Search results

Jump to navigation Jump to search

Page title matches

  • #redirect [[Port Security grant]]
    33 bytes (4 words) - 18:18, 3 March 2022
  • #REDIRECT [[Better than nothing security]]
    42 bytes (5 words) - 09:01, 3 March 2010
  • ...tegory, although there are aspects of law and policy beyond it. [[Physical security]] is another subcategory, involving the protection of persons, places, and
    493 bytes (70 words) - 05:48, 8 April 2024
  • '''Better than nothing security''', or '''BTNS''', is basically [[IPsec]] done without authentication.<ref | title = Better-Than-Nothing Security: An Unauthenticated Mode of IPsec
    3 KB (516 words) - 05:48, 8 April 2024
  • ...and not intended as a rigid standard for every system. The same level of security may be provided in some other way. For example, there is less need for pas 3) required to install all security updates promptly.<br />
    15 KB (2,320 words) - 18:53, 26 December 2010
  • 160 bytes (21 words) - 09:24, 2 March 2010
  • #REDIRECT [[Domain Name System security]]
    41 bytes (5 words) - 08:26, 3 October 2008
  • The '''Security Service''', also known historically if incorrectly as '''MI5''', is the ci
    314 bytes (44 words) - 08:11, 4 May 2024
  • #REDIRECT [[Authentication (information security)#Security token]]
    66 bytes (6 words) - 16:13, 6 May 2010
  • ...is no longer any sharp distinction between communications and information security. In a simpler world, once a user could gain access to a computer, all resou ==The Security Process==
    13 KB (2,000 words) - 16:21, 30 March 2024
  • <!-- Text is transcluded from the Security (finance)/Definition subpage-->
    87 bytes (11 words) - 08:36, 22 February 2010
  • ...that information be generated by computers or not. It complements computer security, which protects information in computers.
    650 bytes (95 words) - 16:22, 30 March 2024
  • #REDIRECT [[Security Service]]
    30 bytes (3 words) - 19:51, 5 June 2008
  • '''Social security''' is a generic term, most commonly used in the USA and UK, referring to di ...Altmeyer]], The Formative Years of Social Security: A Chronicle of Social Security Legislation and Administration, 1934-1954." Madison: University of Wisconsi
    2 KB (269 words) - 19:21, 8 June 2010
  • '''National security''', in the most objective usage, describing the totality of necessary funct ...ns aware of the context, such as the nondescript name of the U.S. National Security Agency.
    784 bytes (127 words) - 16:45, 25 March 2024
  • #REDIRECT [[Social security]]
    29 bytes (3 words) - 17:07, 27 September 2007
  • #Redirect [[Information security]]
    34 bytes (3 words) - 20:16, 24 October 2008
  • 62 bytes (6 words) - 08:38, 13 April 2010
  • ...heft or corruption, or the preservation of availability, as defined in the security policy. [[Information assurance]] discusses a related topic - how "sure" so ...ive requirements to positive enforceable rules. For this reason, computer security is often more technical and mathematical than some [[computer science]] fie
    2 KB (267 words) - 05:49, 8 April 2024
  • 188 bytes (28 words) - 10:54, 27 February 2010
  • '''Regional security''', in [[international relations]], that focuses on less than global soluti
    1 KB (151 words) - 23:14, 17 September 2010
  • <!-- Text is transcluded from the Collective security/Definition subpage-->
    88 bytes (11 words) - 10:44, 17 June 2011
  • {{seealso|Intelligence cycle security}} ...will be, or are used. It complements, but does not replace, other forms of security.
    3 KB (424 words) - 08:11, 4 May 2024
  • 300 bytes (47 words) - 13:47, 1 February 2009
  • ...regimes, the German SS did on the Wehrmacht or the Soviet Organs of State Security did on the Red Army. ...egan''), a popularly elected body; he has final command authority over all security forces.
    8 KB (1,156 words) - 07:31, 18 March 2024
  • 62 bytes (6 words) - 18:32, 18 April 2010
  • 34 bytes (4 words) - 02:58, 16 February 2009
  • 81 bytes (10 words) - 11:27, 13 December 2009
  • #Redirect [[USCG National Security Cutter]]
    43 bytes (5 words) - 14:22, 19 April 2008
  • ...have a world-class [[intelligence analysis]] capability in the [[Canadian Security Intelligence Service]]. ...were trained through an exchange program with the [[American]] [[National Security Agency]].
