Search results

Jump to navigation Jump to search

Page title matches

  • ...regimes, the German SS did on the Wehrmacht or the Soviet Organs of State Security did on the Red Army. ...egan''), a popularly elected body; he has final command authority over all security forces.
    8 KB (1,156 words) - 07:31, 18 March 2024
  • 62 bytes (6 words) - 18:32, 18 April 2010
  • 34 bytes (4 words) - 02:58, 16 February 2009
  • 31 bytes (4 words) - 05:36, 15 March 2024
  • #Redirect [[USCG National Security Cutter]]
    43 bytes (5 words) - 14:22, 19 April 2008
  • 374 bytes (50 words) - 23:07, 17 September 2010
  • ...does have a world-class intelligence analysis capability in the [[Canadian Security Intelligence Service]]. ...were trained through an exchange program with the [[American]] [[National Security Agency]].
    2 KB (206 words) - 21:10, 25 May 2024
  • #REDIRECT [[United Nations Security Council]]
    45 bytes (5 words) - 13:22, 16 February 2009
  • #REDIRECT [[United Nations Security Council]]
    45 bytes (5 words) - 13:23, 16 February 2009
  • #redirect [[Port Security grant]]
    33 bytes (4 words) - 11:58, 14 July 2022
  • 12 bytes (1 word) - 16:59, 8 May 2008
  • 107 bytes (10 words) - 08:11, 4 May 2024
  • 348 bytes (49 words) - 19:47, 7 March 2024
  • #redirect [[Port Security grant]]
    33 bytes (4 words) - 11:59, 14 July 2022
  • 686 bytes (86 words) - 21:24, 30 November 2013
  • 18 bytes (2 words) - 23:36, 15 January 2009
  • #REDIRECT [[Government Communications Security Bureau]]
    55 bytes (5 words) - 08:10, 15 September 2013
  • #redirect [[Port Security grant]]
    33 bytes (4 words) - 11:59, 14 July 2022
  • A [[security (finance)|security]] for which the [[collateral (finance)|collateral]] and source of cash flow
    333 bytes (47 words) - 12:03, 18 March 2010
  • #REDIRECT [[U.S. Department of Homeland Security]]
    50 bytes (7 words) - 03:08, 31 January 2009
  • Auto-populated based on [[Special:WhatLinksHere/Social security]]. Needs checking by a human. {{r|Social Security in the USA}}
    551 bytes (73 words) - 16:51, 22 March 2023
  • #REDIRECT [[Federal Information Security Management Act of 2002]]
    65 bytes (7 words) - 08:55, 13 September 2009
  • ...e combat of the Afghanistan War (2001-2021) is over, and the International Security Assistance Force has a dual mission of improving the Government of the Isla ...itional, and now elected, government of Afghanistan “in the maintenance of security in Kabul and its surrounding areas, so that the Afghan Interim Authority as
    7 KB (999 words) - 07:30, 18 March 2024
  • Auto-populated based on [[Special:WhatLinksHere/National security]]. Needs checking by a human. {{r|National Security Agency}}
    603 bytes (78 words) - 09:30, 3 May 2024
  • 81 bytes (10 words) - 21:19, 22 May 2010
  • 12 bytes (1 word) - 11:58, 9 May 2008
  • ...t (i.e., "veto") any Resolution, and a rotating group of nations. Only the Security Council has the authority to order [[peace operations]], economic sanctions Decisions of the UNSC are recorded in [[United Nations Security Council resolutions]].
