Search results
Jump to navigation
Jump to search
Page title matches
- 34 bytes (4 words) - 02:58, 16 February 2009
- #REDIRECT [[USCG National Security Cutter]]43 bytes (5 words) - 00:36, 17 April 2008
- ...does have a world-class intelligence analysis capability in the [[Canadian Security Intelligence Service]]. ...were trained through an exchange program with the [[American]] [[National Security Agency]].2 KB (206 words) - 22:10, 22 June 2024
- #REDIRECT [[United Nations Security Council]]45 bytes (5 words) - 13:22, 16 February 2009
- 146 bytes (22 words) - 10:43, 17 June 2011
- Brief description of email security problems and solutions.95 bytes (11 words) - 19:08, 23 September 2009
- In [[information security]], the processes of [[identification, authentication and credentialing]] ar *Something you '''have''' (e.g., a [[key (lock)]], [[security token]] or credit card)2 KB (292 words) - 14:55, 20 May 2010
- #REDIRECT [[United Nations Security Council]]45 bytes (5 words) - 13:23, 16 February 2009
- #Redirect [[USCG National Security Cutter]]43 bytes (5 words) - 14:22, 19 April 2008
- {{r|Computer security||**}} {{r|Communications security||**}}316 bytes (34 words) - 10:56, 27 February 2010
- 238 bytes (34 words) - 13:42, 6 April 2024
- {{r|Security}} ===Transmission security===627 bytes (77 words) - 14:21, 23 June 2024
- 18 bytes (2 words) - 23:36, 15 January 2009
- ...e combat of the Afghanistan War (2001-2021) is over, and the International Security Assistance Force has a dual mission of improving the Government of the Isla ...itional, and now elected, government of Afghanistan “in the maintenance of security in Kabul and its surrounding areas, so that the Afghan Interim Authority as7 KB (999 words) - 07:30, 18 March 2024
- #REDIRECT [[U.S. Department of Homeland Security]]50 bytes (7 words) - 03:08, 31 January 2009
- #redirect [[Port Security grant]]33 bytes (4 words) - 19:55, 12 July 2022
- ...t (i.e., "veto") any Resolution, and a rotating group of nations. Only the Security Council has the authority to order [[peace operations]], economic sanctions Decisions of the UNSC are recorded in [[United Nations Security Council resolutions]].1 KB (163 words) - 10:10, 28 February 2024
- Auto-populated based on [[Special:WhatLinksHere/Operations security]]. Needs checking by a human. {{r|Intelligence cycle security}}568 bytes (70 words) - 15:14, 31 May 2024
- 188 bytes (21 words) - 16:20, 19 April 2024
- ...tates of America]], chaired by the Assistant to the President for National Security Affairs, and, by extension, the professional staff reporting to the Assista301 bytes (43 words) - 08:34, 21 March 2024
Page text matches
- ...to the British [[Security Service]], Israeli [[Shin Bet]] or the national security division of the [[Federal Bureau of Investigation]]322 bytes (43 words) - 14:10, 7 September 2009
- The position of having bought a [[security (finance)|security]] or [[derivative]] (often with the intention of selling it when its market247 bytes (36 words) - 04:35, 4 December 2012
- === BCPs relevant to email security === ...nd even controversial. Most of the IETF recommendations relevant to email security are found in a series of documents called Best Current Practices (BCPs).1 KB (200 words) - 17:37, 9 October 2009
- ...ligence official, who rose from the [[Cheka]] until becoming Head of State security; managed [[Soviet nuclear program]]; attempted to assume power after the de314 bytes (45 words) - 16:45, 10 February 2024
- ...or KGB). The KGB, in turn, was one of a long sequence of "Organs of State Security" under the Soviet government, and can trace its origin to the [[Okhrana]] o612 bytes (67 words) - 08:11, 4 May 2024
- ...ton D.C.]] law firm of [[Shea and Gardner]] he worked with former National Security Advisor [[Brent Scowcroft]]. Security Advisor2 KB (204 words) - 12:58, 18 February 2024
- {{r|Directorate of Security Affairs (Iraq)}} {{r|Special Security Organization}}588 bytes (73 words) - 08:11, 4 May 2024
- ...contains unique identifier but is usually not time-synchronized as is a [[security token]]; often used to enforce software licensing387 bytes (53 words) - 11:23, 7 May 2010
- ...c Security Task Force (Region V); adviser, [[Jewish Institute for National Security Affairs]]290 bytes (37 words) - 20:11, 17 July 2009
- ...he first director of the [[Social Security in the USA|United States Social Security Administration]]. ...the law. His major contribution here was the 1939 revision of the Social Security Act which introduced an expansion of benefits.881 bytes (134 words) - 06:48, 5 December 2011
- ...y of Homeland Security''' heads the [[United States Department of Homeland Security]]. In the [[Obama administration]], the incumbent is [[Janet Napolitano]].256 bytes (34 words) - 11:39, 3 February 2009
- {{r|Triangle Institute for Security Studies}} {{r|Center for a New American Security}}531 bytes (75 words) - 11:01, 3 October 2009
- ...and worldwide infrastructure such as [[food security|food]] and [[economic security]]; also a target of [[conspiracy theory|conspiracy theorists]] as a "hidden299 bytes (40 words) - 12:50, 3 November 2010
- {{r|Information security||**}} {{r|Computer security||***}}543 bytes (68 words) - 11:40, 25 June 2024
- A [[security (finance)|security]] for which the [[collateral (finance)|collateral]] and source of cash flow333 bytes (47 words) - 12:03, 18 March 2010
- ...e staff and Republican Staff Director of the Subcommittee on International Security, Proliferation, and Federal Services, [[U.S. Senate Committee on Government347 bytes (42 words) - 16:00, 10 June 2024
- {{r|Israeli intelligence and security services}} ===Other Israeli security services===439 bytes (55 words) - 08:41, 4 May 2024
- ...ecurity Reform]], Counselor, Council on Foreign Relations; Deputy National Security Advisor for Strategic Planning, Presidential Envoy to Iraq and Coordinator390 bytes (50 words) - 12:01, 19 March 2024
- ...yield to maturity). Calculated as the [[internal rate of return]] of the security.334 bytes (49 words) - 05:22, 5 February 2010
- ...ied price on a given date. Used as a way of borrowing or lending using the security as collateral. (The interest rate charged is known as the "repo rate").285 bytes (50 words) - 15:39, 17 October 2009