    2 KB (206 words) - 05:48, 8 April 2024
  • #REDIRECT [[United Nations Security Council]]
    45 bytes (5 words) - 13:22, 16 February 2009
  • '''Family Security Matters''' is the name of an American educational interest group that has t ...nd to empower all Americans to become proactive defenders of our national security and community safety."<ref>{{citation
    1 KB (150 words) - 13:52, 6 April 2024
  • 348 bytes (49 words) - 19:47, 7 March 2024
  • Brief description of email security problems and solutions.
    95 bytes (11 words) - 19:08, 23 September 2009
  • === BCPs relevant to email security === ...nd even controversial. Most of the IETF recommendations relevant to email security are found in a series of documents called Best Current Practices (BCPs).
    1 KB (200 words) - 17:37, 9 October 2009
  • #redirect [[Port Security grant]]
    33 bytes (4 words) - 11:58, 14 July 2022
  • #REDIRECT [[United Nations Security Council]]
    45 bytes (5 words) - 13:23, 16 February 2009
  • 107 bytes (10 words) - 08:11, 4 May 2024
  • 12 bytes (1 word) - 16:59, 8 May 2008
  • ...at generates a device-specific, time-variant [[authentication (information security)|authentication code]], to be validated by an authentication server in comb
    263 bytes (37 words) - 11:15, 7 May 2010
  • 238 bytes (34 words) - 13:42, 6 April 2024
  • 12 bytes (1 word) - 17:01, 8 May 2008
  • <!-- Text is transcluded from the Asset backed security/Definition subpage-->
    90 bytes (12 words) - 05:08, 23 February 2010
  • ...and unauthorized information access. It is the role of intelligence cycle security to protect the process embodied in the intelligence cycle, and that which i :*[[ #Physical security | Physical security]]
    33 KB (4,816 words) - 08:11, 4 May 2024
  • 81 bytes (10 words) - 09:47, 31 July 2010
  • #REDIRECT [[Information security]]
    34 bytes (3 words) - 23:06, 21 April 2010
  • ...f Homeland Security|Department of Homeland Security]] has provided '''Port Security Grants''' to ports within the [[United States of America]], to build [[fire The grants are made under the [[Maritime Transportation Security Act of 2002]].<ref name=PortSecurity2015/> The [[Federal Emergency Manageme
    9 KB (1,108 words) - 08:34, 6 March 2024
  • '''Computer security ''' is a branch of technology known as [[information security]] as applied to [[computer]]s.
    149 bytes (20 words) - 11:59, 22 June 2008
  • 12 bytes (1 word) - 18:07, 14 November 2007
  • ...and strategic focus to the [[American progressivism|progressive]] national security community." It convenes expert groups to create what it considers ideologic | publisher = National Security Network}}</ref>
    8 KB (1,219 words) - 08:41, 4 May 2024
  • ...ssible to take a somewhat more manageable view by focusing on contemporary security aspects. The situation is one of [[asymmetrical warfare]]: [[Palestine|Pale
    3 KB (448 words) - 02:59, 21 February 2010
  • ...is not a [[United States cabinet|Cabinet]] position. Because the National Security Advisor has a close relationship with the President they can and do direct ...sidency of [[Richard Nixon]] it was generally recognized that his National Security Advisor, [[Henry Kissinger]] was more important than his [[Secretary of Sta
    3 KB (300 words) - 16:16, 5 January 2024
  • 31 bytes (4 words) - 06:50, 11 March 2024
  • ...l staff. With the exception of the Assistant to the President for National Security Affairs, all other NSC members would be either elected officials, or appoin ...Office of the President. With the formation of the Department of Homeland Security, FEMA was absorbed and lost its effective cabinet status.
    3 KB (374 words) - 16:22, 30 March 2024
  • In [[information security]], the processes of [[identification, authentication and credentialing]] ar *Something you '''have''' (e.g., a [[key (lock)]], [[security token]] or credit card)
    2 KB (292 words) - 14:55, 20 May 2010
  • 157 bytes (20 words) - 13:54, 6 July 2008
  • 319 bytes (41 words) - 08:45, 13 September 2009
  • '''Pakistan's security forces''' are composed of a regular military, several paramilitary organiza ...lry or not, it is real, and has to be dealt with along with other regional security issues.