    1 KB (163 words) - 10:10, 28 February 2024
  • Auto-populated based on [[Special:WhatLinksHere/Computer security]]. Needs checking by a human. {{r|Internet Protocol security architecture}}
    815 bytes (100 words) - 15:37, 11 January 2010
  • {{Security Subgroup}} ::Perhaps it needed definition of the [[Security]] article first? After that, it seemed to work -- although it also could ha
    3 KB (428 words) - 14:37, 18 March 2024
  • 343 bytes (43 words) - 21:34, 26 May 2024
  • 680 bytes (107 words) - 19:11, 23 September 2009
  • Auto-populated based on [[Special:WhatLinksHere/Operations security]]. Needs checking by a human. {{r|Intelligence cycle security}}
    588 bytes (74 words) - 08:11, 4 May 2024
  • ...[identification (information security)|identification]] to a [[information security|secure information system]]
    162 bytes (18 words) - 11:12, 6 May 2010
  • Grants given to purchase modern multi-role fireboats, to enhance national security
    118 bytes (14 words) - 11:18, 12 July 2022
  • The [[United States Coast Guard]] (USCG) '''National Security Cutter''' is | title=National Security Cutter (NSC)
    1 KB (205 words) - 09:54, 14 September 2013
  • Under the [[Soviet Union]], the '''Committee for State Security''' (Russian: Комитет государственной безопасн ...of [[Joseph Stalin]], and the attempt to gain control by the head of State Security, [[Lavrenti Beria]], who was executed, the KGB wielded immense power.
    2 KB (317 words) - 23:12, 8 August 2010
  • ...erests, as well as intelligence analysis. CSIS is also responsible for and security screening of government officials. Originally, CSIS fell under the directio ...r II]] and the subsequent [[Cold War]] that saw an expansion of the RCMP's security/intelligence operations. <ref name=RCMP> [http://www.csis-scrs.gc.ca/hstrrt
    14 KB (2,044 words) - 21:10, 25 May 2024
  • ...Security Force''' has been formed to provide integrated at-sea and coastal security. They fill a niche that other military organizations have done as a second ...xample, the [[United States Navy SEALs]] are quite capable of boarding and security, but they are an elite [[special operations]] unit expected to carry the fi
    1 KB (224 words) - 15:41, 8 April 2024
  • ...SCIF]] or other secure working area, which is responsible for ensuring the security of information covered by [[compartmented control system]]s
    250 bytes (34 words) - 14:49, 31 July 2010
  • ...tocol version 6 can run more securely if features of the Internet Protocol security architecture (IPSec)<ref name=RFC4301>{{citation | title = Security Architecture for the Internet Protocol
    5 KB (761 words) - 16:22, 30 March 2024
  • 188 bytes (21 words) - 16:20, 19 April 2024
  • * Bamford, James. (1983) ''The Puzzle Palace: Inside the National Security Agency, America's Most Secret Intelligence Organization''. Informative, but ...ord, James. (2002) ''Body of Secrets: Anatomy of the Ultra-Secret National Security Agency''
    1 KB (159 words) - 15:30, 27 May 2008
  • ...tates of America]], chaired by the Assistant to the President for National Security Affairs, and, by extension, the professional staff reporting to the Assista
    301 bytes (43 words) - 08:34, 21 March 2024
  • 164 bytes (22 words) - 11:18, 26 July 2008
  • 185 bytes (22 words) - 11:53, 28 July 2009
  • ...tion (information security)|identified]] and [[authentication (information security)|authenticated]]; ideally follows the [[Principle of Least Privilege]]
    299 bytes (36 words) - 11:15, 6 May 2010
  • 827 bytes (133 words) - 23:07, 17 September 2010
  • {{r|Security}} ===Transmission security===
    697 bytes (85 words) - 11:30, 27 February 2010
  • ...hink tank and interest group, established in 2006, to reform U.S. national security strategy
    152 bytes (18 words) - 11:47, 19 March 2024
  • A set of extensions to the [[Domain Name System]] to protect it from security threats known at the time
    139 bytes (22 words) - 12:14, 30 September 2008

Page text matches

  • ...artnership for a Secure America]]; Assistant to the President for National Security Affairs, [[Bill Clinton|Clinton Administration]]
    293 bytes (35 words) - 08:34, 21 March 2024
  • ...ministration]] Defense transition team; legislative assistant for national security 2002-2006 for Sen. [[John Kerry]] and defense policy coordinator for Kerry
    277 bytes (31 words) - 14:25, 22 December 2009
  • ...fic Security Affairs]]; former advisory board, [[Center for a New American Security]]; retired [[United States Marine Corps|U.S. Marine Corps]] [[lieutenant ge
    299 bytes (39 words) - 10:34, 29 March 2024
  • {{r|Information Security}} {{r|Director, National Security Agency}}
