30,924 Ergebnisse für: security
-
The Chapter VII Powers of the United Nations Security Council - Erika De Wet - Google Books
https://books.google.de/books?id=2U4t2v4Mb9AC
This study provides a comprehensive analysis of the questions pertaining to the powers of the Security Council under Chapter VII of the Charter of the United Nations. In doing so it departs from the premise that an analysis of the limitations to the powers…
-
Encyclopedia of United States National Security - Google Books
https://books.google.de/books?id=K751AwAAQBAJ&pg=PT418
With over 750 entries, the Encyclopedia of United States National Security is the first single, concise reference source to provide accurate and informative answers to the many challenging questions of how, why, when, and where national security has…
-
Technology and Terorrism - Paul Wilkinson - Google Books
https://books.google.de/books?id=vIAsBgAAQBAJ&pg=PA36
This volume will be of interest to all students of terrorism, policymakers and security practitioners involved in combating terrorism from government officials, law enforcement, military and intelligence agencies to specialists in industrial security…
-
Iraqi Security Forces Order of Battle, June 2011
http://www.defenseindustrydaily.com/Iraqi-Security-Forces-Order-of-Battle-June-2011-06920/
DJ Elliott is a retired USN Intelligence Specialist (22 years active duty) who has been analyzing and writing on Iraqi Security Forces developments since 2006. His Iraqi Security Forces Order of Battle is an open-source compilation that attempts to map and
-
Penetration Testing: Procedures & Methodologies - EC-Council - Google Books
https://books.google.de/books?id=5m6ta2fgTswC&pg=SA9-PA3&dq=%22angry+ip+scanner%22&hl=de&sa=X&ved=0CF0Q6AEwB2oVChMIrd_-1ZC2xwIVg
The Security Analyst Series from EC-Council | Press is comprised of five books covering a broad base of topics in advanced penetration testing and information security analysis. The content of this program is designed to expose the reader to groundbreaking…
-
Glasfaser und Netzwerke: Wie das Abhören funktionieren könnte « DiePresse.com
http://diepresse.com/home/politik/aussenpolitik/1417019/Glasfaser-und-Netzwerke_Wie-das-Abhoeren-funktionieren-koennte
Josef Pichlmayr, Geschäftsführer der Security-Softwarefirma Ikarus, erklärt, wie die NSA an ihre Daten gelangt sein könnte.
-
Fatou Camara Attacked By Gambian President's Security Men - YouTube
https://www.youtube.com/watch?v=A9Gn6KfypU0
Gambian journalist, Fatou Camara was attacked by the security guards of the Gambian president in Washington DC.
-
Projekt Zukunft Berlin
http://www.berlin.de/projektzukunft/presse/
Angesichts der Digitalisierung wird Digital Security immer wichtiger. Projekt Zukunft wirft einen Blick auf das Berliner Ökosystem.
-
Pallas: IT-Sicherheit aus Brühl bei Köln
http://www.pallas.com/
Security Service: Ausgezeichnet, TÜV-zertifiziert, nach deutschem Datenschutz geprüft. Betrieb von sicheren Lösungen und IT-Sicherheitsberatung
-
Glasfaser und Netzwerke: Wie das Abhören funktionieren könnte « DiePresse.com
https://web.archive.org/web/20140324155422/http://diepresse.com/home/politik/aussenpolitik/1417019/Glasfaser-und-Netzwerke_Wie-d
Josef Pichlmayr, Geschäftsführer der Security-Softwarefirma Ikarus, erklärt, wie die NSA an ihre Daten gelangt sein könnte.