    10 KB (1,427 words) - 08:41, 4 May 2024
  • {{r|Computer security||**}} {{r|Communications security||**}}
    316 bytes (34 words) - 10:56, 27 February 2010
  • 146 bytes (22 words) - 10:43, 17 June 2011
  • ...Security Agency (NSA)''', formally the '''National Security Agency/Central Security Service''' is part of the [[United States Department of Defense]] and also In its name, [[national security]] was selected as deliberately vague and euphemistic; the very existence of
    72 KB (10,689 words) - 08:11, 4 May 2024
  • #REDIRECT [[USCG National Security Cutter]]
    43 bytes (5 words) - 00:36, 17 April 2008
  • 31 bytes (4 words) - 05:36, 15 March 2024
  • 374 bytes (50 words) - 23:07, 17 September 2010
  • ...nds dynamic DNS update even more than did IPv4 dynamic addressing, but DNS security features are needed to secure the updates. With convergence of communicatio DNS software and operations should follow the overall DNS security architecture (DNSSEC).<ref name=RFC4033>{{citation
    13 KB (2,037 words) - 16:22, 30 March 2024
  • A set of extensions to the [[Domain Name System]] to protect it from security threats known at the time
    139 bytes (22 words) - 12:14, 30 September 2008
  • #REDIRECT [[Pakistani Security Forces]]
    39 bytes (4 words) - 09:29, 15 August 2009
  • ...ty Service''', who has authority over the military services' [[information security]] and [[signals intelligence]] units. ...incipal chiefs, one for signals intelligence and the other for information security.
    2 KB (249 words) - 05:48, 8 April 2024
  • Auto-populated based on [[Special:WhatLinksHere/Security Service]]. Needs checking by a human. {{r|Committee for State Security}}
    622 bytes (78 words) - 08:31, 4 May 2024
  • #redirect [[Port Security grant]]
    33 bytes (4 words) - 19:55, 12 July 2022
  • The Canadian government organization responsible for [[communications security]] and [[signals intelligence]]
    145 bytes (14 words) - 20:49, 6 August 2008
  • 213 bytes (25 words) - 08:11, 4 May 2024
  • 680 bytes (107 words) - 19:11, 23 September 2009
  • #REDIRECT [[Government Communications Security Bureau]]
    55 bytes (5 words) - 08:10, 15 September 2013
  • #redirect [[Port Security grant]]
    33 bytes (4 words) - 11:59, 14 July 2022
  • ...ides external advice of [[arms control]], [[disarmament]], [[international security]] and [[public diplomacy]]. ...s 19 members and is chartered to have up to 25. Board members are national security experts with scientific, military, diplomatic, and political backgrounds. T
    1 KB (175 words) - 16:00, 1 April 2024
  • A [[security (finance)|security]] for which the [[collateral (finance)|collateral]] and source of cash flow
    333 bytes (47 words) - 12:03, 18 March 2010
  • 686 bytes (86 words) - 21:24, 30 November 2013
  • 18 bytes (2 words) - 23:36, 15 January 2009
  • 81 bytes (10 words) - 21:19, 22 May 2010
  • #redirect [[Port Security grant]]
    33 bytes (4 words) - 11:59, 14 July 2022
  • #REDIRECT [[U.S. Department of Homeland Security]]
    50 bytes (7 words) - 03:08, 31 January 2009
  • Auto-populated based on [[Special:WhatLinksHere/Social security]]. Needs checking by a human. {{r|Social Security in the USA}}
    551 bytes (73 words) - 16:51, 22 March 2023
  • #REDIRECT [[Federal Information Security Management Act of 2002]]
    65 bytes (7 words) - 08:55, 13 September 2009
  • ...e combat of the Afghanistan War (2001-2021) is over, and the International Security Assistance Force has a dual mission of improving the Government of the Isla ...itional, and now elected, government of Afghanistan “in the maintenance of security in Kabul and its surrounding areas, so that the Afghan Interim Authority as
    7 KB (999 words) - 07:30, 18 March 2024
  • Auto-populated based on [[Special:WhatLinksHere/National security]]. Needs checking by a human. {{r|National Security Agency}}
    603 bytes (78 words) - 09:30, 3 May 2024
  • {{Security Subgroup}} ::Perhaps it needed definition of the [[Security]] article first? After that, it seemed to work -- although it also could ha
    3 KB (428 words) - 14:37, 18 March 2024
  • ...t (i.e., "veto") any Resolution, and a rotating group of nations. Only the Security Council has the authority to order [[peace operations]], economic sanctions Decisions of the UNSC are recorded in [[United Nations Security Council resolutions]].
