores many threats to the security of the average American. A deeper analysis of the insecurities faced by the American people reveals that the security of the homeland is a complex system of interconnected varieties of security including food, health,...
Topics: homeland security, homeland security theory, department of homeland security, DHS, homeland...
23
23
Dec 17, 2019
12/19
by
Speed, Tim
texts
eye 23
favorite 2
comment 0
1 online resource (xviii, 398 pages) :
Topics: Internet -- Security measures, Computer networks -- Security measures, Computer security, COMPUTERS...
46
46
May 2, 2012
05/12
by
Rejda, George E., 1931-
texts
eye 46
favorite 1
comment 0
Cover title: Social insurance & economic security
Topics: Social security, Economic security
19
19
Feb 4, 2020
02/20
by
Cady, Glee Harrah
texts
eye 19
favorite 0
comment 0
1 online resource (xix, 652 pages) :
Topics: Computer security, Digital communications -- Security measures, COMPUTERS -- Internet -- Security,...
512
512
movies
eye 512
favorite 0
comment 0
Suresh Ramasamy (TimeDotCom) Cryptography Demystified
Topics: hack, security, vulnerabilities, cryptography, security conference, security professional
4
4.0
Oct 7, 2021
10/21
by
Reveron, Derek S
texts
eye 4
favorite 0
comment 0
xv, 255 p. : 23 cm
Topics: Security, International, National security, National security -- United States
579
579
movies
eye 579
favorite 0
comment 0
Shreeraj Shah - Defending Web Applications: Strategies, methods and practices Web applications can not be defended by firewall or any other security products. Web application defense strategies require secure coding at application level, knowing your application and protecting them by human intelligence. Knowing your application can lead to profiling your web assets in logical way. Profiling web assets provides better picture of various possible attacks set. Knowing entire attack set greatly...
Topics: hack, web, security, vulnerabilities, security conference, security professional
61
61
texts
eye 61
favorite 2
comment 0
1 online resource (xxxiv, 787 pages) :
Topics: Computer networks -- Security measures, Computer security, COMPUTERS -- Internet -- Security,...
When classified data of different classifications are stored in a database, it is necessary for a contemporary database system to pass through other classified data to find the properly classified data. Although the user of the system may only see data classified at the user's level, the database system itself has breached the security by bringing the other classified data into the main memory from secondary storage. Additionally, the system is not efficient as it could be because unnecessary...
Topics: Computer science, database security, multilevel security, computer security
Host-based intrusion-prevention systems are recently popular technologies which protect computer systems from malicious attacks. Instead of merely detecting exploits, the systems attempt to prevent the exploits from succeeding on the host they protect. This research explores the threats that have led to the development of these systems and the techniques many use to counter those problems. We then evaluate two current intrusion-prevention products (McAfee Entercept and the Cisco Security Agent)...
Topics: Computer security, Computer networks, Security measures, Security systems
"A summary of papers read at the National Conference of State Manufactures, Pittsburgh, Pa., Jan. 11, 1918 ... Toledo Academy of Medicine, Toledo, Ohio, March 7, 1919, etc. materially enlarged, thorougly revised and brought down to date."
Topics: Health insurance, Social security, Social security, Social security
0
0.0
texts
eye 0
favorite 0
comment 0
302 pages ; 25 cm
Topics: National security -- Pakistan, Internal security -- Pakistan, Internal security, National security,...
39
39
Apr 27, 2020
04/20
by
Newman, Robert C
texts
eye 39
favorite 1
comment 0
xxviii, 453 p. : 24 cm
Topics: Database security, Computer security, Computer networks -- Security measures
2,096
2.1K
movies
eye 2,096
favorite 0
comment 0
Last Stage of Delirium (LSD) - Security Myths The presentation will discuss various security myths that are still common in the security community. The talk will be strongly based upon history and experiences of the LSD Research Group and most well known projects and events the group participated in. Using the specific case studies, impact of several dangerous security myths related to specific technologies or a general approach to security problems will be presented. Finally, the holistic view...
Topics: security, hack, vulnerability, myth, security professional, security conference
280
280
movies
eye 280
favorite 0
comment 0
Sukdev Singh (ISS) Protecting Your Business From Phishing and Internet Attacks (persentation material in zip)
Topics: hack, security, vulnerabilities, phishing, security conference, security professional