Main View
This view is used for searching all possible sources.
First Page Previous Page 1 2 Next Page Last Page
 
1
Due Process for Adverse Personnel Security Determinations ...
1993-09-01

... Descriptors : *SECURITY, *SECURITY PERSONNEL, DATA PROCESSING, DEPARTMENT OF DEFENSE, NATIONAL SECURITY ...

DTIC Science & Technology

2
Arabian Gulf Security
2003-04-01

... It is absolutely essential that AGCC States ensure their own security by taking ... States should not base their relation with the West on oil only but link ...

DTIC Science & Technology

3
Foundations of Ulysses: The Theory of Security
1988-07-01

... of security, called hook-up security, is composable; if two processes are hook- up secure and they are hooked up in a security fashion, then the ...

DTIC Science & Technology

4
Absolute Continuity and Mutual Information for Gaussian ...
1988-12-01

... Title : Absolute Continuity and Mutual Information for Gaussian Mixtures. ... are considered for problems involving a Gaussian mixture process (N sub t ...

DTIC Science & Technology

5
The National Security Policy Process: The National Security ...
2008-11-24

The National Security Policy Process: The National Security Council and Interagency System By ... 4 Page 6. The National Security Policy Process: ...

DTIC Science & Technology

6
INSTRUCTIONAL CONFERENCE ON THE THEORY OF STOCHASTIC PROCESSES: The absolute continuity of distributions of functionals of diffusion processes
1982-12-01

CONTENTSIntroduction � 1. The group of admissible transformations for measures corresponding to diffusion processes � 2. The absolute continuity of distributions of functionals References

NASA Astrophysics Data System (ADS)

7
Personnel Security Adjudicators: Results of a Semi-Structured ...
1987-08-01

... that they applied the guidelines in a similar fashion for ... said it made absolutely no difference in how ... Individual differences in adjudicators may be an ...

DTIC Science & Technology

8
Defining Criteria for Handover to Civilian Officials in Relief ...
2008-03-15

... The fire that resulted from the tremors was devastating. ... security is absolutely an essential element before true progress is made. In the case of ...

DTIC Science & Technology

9
A Geological and Geophysical Information System for Eurasia
1993-12-15

... SECURITY CLASSIFICATION OF THIS PAGE uV-rassified ... negative elevation notation, and the creation ... depicts the absolute elevations to produce ...

DTIC Science & Technology

10
Crime and Security Risk: Background Information for Security ...
1993-08-01

... The answer depends upon whether we are talking about the absolute number of crimes or the crime rate per 100,000 inhabitants, the type of crime ...

DTIC Science & Technology

11
System and Network Security Acronyms and Abbreviations
2009-09-01

... system and network security documents ... DATA PROCESSING SECURITY, WIRELESS COMPUTER NETWORKS, COMMUNICATIONS ...

DTIC Science & Technology

12
Issues in Computer Network Security.
1978-09-01

... of the network reference monitor ... DATA PROCESSING SECURITY, *COMPUTERS, *COMMUNICATIONS NETWORKS, *SECURE ...

DTIC Science & Technology

13
Estimated Impact of the Proposed Automated Continuing ...
2001-05-01

... Descriptors : *SECURITY PERSONNEL, *CLEARANCES, NATIONAL SECURITY, DATA PROCESSING SECURITY, PERSONNEL MANAGEMENT ...

DTIC Science & Technology

14
Placement of Network Security Services for Secure Data ...
1995-09-05

... set of network security administration tools. ... DATA PROCESSING SECURITY, *LOCAL AREA NETWORKS, ALGORITHMS, MILITARY ...

DTIC Science & Technology

15
Network Security and the NPS Internet Firewall.
1994-09-16

... ever growing need for network security. Descriptors : *DATA PROCESSING SECURITY, *AREA SECURITY, *COMPUTER NETWORKS, TEST AND ...

DTIC Science & Technology

16
EXPORT CONTROLS: National Security Risks and Revisions ...
2000-03-23

... 1) assesses the national security risks associated with ... Descriptors : *NATIONAL SECURITY, *RISK, *EXPORTS, *DATA PROCESSING SECURITY ...

DTIC Science & Technology

17
CHIPS. Volume 29, Issue 1, January - March 2011
2011-03-01

... INFORMATION SECURITY, *SOCIAL SECURITY, *DATA PROCESSING SECURITY, DATA TRANSMISSION SECURITY, AWARENESS, NAVY ...

DTIC Science & Technology

18
The Origin and Development Process of the National Security ...
2004-05-03

USAWC STRATEGY RESEARCH PROJECT THE ORIGIN AND DEVELOPMENTAL PROCESS OF THE NATIONAL SECURITY STRATEGY ...

DTIC Science & Technology

19
The National Security Policy Process: The National Security Council and Interagency System

The National Security Policy Process: The National Security Council and Interagency System By Alan, 2008 #12;THIS PAGE INTENTIONALLY BLANK 2 #12;Table of Contents The National Security Policy Process: The National Security Council and Interagency System

E-print Network

20
Periodicity and Absolute Regularity.
1983-01-01

For a stationary ergodic process, it was proved that the dependence coefficient associated with absolute regularity has a limit connected with a periodicity concept. Similar results are then obtainable for stronger dependence coefficients. The periodicity...