    1 KB (163 words) - 10:10, 28 February 2024
  • 12 bytes (1 word) - 11:58, 9 May 2008
  • Auto-populated based on [[Special:WhatLinksHere/Computer security]]. Needs checking by a human. {{r|Internet Protocol security architecture}}
    815 bytes (100 words) - 15:37, 11 January 2010
  • ...[identification (information security)|identification]] to a [[information security|secure information system]]
    162 bytes (18 words) - 11:12, 6 May 2010
  • 346 bytes (43 words) - 17:44, 3 September 2008
  • ...Security Force''' has been formed to provide integrated at-sea and coastal security. They fill a niche that other military organizations have done as a second ...xample, the [[United States Navy SEALs]] are quite capable of boarding and security, but they are an elite [[special operations]] unit expected to carry the fi
    1 KB (224 words) - 15:41, 8 April 2024
  • ...hink tank and interest group, established in 2006, to reform U.S. national security strategy
    152 bytes (18 words) - 11:47, 19 March 2024
  • Grants given to purchase modern multi-role fireboats, to enhance national security
    118 bytes (14 words) - 11:18, 12 July 2022
  • Auto-populated based on [[Special:WhatLinksHere/Operations security]]. Needs checking by a human. {{r|Intelligence cycle security}}
    588 bytes (74 words) - 08:11, 4 May 2024
  • Under the [[Soviet Union]], the '''Committee for State Security''' (Russian: Комитет государственной безопасн ...of [[Joseph Stalin]], and the attempt to gain control by the head of State Security, [[Lavrenti Beria]], who was executed, the KGB wielded immense power.
    2 KB (317 words) - 23:12, 8 August 2010
  • ...ts, as well as [[intelligence analysis]]. CSIS is also responsible for and security screening of government officials. Originally, CSIS fell under the directio ...r II]] and the subsequent [[Cold War]] that saw an expansion of the RCMP's security/intelligence operations. <ref name=RCMP> [http://www.csis-scrs.gc.ca/hstrrt
    14 KB (2,044 words) - 08:41, 4 May 2024
  • The [[United States Coast Guard]] (USCG) '''National Security Cutter''' is | title=National Security Cutter (NSC)
    1 KB (205 words) - 09:54, 14 September 2013
  • ...tion (information security)|identified]] and [[authentication (information security)|authenticated]]; ideally follows the [[Principle of Least Privilege]]
    299 bytes (36 words) - 11:15, 6 May 2010

Page text matches

  • ...controls such as physical security and personnel [[classified information|security clearances]]
    234 bytes (24 words) - 14:55, 26 February 2010
  • *[[Family Security Matters]] head [[Carol Taber]] on "Debunking the Security Mom", http://www.realclearpolitics.com/articles/2006/10/debunking_the_debun
    204 bytes (25 words) - 00:55, 4 October 2009
  • ...tion (information security)|identified]] and [[authentication (information security)|authenticated]]; ideally follows the [[Principle of Least Privilege]]
    299 bytes (36 words) - 11:15, 6 May 2010
  • #REDIRECT [[Authentication (information security)#Security token]]
    66 bytes (6 words) - 16:13, 6 May 2010
  • [[Information security]] strategies and technologies that continue to ensure security without depending on physical or organizational perimeters
    180 bytes (20 words) - 13:01, 16 March 2010
  • {{r|Communications Security Establishment}} {{r|Information security}}
    379 bytes (41 words) - 18:24, 31 January 2009
  • {{r|Security policy}} {{r|Communications security}}
    356 bytes (42 words) - 10:42, 3 September 2008
  • Israel's domestic security organization, comparable to the British [[Security Service]]
    123 bytes (13 words) - 16:08, 1 September 2009
  • ...d is known as "[[Edwin E. Witte/Debate Guide#Father|the 'Father' of Social Security]]."
    267 bytes (38 words) - 17:21, 13 September 2020
  • ...Security Studies]]; Director, [[George Washington University]] [[National Security Archive]]
    164 bytes (17 words) - 03:35, 31 August 2009
  • ...r]]/security researcher at [[Cambridge University|Cambridge]], author of ''Security Engineering'', a standard textbook.
