Papers 141-150 of total 53938 found.
Category: /Literature/Novels
…with the threat of exposure, thus potentially ruining their careers, their marriages and their social standing. Thousands of miles away in Washington it is election time. Teddy Maynard, chief of the CIA, hatches a plan to secure the presidency for a candidate…
Details: Words: 240 | Pages: 1.0 (approximately 235 words/page)
…is our social security number. When this system was set up, Americans were promised that the numbers would not be used as identification. Now, however, these sacred numbers, which lead to all manner of personal information, are routinely required to cash…
Details: Words: 1484 | Pages: 5.0 (approximately 235 words/page)
Security Security has been increased from the local level to the international level. Many of these new security guidelines and laws are a result of the tragic events of 9-11. Everything from the food you eat to foreign policies and affairs have…
Details: Words: 457 | Pages: 2.0 (approximately 235 words/page)
Category: /Law & Government
…by Buzan , consists of military, political, economic, social and environmental facets and although each is not given equal weighting the significance of each and the role they play in the security game is very important, in differing ways and means to differing…
Details: Words: 2535 | Pages: 9.0 (approximately 235 words/page)
Category: /Literature/English
…are actually who you claim to be. In order to get a Class 2 ID, you must not only control your e-mail account, but you must also provide VeriSign with detailed information about your addresses, employment, driver's license, social security number, etc. We…
Details: Words: 2081 | Pages: 8.0 (approximately 235 words/page)
Category: /Literature/English
…of their information away, including credit card numbers, social security numbers, etc… It is therefore imperative that a middle ground be reached, one that allows for the most conveniences provided in the safest possible setting. Discussion of Research A disturbing…
Details: Words: 3191 | Pages: 12.0 (approximately 235 words/page)
…of their information away, including credit card numbers, social security numbers, etc… It is therefore imperative that a middle ground be reached, one that allows for the most conveniences provided in the safest possible setting. Discussion of Research A disturbing…
Details: Words: 3191 | Pages: 12.0 (approximately 235 words/page)
Category: /Literature/English
…Computer Security and the Law Computer Security and the Law Table of Contents Part I Introduction Page 1 Part II The Technological Perspective Page 2 A. The Objectives of Computer Security Page 2 B. Basic Concepts Page 2 – 4 C…
Details: Words: 2096 | Pages: 8.0 (approximately 235 words/page)
…of our government's priority list. Steel calls the concept of national security as "social construct" (1997, 1). It was a construct established because of specific conditions in the world and those conditions, or circumstances, dictated the way Americans…
Details: Words: 5118 | Pages: 19.0 (approximately 235 words/page)
Security Risk in Utility Management <Tab/>As a member of management for a local utility, we deal with security in regards to our operation on a daily basis. A great amount of money, labor, and time is implemented in regards to the safety…
Details: Words: 1830 | Pages: 7.0 (approximately 235 words/page)