National Technical Information Service (NTIS)

First Page Previous Page 1 2 Next Page Last Page
 
First Page Previous Page 1 2 Next Page Last Page
 
21
MEASUREMENTS OF ABSOLUTE, SINGLE CHARGE EXCHANGE CROSS SECTIONS OF ...

Absolute measurements have been made of single electron charge exchange cross ... Charge exchange is an important process in solar and stellar atmospheres, ...

NASA Website

22
Prospects for Improving the Resource Allocation Process for ...
2004-06-01

... This paper examines the resource allocation process for national security in Jamaica. ... Budget Formulation process for National Security � Jamaica ...

DTIC Science & Technology

23
Department of Homeland Security (DHS) Personnel Security Process.
2009-01-01

This report assesses the effectiveness and efficiency of the Department of Homeland Securitys personnel security programs. At the creation of the Department of Homeland Security, the Office of Security was given oversight of component personnel security p...

National Technical Information Service (NTIS)

24
Window's NT Network Security A Manager's Guide
1997-12-01

... Window's NT Network Security A Manager's ... DATA PROCESSING SECURITY, MODELS ... COMPUTERS), COMPUTER NETWORKS, ELECTRONIC ...

DTIC Science & Technology

25
Sub-system Evaluation Report, Computer Security ...
1987-07-13

... SECURITY, *COMPUTER PROGRAMS, *DATA PROCESSING SECURITY, DEPARTMENT OF DEFENSE, AUDITING, COMPUTERS, ACCESS ...

DTIC Science & Technology

26
Security Risks from a Software Monoculture
2008-11-15

... Title : Security Risks from a Software ... DATA PROCESSING SECURITY, *COMPUTER ... OFF ANALYSIS, CONFIGURATIONS, HOMOGENEITY, RISK. ...

DTIC Science & Technology

27
Proposed Network Security Policy for Integrated Tactical ...
1993-09-01

... Risk reduction, Network security management ... DATA PROCESSING SECURITY, *TACTICAL ... AUDITING, COMPUTER NETWORKS, TOPOLOGY ...

DTIC Science & Technology

28
Pike Creek Computer Company SGT Security Version 4A
1987-07-16

... Descriptors : *COMPUTER PROGRAMS, *DATA PROCESSING SECURITY, SYSTEMS ANALYSIS, COMPUTERS, SECURITY, DEPARTMENT OF ...

DTIC Science & Technology

29
Personnel Security Clearances. Preliminary Observations on ...
2008-07-30

... Security Clearance Program ... Improve the Security Clearance Process Highlights of GAO-06-1070, a report to congressional requesters ...

DTIC Science & Technology

30
Personnel Security Clearances. An Outcome-Focused ...
2009-05-01

... prepare annual performance reports · Monitor security clearance timeliness and quality ... Are Critical to Reforming the Security Clearance Process ...

DTIC Science & Technology

31
European Security Organizations in the Post-Cold-War ...
2006-03-01

... of internal and external security threats, of the EU integration process, of their responsibility for their own security, and of ...

DTIC Science & Technology

32
Common Database Format for Network Security Data
1999-07-26

... Abstract : In the area of network security, there are ... DATA PROCESSING SECURITY, *COMPUTER NETWORKS, *RELATIONAL DATA ...

DTIC Science & Technology

33
x - NASA Technical Reports Server

Mar 1, 2011 ... An analytical technique for measurement of absolute water depth based ... The building is a storm resistant facility and provides a secure ...

NASA Website

34
Advancing the science of forensic data management
2002-07-01

Many individual elements comprise a typical forensics process. Collecting evidence, analyzing it, and using results to draw conclusions are all mutually distinct endeavors. Different physical locations and personnel are involved, juxtaposed against an acute need for security and data integrity. Using digital technologies and the Internet's ubiquity, these ...

NASA Astrophysics Data System (ADS)

35
The Human Dimension of Network Security
2004-03-18

... DATA PROCESSING SECURITY, *NETWORK ANALYSIS(MANAGEMENT), *COMPUTER NETWORKS, STANDOFF, CRYPTOGRAPHY ...

DTIC Science & Technology

36
Security Analysis and Enhancements of Computer Operating ...
1976-04-01

... Descriptors : *DATA PROCESSING SECURITY, *OPERATING SYSTEMS( COMPUTERS), COMPUTER PROGRAMS, SYSTEMS ANALYSIS ...

DTIC Science & Technology

37
Interoperability: The Cornerstone of Information Warfare.
1996-04-12

... SYSTEMS, *DATA PROCESSING SECURITY, *INTEROPERABILITY, *SECURE COMMUNICATIONS, COMPUTER COMMUNICATIONS ...

DTIC Science & Technology

38
File Attributes and Their Relationship to Computer Security.
1974-06-01

... Descriptors : *DATA PROCESSING SECURITY, MATHEMATICAL MODELS, MATHEMATICAL LOGIC, THESES, MEMORY DEVICES ...

DTIC Science & Technology

39
Consolidating Change: Transitional Security and Operational ...
2006-02-13

... CONSOLIDATING CHANGE: TRANSITIONAL SECURITY AND OPERATIONAL ART By ... That situation may be in the process of changing. ...

DTIC Science & Technology

40
Applicability of Army Automation Security Guidance to Local ...
1987-03-01

... of a network based on existing ... DATA PROCESSING SECURITY, *COMMUNICATIONS NETWORKS, ARMY OPERATIONS ...

DTIC Science & Technology

First Page Previous Page 1 2 Next Page Last Page