    169 bytes (17 words) - 14:05, 22 May 2011
  • ...rofit, nonpartisan think tank devoted to enhancing international peace and security. Its major objectives are: * strengthening institutions for international peace and security
    361 bytes (47 words) - 04:39, 5 April 2024
  • ...nnel and physical security. Information assurance is meaningless without a security policy defining threats, management approach to protection, staff responsib Among the most fundamental foundations of information security is to establish policies, and, where appropriate, detailed rules, for the a
    2 KB (232 words) - 16:21, 30 March 2024
  • ...mass destruction, conventional weapons proliferation, peace operations and security alliances.
    361 bytes (44 words) - 11:20, 15 September 2009
  • ...rm known for reporting serious security lapses in the the [[South Korean]] security app [[Smart Sheriff]]
    172 bytes (21 words) - 00:49, 5 January 2024
  • ...ity Studies]]; Director of the [[George Washington University]] [[National Security Archive]]
    170 bytes (19 words) - 03:30, 31 August 2009
  • {{r|Organs of State Security}} {{r|Committee for State Security||**}}
    328 bytes (42 words) - 08:11, 4 May 2024
  • ...a [[security (finance)|security]] by its issuer, (ii) the purchase of a [[security]] that had been [[selling short|sold short]].
    239 bytes (34 words) - 05:25, 4 December 2012
  • ...ard]], [[United States Department of State]]; academic adviser, Center for Security Policy
    207 bytes (23 words) - 13:52, 6 April 2024
  • {{r|Information security}} {{r|Security token}}
    558 bytes (60 words) - 10:08, 4 May 2022
  • ...tions security (COMSEC) equipment under the control of the U.S. [[National Security Agency]] (NSA)
    183 bytes (23 words) - 13:03, 23 March 2009
  • ...Economic and Strategic Studies]]; Advisor, [[Jewish Institute for National Security Affairs]]
    400 bytes (49 words) - 19:46, 17 July 2009
  • '''Computer security ''' is a branch of technology known as [[information security]] as applied to [[computer]]s.
    149 bytes (20 words) - 11:59, 22 June 2008
  • ...ited Nations Security Council]] has passed close to 2000 '''United Nations Security Council resolutions'''. | [[United Nations Security Council Resolution 1267|1267]] ||
    623 bytes (72 words) - 07:29, 9 September 2011
  • ...[[National Security Network]]; Guiding Coalition, [[Project for National Security Reform]]; Democratic presidential candidate; General, [[United States Army]
    449 bytes (53 words) - 11:52, 19 March 2024
  • ...p, Atlantic Council; President and CEO, [[Business Executives for National Security]]
    206 bytes (23 words) - 11:52, 19 March 2024
  • ...cense]]; Director, Center for Security Policy; board of trustees, [[Family Security Matters]]
    184 bytes (24 words) - 13:52, 6 April 2024
  • {{r|Security}} ===Transmission security===
    697 bytes (85 words) - 11:30, 27 February 2010
  • ...tre on Global Health Security; formerly Assistant Director-General, Health Security and Environment, [[World Health Organization]]
    203 bytes (23 words) - 14:58, 11 September 2009
  • ...f Information Security for [[Italy|Italian]] intelligence, responsible for security clearances and serving as the secretariat for the [[CISR]]
    190 bytes (23 words) - 19:49, 4 July 2009
  • ...irs 1995-1996; study group for the [[Hart-Rudman Commission]] on national security requirements, 1998-2001
    431 bytes (50 words) - 20:46, 22 August 2009
  • ...] (1998-2002). NSC Senior Director for Combating Terrorism at the National Security Council (2002-3)
    558 bytes (65 words) - 04:34, 21 March 2024
  • '''Family Security Matters''' is the name of an American educational interest group that has t ...nd to empower all Americans to become proactive defenders of our national security and community safety."<ref>{{citation
    1 KB (150 words) - 13:52, 6 April 2024
  • ==Social Security Administration== ...tory/collectalt.html Social Security History: Arthur J. Altmeyer]," Social Security Administration.
