Xem 1-20 trên 283 kết quả National security
  • A report prepared by Transition 2001, a bipartisan panel of about 60 American leaders in the areas of foreign and defense policy, outlining the most important national security challenges for the new administration, suggesting priorities, and recommending specific courses of action that the new president could take in the early days of his administration. Such decisive early action will be critical for setting U.S. foreign and national security policy on the right path for the balance of his term and beyond. Thissummary is based on more than 25...

    pdf0p xuan2013 25-01-2013 21 1   Download

  • Following the terrorist attacks against the United States on September 11, 2001, U.S. leaders recast the national security strategy to place greater emphasis on the threats posed by terrorists and by states from which they might acquire weapons of mass destruction, and announced that in the future the United States would take

    pdf0p xuancoem 01-02-2013 10 1   Download

  • Tham khảo sách 'bio inspired innovation and national security', kỹ thuật - công nghệ, tự động hoá phục vụ nhu cầu học tập, nghiên cứu và làm việc hiệu quả

    pdf356p nt18105 19-05-2013 26 9   Download

  • he Bureau of Industry and Security (BIS) is an agency of the United States Department of Commerce which deals with issues involving national security and high technology. A principal goal for the bureau is helping stop proliferation of weapons of mass destruction, while furthering the growth of United States exports. The Bureau is led by the Under Secretary of Commerce for Industry and Security. The mission of the BIS is to advance U.S. national security, foreign policy, and economic interests.

    pdf91p lulanphuong 22-03-2012 38 5   Download

  • Physical security measures aim to either prevent a direct assault on premises or reduce the potential damage and injuries that can be inflicted should an incident occur.

    pdf0p doilan 25-01-2013 23 3   Download

  • Preface Security has been a human concern since the dawn of time. With the rise of the digital society, information security has rapidly grown to an area of serious study and ongoing research. While much research has focused on the technical aspects of computer security, far less attention has been given to the management issues of information risk and the economic concerns facing firms and nations.

    pdf339p huyhoang 05-08-2009 151 77   Download

  • Welcome to the National Security Agency (NSA) Information Assurance Methodology (IAM). In 1998, the NSA IAM was developed to meet the demand for information security (INFOSEC) assessments—a demand that was increasing due to Presidential Decision Directive 63 (PDD-63) while at the same time NSA was downsizing. NSA sought a way to maximize its resources to assist as many customers as possible. Due to Public Law 100-235, NSA was responsible for providing security guidance to all federal government classified computer systems.

    pdf30p thachcotran 04-02-2010 119 27   Download

  • ISO (the International Organization for Standardization) and IEC (the International Electrotechnical Commission) form the specialized system for worldwide standardization. National bodies that are members of ISO or IEC participate in the development of International Standards through technical committees established by the respective organization to deal with particular fields of technical activity. ISO and IEC technical committees collaborate in fields of mutual interest.

    pdf130p phamhongnhungp 25-04-2013 41 10   Download

  • Information about climate1 is used to make decisions every day. From farmers deciding which crops to plant next season to mayors in large cities deciding how to prepare for future heat waves, and from an insurance company assessing future flood risks to a national security planner assessing future conflict risks from the impacts of drought, users of climate information span a vast array of sectors in both the public and private spheres. Each of these communities has different needs for climate data, with different time horizons (see Box 1) and different tolerances for uncertainty...

    pdf253p taurus23 27-09-2012 28 9   Download

  • A penetration test, occasionally pentest, is a method of evaluating the computer security of a computer system or network by simulating an attack from malicious outsiders (who do not have an authorized means of accessing the organization's systems) and malicious insiders (who have some level of authorized access).

    pdf0p doilan 25-01-2013 23 7   Download

  • Every year the CES council awards a prize to an inter- nationally renowned and innovative economist for out- standing contributions to economic research. The scholar is honored with the title ‘‘Distinguished CES Fellow’’ and is invited to give the ‘‘Munich Lectures in Economics.’’

    pdf181p layon_5 28-03-2013 19 7   Download

  • SQL injection is a technique often used to attack data driven applications [1]. This is done by including portions of SQL statements in an entry field in an attempt to get the website to pass a newly formed rogue SQL command to the database (e.g., dump the database contents to the attacker). SQL injection is a code injection technique that exploits a security vulnerability in an application's software. The vulnerability happens

    pdf0p doilan 25-01-2013 17 5   Download

  • .Committee on Assuring a Future U.S.-Based Nuclear Chemistry Expertise Board on Chemical Sciences and Technology Nuclear and Radiation Studies Board Division on Earth and Life Studies Board on Higher Education and Workforce Division on Policy and Global Affairs .

    pdf221p maket1311 16-10-2012 13 4   Download

  • This is the first of four reports assessing the deployment of technologies (i.e., equipment and procedures) by the Federal Aviation Administration (FAA). This assessment of the 1997–1998 deployment of technologies by the FAA to improve aviation security was conducted by the Panel on Assessment of Technologies Deployed to Improve Aviation Security under the auspices of the National Research Council (NRC) Committee on Commercial Aviation Security. This is the first part of a four-part assessment that will be completed in fiscal year 2001.

    pdf88p camnhung_1 14-12-2012 22 4   Download

  • The need for A Bird in the Bush: Failed Domestic Policies of the George W. Bush Administration was sparked by what many informed and responsible Americans have seen as serious blunders committed by President George W. Bush during his first term of office. Especially troublesome is the 2005 Inaugural Address. This second inaugural address illustrates how “Bush II” is derailing the purpose of America as a nation. (It is analyzed in the introduction.) Bush II could not perform this derailing all on his own. He had help.

    pdf222p hyperion75 15-01-2013 19 4   Download

  • A backdoor in a computer system (or cryptosystem or algorithm) is a method of bypassing normal authentication, securing illegal remote access to a computer, obtaining access to plaintext, and so on, while attempting to remain undetected. The backdoor may take the form of an installed program (e.g., Back Orifice) or may subvert the system through a rootkit.

    pdf0p doilan 25-01-2013 17 4   Download

  • In cryptanalysis and computer security, password cracking is the process of recovering passwords from data that has been stored in or transmitted by a computer system. A common approach is to repeatedly try guesses for the password. Another common approach is to say that you have "forgotten" the password and then change it.

    pdf0p doilan 25-01-2013 18 4   Download

  • In computer security and programming, a buffer overflow, or buffer overrun, is an anomaly where a program, while writing data to a buffer, overruns the buffer's boundary and overwrites adjacent memory. This is a special case of violation of memory safety.

    pdf0p doilan 25-01-2013 26 4   Download

  • Cryptography (or cryptology; from Greek κρυπτός, "hidden, secret"; and γράφειν, graphein, "writing", or -λογία, -logia, "study", respectively)[1] is the practice and study of techniques for secure communication in the presence of third parties (called adversaries).[2] More generally, it is about constructing and analyzing protocols that overcome the influence of adversaries

    pdf0p doilan 25-01-2013 17 4   Download

  • Reports on Computer Systems Technology The Information Technology Laboratory (ITL) at the National Institute of Standards and Technology (NIST) promotes the U.S. economy and public welfare by providing technical leadership for the nation’s measurement and standards infrastructure. ITL develops tests, test methods, reference data, proof of concept implementations, and technical analysis to advance the development and productive use of information technology.

    pdf0p canon90 25-03-2013 27 4   Download

Đồng bộ tài khoản