    1 KB (161 words) - 08:37, 4 May 2024
  • ...l Defense College (Israel)]], responsible for developing and implementing security strategy curriculum
    549 bytes (65 words) - 01:58, 15 February 2010
  • ...formation security products which instill in the consumer a false sense of security, because in reality the product does not make the information any more secu
    237 bytes (35 words) - 14:55, 25 October 2008
  • ...[identification (information security)|identification]] to a [[information security|secure information system]]
    162 bytes (18 words) - 11:12, 6 May 2010
  • {{r|Information security}} {{r|Identification (information security)}}
    368 bytes (39 words) - 05:38, 15 March 2024
  • ...Center and General Counsel of the [[George Washington University National Security Archive]]
    244 bytes (30 words) - 03:31, 31 August 2009
  • ...to the British [[Security Service]], Israeli [[Shin Bet]] or the national security division of the [[Federal Bureau of Investigation]]
    322 bytes (43 words) - 14:10, 7 September 2009
  • {{r|Communications security}} {{r|Communications Security Establishment}}
    844 bytes (96 words) - 14:48, 4 April 2024
  • The position of having bought a [[security (finance)|security]] or [[derivative]] (often with the intention of selling it when its market
    247 bytes (36 words) - 04:35, 4 December 2012
  • === BCPs relevant to email security === ...nd even controversial. Most of the IETF recommendations relevant to email security are found in a series of documents called Best Current Practices (BCPs).
    1 KB (200 words) - 17:37, 9 October 2009
  • ...ligence official, who rose from the [[Cheka]] until becoming Head of State security; managed [[Soviet nuclear program]]; attempted to assume power after the de
    314 bytes (45 words) - 16:45, 10 February 2024
  • ...or KGB). The KGB, in turn, was one of a long sequence of "Organs of State Security" under the Soviet government, and can trace its origin to the [[Okhrana]] o
    612 bytes (67 words) - 08:11, 4 May 2024
  • ...ton D.C.]] law firm of [[Shea and Gardner]] he worked with former National Security Advisor [[Brent Scowcroft]]. Security Advisor
    2 KB (204 words) - 12:58, 18 February 2024
  • {{r|Directorate of Security Affairs (Iraq)}} {{r|Special Security Organization}}
    588 bytes (73 words) - 08:11, 4 May 2024
  • ...contains unique identifier but is usually not time-synchronized as is a [[security token]]; often used to enforce software licensing
    387 bytes (53 words) - 11:23, 7 May 2010
  • ...c Security Task Force (Region V); adviser, [[Jewish Institute for National Security Affairs]]
    290 bytes (37 words) - 20:11, 17 July 2009
  • ...he first director of the [[Social Security in the USA|United States Social Security Administration]]. ...the law. His major contribution here was the 1939 revision of the Social Security Act which introduced an expansion of benefits.
    881 bytes (134 words) - 06:48, 5 December 2011
  • ...American Security]]; Former Senior Director for Defense Policy, [[National Security Council]]; Expert panel, [[Iraq Study Group]]
    316 bytes (40 words) - 11:52, 19 March 2024
  • ...y of Homeland Security''' heads the [[United States Department of Homeland Security]]. In the [[Obama administration]], the incumbent is [[Janet Napolitano]].
    256 bytes (34 words) - 11:39, 3 February 2009
  • {{r|Triangle Institute for Security Studies}} {{r|Center for a New American Security}}
    531 bytes (75 words) - 11:01, 3 October 2009
  • ...and worldwide infrastructure such as [[food security|food]] and [[economic security]]; also a target of [[conspiracy theory|conspiracy theorists]] as a "hidden
    299 bytes (40 words) - 12:50, 3 November 2010
  • ...e staff and Republican Staff Director of the Subcommittee on International Security, Proliferation, and Federal Services, [[U.S. Senate Committee on Government
    356 bytes (42 words) - 15:59, 14 September 2009
  • ...e security task force, created under the authority of the [[United Nations Security Council]] following the [[9/11]] attack, which operates southeast of the [[
    343 bytes (48 words) - 08:41, 23 February 2024
  • A [[security (finance)|security]] for which the [[collateral (finance)|collateral]] and source of cash flow
    333 bytes (47 words) - 12:03, 18 March 2010
  • Located in [[New York, New York|New York City]], a US [[national security]] think tank that evaluates through the viewpoint of the theory of [[realis * Forum on Asia-Pacific Security
    334 bytes (48 words) - 11:47, 19 March 2024
  • ...Mongolia in the Office of the Under Secretary of Defense for International Security Affairs during the first George W. Bush administration.