    1 KB (134 words) - 18:38, 8 June 2010
  • ...xecutive Director of the Security Studies Program and Center for Peace and Security Studies
    431 bytes (55 words) - 14:30, 22 December 2009
  • ...ith this transfer, it must be done over. Also, the simple case provides no security either for access to the computers or to the file information as it moves t ==Security==
    905 bytes (126 words) - 11:04, 11 July 2010
  • ...ies, Chinese foreign policy, strategic culture, statecraft, and East Asian security in theory and practice; formerA djunct Assistant Professor and Instructor i
    460 bytes (56 words) - 15:36, 13 October 2009
  • ...ity Studies]]; Partner at James & Hoffman and litigator for the [[National Security Archive, George Washington University]]
    204 bytes (26 words) - 18:33, 18 November 2009
  • ...and Homeland Defense, [[National Security Council]]; Professor of National Security Studies and Director/Founder of the Center for Counterproliferation Researc
    647 bytes (77 words) - 15:47, 14 September 2009
  • *[http://www.un.org/Docs/sc/ UN Security Council] — official site **[http://www.un.org/Docs/sc/unsc_background.html UN Security Council – Background]
    1 KB (207 words) - 07:38, 12 February 2009
  • The position of having sold a borrowed [[security (finance)|security]] or [[derivative]] (usually with the intention of buying it back and retur
    223 bytes (34 words) - 04:56, 4 December 2012
  • ...[[colonel]], retired, [[United States Marine Corps]]; adviser, Center for Security Policy; Institute Fellow, [[Claremont Institute]]
    426 bytes (56 words) - 13:52, 6 April 2024
  • ...ormer Senior Fellow, [[Brookings Institution]]; Bush-Cheney 2004 campaign; security analyst, CNN
    537 bytes (59 words) - 08:40, 4 May 2024
  • ==<div id="Father"></div>Who was "The 'Father' of Social Security?"== ...d "this title less than many others." Witte pointed out that the [[Social Security Act]] was a collaborative undertaking:
    2 KB (240 words) - 19:47, 31 May 2010
  • {{r|Computer security||**}} {{r|Communications security||**}}
    316 bytes (34 words) - 10:56, 27 February 2010
  • ...Center for Security Policy; Vice Chairman, [[Jewish Institute for National Security Affairs]] (JINSA); advisor, [[U.S. Committee for a Free Lebanon]]
    244 bytes (32 words) - 13:52, 6 April 2024
  • ...ng Coalition, [[Project for National Security Reform]]; board, [[American Security Project]]; Senior Vice President for International Affairs, [[U.S. Chamber
    301 bytes (35 words) - 11:52, 19 March 2024
  • ...]], [[national security]] and counterterrorism law); contributor, [[Family Security Matters]], Fox News, [[National Review]], [[Washington Examiner]], Townhall
    344 bytes (37 words) - 08:41, 4 May 2024
  • The primary high-security [[cryptography|cryptographic]] [[communications security]] machine of [[Nazi Germany]]. Unknown to the Germans, it had been substant
    321 bytes (39 words) - 10:20, 14 June 2010
  • *''Aging Gracefully: Ideas to Improve Retirement Security in America'' (2006) *''Saving Social Security: A Balanced Approach'' (2004)
    262 bytes (28 words) - 16:17, 20 September 2009
  • ...taff]] (1984-1986), and was Deputy Assistant to the President for National Security Affairs from 1986-1990 under Presidents Reagan and G.H.W. Bush; [[Henry Kis
    475 bytes (60 words) - 17:09, 9 October 2009
  • ...ecurity without alienation users or encouraging them to find ways to avoid security mechanisms.
