• No se han encontrado resultados

Security and Protection

Security, protection and family norms: Gendered and selective regulations of marriage and migration in Italy and Portugal

Security, protection and family norms: Gendered and selective regulations of marriage and migration in Italy and Portugal

... migration and family in two contemporary European ...Portugal and Italy1, exploring the discourses and practices concerning the marriage of undocumented migrants in the context of the construction of ...

15

The Fair and Equitable Treatment and Full Protection and Security as Investment Protection Standards Established in the Mexico EU BITs  Edición Única

The Fair and Equitable Treatment and Full Protection and Security as Investment Protection Standards Established in the Mexico EU BITs Edición Única

... interpretations, and to conclude that the protections afforded under an additive interpretation are equal to those under the minimum standard of treatment of aliens under customary international law; however, this ...

87

Version 2.0 JSR 118 Expert Group jsr-118-commentsjcp.org

Version 2.0 JSR 118 Expert Group jsr-118-commentsjcp.org

... the security mechanism using JARs but this relies on converting the JAR to the device format when the JAR enters the network while faithfully preserving the semantics of the ...tampering and retain its ...

566

International Security in the Western Hemisphere: Legal and Institutional Developments

International Security in the Western Hemisphere: Legal and Institutional Developments

... hemispheric security show that some issues and mechanisms are better defined, and have a priori- ty over ...tion and already foresees a series of multilateral agreements and new organs ...

34

Crisis and Social Security in Spain

Crisis and Social Security in Spain

... Social Security Act (LSS-1966) was passed to the present-day as a reference for our analysis, we find that protected circumstances of need have ex- ...death and survival—which result from common and ...

13

La violencia escolar desde los medios de comunicación y el poder legislativo en México

La violencia escolar desde los medios de comunicación y el poder legislativo en México

... Sonora and Nayarit include statements in concordance with the second; for example, when they establish responsibilities for the director, and security brigades regarding denouncement of acts ...

12

REGISTRATION: A PRACTICAL GUIDE FOR FIELD STAFF

REGISTRATION: A PRACTICAL GUIDE FOR FIELD STAFF

... staff and supplies are in ...Manifest and providing each Head of Family with a Temporary ...as and when time and the situation ...as and when possible, and in ...

69

TítuloReverse Engineering and Security Evaluation of Commercial Tags for RFID Based IoT Applications

TítuloReverse Engineering and Security Evaluation of Commercial Tags for RFID Based IoT Applications

... LF and HF ...EPCglobal and the ISO 18000-6 ...engineering and security vary a lot depending on the ...reader and tag hardware also varies substantially among manufacturers, in practice, ...

31

ENHANCING URBAN SAFETY AND SECURY: GLOBAL REPORT ON HUMAN SETTLEMENTS 2007

ENHANCING URBAN SAFETY AND SECURY: GLOBAL REPORT ON HUMAN SETTLEMENTS 2007

... 1974 and 2003, 6367 natural disasters occurred globally, causing the death of 2 million people and affecting ...rapid and unplanned urbanization; concen- tration of economic wealth in cities; ...

482

SensoTrust: trustworthy domains in wireless sensor networks

SensoTrust: trustworthy domains in wireless sensor networks

... deploy and publish the services, should the broker be compromised, the applications are not able to access sensor data ...applications and the network will work properly ...head, and DKS reassignment ...

11

Development of a Model for Security and Usability

Development of a Model for Security and Usability

... interfaces and how they use them to perform tasks (Faily & Flechais, ...interface and a good interface can influence users’ ability to perform tasks ...interaction and security (HCISec) ...

74

Estructuras con ataque por cloruros. Aplicación de la protección catódica en el puente a la Illa de Arousa

Estructuras con ataque por cloruros. Aplicación de la protección catódica en el puente a la Illa de Arousa

... galvanic protection the system of Fosroc GRP shirts that were covered with zinc ...the protection system becomes more positive, slowly coming closer to the values given by the CPT system ...

7

Enhanced cooperation and the European Foreign and Security and Defence Policy

Enhanced cooperation and the European Foreign and Security and Defence Policy

... primacy and direct effect, than for the ...defence and the ‘Communiterisation’ of Schengen, newly acceding States are not bound to accept enhanced ...

15

A Multiagent Approach to Outbound Intrusion Detection

A Multiagent Approach to Outbound Intrusion Detection

... changed; security patches can be applied; the system can even be brought off-line for post-mortem, forensics ...these security measures do not prevent the attacking system from targeting a new host should ...

224

AMISOM and the Protection of Civilian in Somalia

AMISOM and the Protection of Civilian in Somalia

... operations and the actual delivery of protection activities, a complex mix of skills and expertise is ...personnel, protection begins with a clear understanding of their obligations and ...

57

AMISOM and the Protection of Civilian in Somalia

AMISOM and the Protection of Civilian in Somalia

... d’Ivoire and transformed into widespread violence and the resulting humanitarian crisis points to the profound challenges that confront the international community in preventing conflicts and ...

57

WAKING UP TO RISK: CORPORATE RESPONSES HIV/AIDS IN THE WORKPLACE

WAKING UP TO RISK: CORPORATE RESPONSES HIV/AIDS IN THE WORKPLACE

... training and recruitment investments ranges from $280,000 to $390,000 in the case of a senior executive and from $17,000 to $31,000 in the case of a support ...training and advocacy expense items of ...

68

Cyberspace and European security

Cyberspace and European security

... Control And Data Acquisition (SCADA) systems and Industrial Control Systems (ICS), Stuxnet succeeded in infecting the computers attached to the Programmable Logic Controllers (PLC) that governed the ...

8

Informe d'Autors UOC a ISI Web of Knowledge  Maig 2012

Informe d'Autors UOC a ISI Web of Knowledge Maig 2012

... Information Security and its Application; Communications in Computer and Information Science; 3rd International Conference on Information Security and Assurance, 25th-27th June 2009, ...

5

Show all 10000 documents...

Related subjects