    366 bytes (50 words) - 17:18, 12 November 2009
  • {{r|Information security||**}} {{r|Computer security||***}}
    558 bytes (70 words) - 14:29, 26 February 2010
  • ...and Security Committee, Constitution Project; Founding Director, Law and Security Program at [[Human Rights First]], 2003-2006; Clerk to Justice John Paul St
    416 bytes (52 words) - 11:35, 19 March 2024
  • {{r|Israeli intelligence and security services}} ===Other Israeli security services===
    439 bytes (55 words) - 08:41, 4 May 2024
  • ...ecurity Reform]], Counselor, Council on Foreign Relations; Deputy National Security Advisor for Strategic Planning, Presidential Envoy to Iraq and Coordinator
    390 bytes (50 words) - 12:01, 19 March 2024
  • ...yield to maturity). Calculated as the [[internal rate of return]] of the security.
    334 bytes (49 words) - 05:22, 5 February 2010
  • ...ied price on a given date. Used as a way of borrowing or lending using the security as collateral. (The interest rate charged is known as the "repo rate").
    285 bytes (50 words) - 15:39, 17 October 2009
  • ...r, [[Jewish Institute for National Security Affairs]]; advisor, Center for Security Policy
    387 bytes (45 words) - 13:52, 6 April 2024
  • {{r|Social Security}} {{r|Social Security in the USA}}
    553 bytes (78 words) - 18:38, 8 June 2010
  • ...nsive responsibilities in [[intelligence (information gathering)]], border security, counterintelligence and suppression of dissent; split up in the [[Russian
    387 bytes (49 words) - 08:11, 4 May 2024
  • ...Peace]], and is funded by the [[George Washington University]] [[National Security Archive]] Fund, Inc.
    579 bytes (82 words) - 21:34, 26 May 2024
  • ...he department responsible for advancing the national, economic, and energy security of the United States. It was formed in 1977 to consolidate government agen ...ls over security lapses related to nuclear weapons, the [[National Nuclear Security Administration]] (NNSA) was established in 2000, as a "separately organized
    2 KB (210 words) - 03:41, 25 March 2024
  • ...ajor general]], [[U.S. Army]], retired; last assignment was training Iraqi security forces; retired in protest over [[Donald Rumsfeld]]'s policies and went pub
    399 bytes (54 words) - 03:39, 5 October 2009
  • ===Trust and security=== {{r|Federal Information Security Management Act of 2002}}
    1 KB (142 words) - 11:26, 6 February 2011
  • ...8; advisor, [[Jewish Institute for National Security Affairs]]; Center for Security Policy; appointed by [[George W. Bush]] to the U.S. Delegation to the [[U.N
    658 bytes (86 words) - 13:52, 6 April 2024
  • ...); advisor, [[Jewish Institute for National Security Affairs]], Center for Security Policy
    407 bytes (54 words) - 13:52, 6 April 2024
  • Auto-populated based on [[Special:WhatLinksHere/Security Service]]. Needs checking by a human. {{r|Committee for State Security}}
    622 bytes (78 words) - 08:31, 4 May 2024
  • ...er guarantees the sale at a stipulated price of a stipulated volume of the security. (iii) The provision of insurance of an [[asset]].
    334 bytes (53 words) - 17:05, 18 March 2010
  • {{r|Information security}} {{r|Network security}}
    257 bytes (31 words) - 20:11, 22 February 2009
  • ...a senior associate White House counsel and legal adviser to the [[National Security Council]], [[George W. Bush Administration]]
    429 bytes (57 words) - 12:01, 19 March 2024
  • {{r|United Nations Security Council}} {{r|Kosovo, United Nations Security Council Resolutions}}
    326 bytes (39 words) - 13:26, 5 November 2008
  • ...stitute for Public Policy]] National Security Advisory Council, Center for Security Policy; [[U.S. Department of State]] [[Arms Control and Nonproliferation Ad
    404 bytes (48 words) - 13:52, 6 April 2024
View ( | ) (20 | 50 | 100 | 250 | 500)