    898 bytes (132 words) - 05:49, 8 April 2024
  • *[[Central Intelligence Agency]] report on Iraq’s Security Services, Regime Strategic Intent - Annex C: https://www.cia.gov/library/re *Ibrahim al-Marashi, Iraq's Security and Intelligence Network: A Guide and Analysis, ''Middle Eastern Review of
    406 bytes (57 words) - 18:56, 4 July 2009
  • ...heft or corruption, or the preservation of availability, as defined in the security policy. [[Information assurance]] discusses a related topic - how "sure" so ...ive requirements to positive enforceable rules. For this reason, computer security is often more technical and mathematical than some [[computer science]] fie
    2 KB (267 words) - 05:49, 8 April 2024
  • *[http://www.ssa.gov/history/history.html History section of the Social Security Administration (SSA) web page] ...y.gov/history/cohenwitte.html Edwin E. Witte (1887-1960): Father of Social Security]," reprint from ''Industrial and Labor Relations Review'' 14, No. 1, Octobe
    819 bytes (113 words) - 18:09, 27 May 2010
  • ...artnership for a Secure America]]; Assistant to the President for National Security Affairs, [[Bill Clinton|Clinton Administration]]
    293 bytes (35 words) - 08:34, 21 March 2024
  • ...ministration]] Defense transition team; legislative assistant for national security 2002-2006 for Sen. [[John Kerry]] and defense policy coordinator for Kerry
    277 bytes (31 words) - 14:25, 22 December 2009
  • ...fic Security Affairs]]; former advisory board, [[Center for a New American Security]]; retired [[United States Marine Corps|U.S. Marine Corps]] [[lieutenant ge
    299 bytes (39 words) - 10:34, 29 March 2024
  • {{r|Information Security}} {{r|Director, National Security Agency}}
    1 KB (161 words) - 08:37, 4 May 2024
  • ...l Defense College (Israel)]], responsible for developing and implementing security strategy curriculum
    549 bytes (65 words) - 01:58, 15 February 2010
  • ...formation security products which instill in the consumer a false sense of security, because in reality the product does not make the information any more secu
    237 bytes (35 words) - 14:55, 25 October 2008
  • ...[identification (information security)|identification]] to a [[information security|secure information system]]
    162 bytes (18 words) - 11:12, 6 May 2010
  • {{r|Information security}} {{r|Identification (information security)}}
    368 bytes (39 words) - 05:38, 15 March 2024
  • ...Center and General Counsel of the [[George Washington University National Security Archive]]
    244 bytes (30 words) - 03:31, 31 August 2009
  • ...to the British [[Security Service]], Israeli [[Shin Bet]] or the national security division of the [[Federal Bureau of Investigation]]
    322 bytes (43 words) - 14:10, 7 September 2009
  • {{r|Communications security}} {{r|Communications Security Establishment}}
    844 bytes (96 words) - 14:48, 4 April 2024
  • The position of having bought a [[security (finance)|security]] or [[derivative]] (often with the intention of selling it when its market
    247 bytes (36 words) - 04:35, 4 December 2012
  • ...ration, and [[disarmament]], as well as an overall participant in national security strategy. The official has the right to communicate, through the Secretary ...ventional arms|conventional arms proliferation]], [[peace operations]] and security alliances.
    1 KB (188 words) - 16:55, 22 March 2024
  • === BCPs relevant to email security === ...nd even controversial. Most of the IETF recommendations relevant to email security are found in a series of documents called Best Current Practices (BCPs).
    1 KB (200 words) - 17:37, 9 October 2009
  • ...hina relations, U.S. military space activities, and Presidential national security directives. He has taught at the University of Texas and the American Univ ...and Counterintelligence, International Security, Intelligence and National Security, and other publications.
    748 bytes (101 words) - 17:22, 25 December 2009
  • ...g editor, [[Jerusalem Post|''The Jerusalem Post'']]; contributor, [[Family Security Matters]]; Member of Oslo Negotiating Team; Israeli Prime Minister’s Offi
    349 bytes (42 words) - 13:52, 6 April 2024
  • ...ligence official, who rose from the [[Cheka]] until becoming Head of State security; managed [[Soviet nuclear program]]; attempted to assume power after the de
    314 bytes (45 words) - 16:45, 10 February 2024
  • ...or KGB). The KGB, in turn, was one of a long sequence of "Organs of State Security" under the Soviet government, and can trace its origin to the [[Okhrana]] o
    612 bytes (67 words) - 08:11, 4 May 2024
  • ...ton D.C.]] law firm of [[Shea and Gardner]] he worked with former National Security Advisor [[Brent Scowcroft]]. Security Advisor
    2 KB (204 words) - 12:58, 18 February 2024
  • {{r|Directorate of Security Affairs (Iraq)}} {{r|Special Security Organization}}
    588 bytes (73 words) - 08:11, 4 May 2024
  • ...contains unique identifier but is usually not time-synchronized as is a [[security token]]; often used to enforce software licensing
    387 bytes (53 words) - 11:23, 7 May 2010
  • ...c Security Task Force (Region V); adviser, [[Jewish Institute for National Security Affairs]]
    290 bytes (37 words) - 20:11, 17 July 2009
  • ...he first director of the [[Social Security in the USA|United States Social Security Administration]]. ...the law. His major contribution here was the 1939 revision of the Social Security Act which introduced an expansion of benefits.
