Search results

Jump to navigation Jump to search

Page title matches

  • 34 bytes (4 words) - 02:58, 16 February 2009
  • #REDIRECT [[USCG National Security Cutter]]
    43 bytes (5 words) - 00:36, 17 April 2008
  • ...does have a world-class intelligence analysis capability in the [[Canadian Security Intelligence Service]]. ...were trained through an exchange program with the [[American]] [[National Security Agency]].
    2 KB (206 words) - 22:10, 22 June 2024
  • #REDIRECT [[United Nations Security Council]]
    45 bytes (5 words) - 13:22, 16 February 2009
  • 146 bytes (22 words) - 10:43, 17 June 2011
  • Brief description of email security problems and solutions.
    95 bytes (11 words) - 19:08, 23 September 2009
  • In [[information security]], the processes of [[identification, authentication and credentialing]] ar *Something you '''have''' (e.g., a [[key (lock)]], [[security token]] or credit card)
    2 KB (292 words) - 14:55, 20 May 2010
  • #REDIRECT [[United Nations Security Council]]
    45 bytes (5 words) - 13:23, 16 February 2009
  • #Redirect [[USCG National Security Cutter]]
    43 bytes (5 words) - 14:22, 19 April 2008
  • {{r|Computer security||**}} {{r|Communications security||**}}
    316 bytes (34 words) - 10:56, 27 February 2010
  • 238 bytes (34 words) - 13:42, 6 April 2024
  • {{r|Security}} ===Transmission security===
    627 bytes (77 words) - 14:21, 23 June 2024
  • 18 bytes (2 words) - 23:36, 15 January 2009
  • ...e combat of the Afghanistan War (2001-2021) is over, and the International Security Assistance Force has a dual mission of improving the Government of the Isla ...itional, and now elected, government of Afghanistan “in the maintenance of security in Kabul and its surrounding areas, so that the Afghan Interim Authority as
    7 KB (999 words) - 07:30, 18 March 2024
  • #REDIRECT [[U.S. Department of Homeland Security]]
    50 bytes (7 words) - 03:08, 31 January 2009
  • #redirect [[Port Security grant]]
    33 bytes (4 words) - 19:55, 12 July 2022
  • ...t (i.e., "veto") any Resolution, and a rotating group of nations. Only the Security Council has the authority to order [[peace operations]], economic sanctions Decisions of the UNSC are recorded in [[United Nations Security Council resolutions]].
    1 KB (163 words) - 10:10, 28 February 2024
  • Auto-populated based on [[Special:WhatLinksHere/Operations security]]. Needs checking by a human. {{r|Intelligence cycle security}}
    568 bytes (70 words) - 15:14, 31 May 2024
  • 188 bytes (21 words) - 16:20, 19 April 2024
  • ...tates of America]], chaired by the Assistant to the President for National Security Affairs, and, by extension, the professional staff reporting to the Assista
    301 bytes (43 words) - 08:34, 21 March 2024

Page text matches

  • ...to the British [[Security Service]], Israeli [[Shin Bet]] or the national security division of the [[Federal Bureau of Investigation]]
    322 bytes (43 words) - 14:10, 7 September 2009
  • The position of having bought a [[security (finance)|security]] or [[derivative]] (often with the intention of selling it when its market
    247 bytes (36 words) - 04:35, 4 December 2012
  • === BCPs relevant to email security === ...nd even controversial. Most of the IETF recommendations relevant to email security are found in a series of documents called Best Current Practices (BCPs).
    1 KB (200 words) - 17:37, 9 October 2009
  • ...ligence official, who rose from the [[Cheka]] until becoming Head of State security; managed [[Soviet nuclear program]]; attempted to assume power after the de
    314 bytes (45 words) - 16:45, 10 February 2024
  • ...or KGB). The KGB, in turn, was one of a long sequence of "Organs of State Security" under the Soviet government, and can trace its origin to the [[Okhrana]] o
    612 bytes (67 words) - 08:11, 4 May 2024
  • ...ton D.C.]] law firm of [[Shea and Gardner]] he worked with former National Security Advisor [[Brent Scowcroft]]. Security Advisor
    2 KB (204 words) - 12:58, 18 February 2024
  • {{r|Directorate of Security Affairs (Iraq)}} {{r|Special Security Organization}}
    588 bytes (73 words) - 08:11, 4 May 2024
  • ...contains unique identifier but is usually not time-synchronized as is a [[security token]]; often used to enforce software licensing
    387 bytes (53 words) - 11:23, 7 May 2010
  • ...c Security Task Force (Region V); adviser, [[Jewish Institute for National Security Affairs]]
    290 bytes (37 words) - 20:11, 17 July 2009
  • ...he first director of the [[Social Security in the USA|United States Social Security Administration]]. ...the law. His major contribution here was the 1939 revision of the Social Security Act which introduced an expansion of benefits.
    881 bytes (134 words) - 06:48, 5 December 2011
  • ...y of Homeland Security''' heads the [[United States Department of Homeland Security]]. In the [[Obama administration]], the incumbent is [[Janet Napolitano]].
    256 bytes (34 words) - 11:39, 3 February 2009
  • {{r|Triangle Institute for Security Studies}} {{r|Center for a New American Security}}
    531 bytes (75 words) - 11:01, 3 October 2009
  • ...and worldwide infrastructure such as [[food security|food]] and [[economic security]]; also a target of [[conspiracy theory|conspiracy theorists]] as a "hidden
    299 bytes (40 words) - 12:50, 3 November 2010
  • {{r|Information security||**}} {{r|Computer security||***}}
    543 bytes (68 words) - 11:40, 25 June 2024
  • A [[security (finance)|security]] for which the [[collateral (finance)|collateral]] and source of cash flow
    333 bytes (47 words) - 12:03, 18 March 2010
  • ...e staff and Republican Staff Director of the Subcommittee on International Security, Proliferation, and Federal Services, [[U.S. Senate Committee on Government
    347 bytes (42 words) - 16:00, 10 June 2024
  • {{r|Israeli intelligence and security services}} ===Other Israeli security services===
    439 bytes (55 words) - 08:41, 4 May 2024
  • ...ecurity Reform]], Counselor, Council on Foreign Relations; Deputy National Security Advisor for Strategic Planning, Presidential Envoy to Iraq and Coordinator
    390 bytes (50 words) - 12:01, 19 March 2024
  • ...yield to maturity). Calculated as the [[internal rate of return]] of the security.
    334 bytes (49 words) - 05:22, 5 February 2010
  • ...ied price on a given date. Used as a way of borrowing or lending using the security as collateral. (The interest rate charged is known as the "repo rate").
    285 bytes (50 words) - 15:39, 17 October 2009
View ( | ) (20 | 50 | 100 | 250 | 500)