    881 bytes (134 words) - 06:48, 5 December 2011
  • ...American Security]]; Former Senior Director for Defense Policy, [[National Security Council]]; Expert panel, [[Iraq Study Group]]
    316 bytes (40 words) - 11:52, 19 March 2024
  • ...y of Homeland Security''' heads the [[United States Department of Homeland Security]]. In the [[Obama administration]], the incumbent is [[Janet Napolitano]].
    256 bytes (34 words) - 11:39, 3 February 2009
  • {{r|Triangle Institute for Security Studies}} {{r|Center for a New American Security}}
    531 bytes (75 words) - 11:01, 3 October 2009
  • ...and worldwide infrastructure such as [[food security|food]] and [[economic security]]; also a target of [[conspiracy theory|conspiracy theorists]] as a "hidden
    299 bytes (40 words) - 12:50, 3 November 2010
  • ...undation; CNN's national security analyst and fellow at [[Center on Law & Security, New York University]]; adjunct professor, [[School of Advanced Internation
    352 bytes (41 words) - 15:04, 15 April 2024
  • ...e staff and Republican Staff Director of the Subcommittee on International Security, Proliferation, and Federal Services, [[U.S. Senate Committee on Government
    356 bytes (42 words) - 15:59, 14 September 2009
  • ...e security task force, created under the authority of the [[United Nations Security Council]] following the [[9/11]] attack, which operates southeast of the [[
    343 bytes (48 words) - 08:41, 23 February 2024
  • A [[security (finance)|security]] for which the [[collateral (finance)|collateral]] and source of cash flow
    333 bytes (47 words) - 12:03, 18 March 2010
  • Located in [[New York, New York|New York City]], a US [[national security]] think tank that evaluates through the viewpoint of the theory of [[realis * Forum on Asia-Pacific Security
    334 bytes (48 words) - 11:47, 19 March 2024
  • ...Mongolia in the Office of the Under Secretary of Defense for International Security Affairs during the first George W. Bush administration.
    366 bytes (50 words) - 17:18, 12 November 2009
  • {{r|Information security||**}} {{r|Computer security||***}}
    558 bytes (70 words) - 14:29, 26 February 2010
  • ...and Security Committee, Constitution Project; Founding Director, Law and Security Program at [[Human Rights First]], 2003-2006; Clerk to Justice John Paul St
    416 bytes (52 words) - 11:35, 19 March 2024
  • {{r|Israeli intelligence and security services}} ===Other Israeli security services===
    439 bytes (55 words) - 08:41, 4 May 2024
  • ...ecurity Reform]], Counselor, Council on Foreign Relations; Deputy National Security Advisor for Strategic Planning, Presidential Envoy to Iraq and Coordinator
    390 bytes (50 words) - 12:01, 19 March 2024
  • ...yield to maturity). Calculated as the [[internal rate of return]] of the security.
    334 bytes (49 words) - 05:22, 5 February 2010
  • ...ied price on a given date. Used as a way of borrowing or lending using the security as collateral. (The interest rate charged is known as the "repo rate").
    285 bytes (50 words) - 15:39, 17 October 2009
  • ...r, [[Jewish Institute for National Security Affairs]]; advisor, Center for Security Policy
    387 bytes (45 words) - 13:52, 6 April 2024
  • {{r|Social Security}} {{r|Social Security in the USA}}
    553 bytes (78 words) - 18:38, 8 June 2010
  • ...nsive responsibilities in [[intelligence (information gathering)]], border security, counterintelligence and suppression of dissent; split up in the [[Russian
    387 bytes (49 words) - 08:11, 4 May 2024
  • ...Peace]], and is funded by the [[George Washington University]] [[National Security Archive]] Fund, Inc.
    582 bytes (82 words) - 21:42, 3 September 2009
  • ...inst [[Hillary Clinton]]; member; Council on Foreign Relations; [[National Security Council]] research assistant to [[Henry Kissinger]]; staff, [[U.S. Senate C
    482 bytes (55 words) - 14:52, 15 April 2024
  • ...he department responsible for advancing the national, economic, and energy security of the United States. It was formed in 1977 to consolidate government agen ...ls over security lapses related to nuclear weapons, the [[National Nuclear Security Administration]] (NNSA) was established in 2000, as a "separately organized
    2 KB (210 words) - 03:41, 25 March 2024
View (previous 100 | ) (20 | 50 | 100 | 250 | 500)