Powered by Deep Web Technologies
Note: This page contains sample records for the topic "586-1076 secure file" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

OHA Security Cases Archive File | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

is a archive file of our Security decisions, Please download this file to your local computer and use the build in adobe search feature. Individual cases are listed in the...

2

Yale Secure File Transfer For assistance contact the ITS Help Desk 203-432-9000, helpdesk@yale.edu  

E-Print Network (OSTI)

Yale Secure File Transfer For assistance contact the ITS Help Desk 203-432-9000, helpdesk Yale's new file transfer service tool ­ Yale Secure File Transfer. This updated secure file transfer

Crair, Michael C

3

Department of Energy FILE& National Nuclear Secur~ty Administration  

Office of Legacy Management (LM)

FILE& FILE& National Nuclear Secur~ty Administration Nevada Site Office 2005 M U 22 AII 9 ~5 P.O. Box 9851 8 Las Veaas. N V 89193-8518 ytL'i,ii. C;,;/TH Lamar County Chancery,Clerk's Office P.O. Box 1240 Purvis, Mississippi 39475-1240 AUG 2 5 2005 CHANCEiiY CLERK DEED RESTRICTION The U. S. Department of Energy, Nevada Site Office (DOENSO), hereby requests that this document be recorded as part of the deed to the property identified below, and become public record for future inquiries regarding ownership, history and property restrictions of said parcel. 1. The United States of America possesses the lands described below and shown on attached map as Tract 100 In Warranty Deed Conveying Fee and Easement recorded December 2nd 1994 further described as follows:

4

eia757b.xls  

U.S. Energy Information Administration (EIA) Indexed Site

Fax: (202) 586-1076 If any Plant Identification Data has changed since the last report, Secure File Transfer: Plant Name: Questions? Call: (877) 800-5261 Plant Address 1: Plant Address 2: City: State: County: Zip: - Plant Owner Companies (Top Three): 1 2 3 Operator Company: Processing Plant Operations Contact: Contact Name: Contact Name: Title: Title: Company: Company: Secondary Phone No.: Secondary Phone No.: Page 1 Comments: (To separate one comment from another, press ALT+ENTER) Ext: Ext: NATURAL GAS PROCESSING PLANT SURVEY Schedule B: Emergency Status Report Version No.: 2012.01

5

EIA-819  

U.S. Energy Information Administration (EIA) Indexed Site

Site Name: Terminal Control Number (TCN): Email: Physical Address (e.g., Street Address, Building Number, Floor, Suite): Fax: (202) 586-1076 Secure File Transfer: City: State: Zip: - Electronic Transmission: City: State: Zip: - Contact Name: Phone No.: Ext: Fax No.: Email address: Questions? Call: 202-586-9612 Product Code 190 Comments: Identify products reported as "Other Oxygenates" (code 445) in Part 4 and any unusual aspects of your reporting month's operations. (To separate one comment from another, press ALT+ENTER.) Nameplate Capacity Fuel Ethanol Nameplate Production Capacity Item Description FORM EIA-819 MONTHLY OXYGENATE REPORT

6

FILE  

Office of Legacy Management (LM)

c&o--L>+/ c&o--L>+/ co.o-09 ~~Epq-J+~~jDU" 1 . [o( / 5-/-- 1, "I ' -i, [ . - -. j s: FILE :3r.jNER is} -------.- pas',: Current: -----__---_---__-------- ----____-_________________ Cwner ccntacted 0 yes 0 nag i+ yet,? date czntacted ----___--I__- Ty-;Pfz ,' F iTiC~CC2~j 1 iljbj AA-r-ti--=' ="L---- /8;' ; z.eseaf-ch & sevei apment EJ F' raducticx scale tssting rJ Pilot si-jle 0 ' jench Scale Fracess 0 Theoretical Studies 0 Samp:! e & haivsis 0 Fz-citity Tvpe 0 Manui artur i ng 0 University 3 Research *27ganizati.sn g Government Spensored Faci I i ty 0 other -~-q_-~ ----- i *c' rcd$srti an Di rposal /Storage T' /P!= I-IF rgfijTk#qfJ- -~L=-=--e---~----- 0 Prime Suacontractot- i f' urchass Order 0 Other infcrmatian

7

FAQs for Survey Forms 809 and 819  

Gasoline and Diesel Fuel Update (EIA)

9 and 819 9 and 819 EIA-809 (Weekly Oxygenate Report) How do I submit the form? There are four ways to submit the EIA-809 form. Secure File Transfer: https://signon.eia.doe.gov/upload/noticeoog.jsp The Secure File Transfer System uses the secure hypertext transfer protocol (HTTPS), an industry standard method to send information over the web using secure, encrypted processes. Electronic Filing Option: The PC Electronic Data Reporting Option (PEDRO) is a Windows-based application that will enable you to enter data interactively, import data from your own database, validate your data online, and transmit the encrypted data electronically to EIA via the Internet or a dial-up modem. To receive this free software call (202) 586-9659. Email: oog.surveys@eia.gov Fax forms to: (202) 586-1076

8

Building Security System Based on Grid Computing To Convert and Store Media Files  

Science Journals Connector (OSTI)

In the recent years, Grid Computing (GC) has made big steps ... This paper introduces an approach to integrate the security mechanisms, Grid Security Infrastructure (GSI) of the open source...

Hieu Nguyen Trung; Duy Nguyen; Tan Dang Cao

2010-01-01T23:59:59.000Z

9

Security  

Energy.gov (U.S. Department of Energy (DOE))

Security refers to the security of the stream of principal and interest repayments and what happens in the event that a secured loan defaults.

10

Modified Letter from Tom Formanek, Manager, Ithaca Social Security Administration September 2011  

E-Print Network (OSTI)

for a Social Security number, becoming insured under Social Security, planning for retirement, and filing

Hemami, Sheila S.

11

Version No.:2010.01 PART 2. SUBMISSION/RESUBMISSION INFORMATION  

U.S. Energy Information Administration (EIA) Indexed Site

Email: Floor, Suite): Fax: (202) 586-1076 City: State: Zip: - Secure File Transfer: Electronic Transmission: City: State: Zip: - Contact Name: Phone No.: Ext: Fax No.: Email address: Questions? Call: 202-586-3307 FORM EIA-804 This report is mandatory under the Federal Energy Administration Act of 1974 (Public Law 93-275). Failure to comply may result in criminal fines, civil penalties and other sanctions as provided by law. For further information concerning sanctions and data protections see the provision on sanctions and the provision concerning the confidentiality of information in the instructions. Title 18 USC 1001 makes it a criminal offense for any person knowingly and willingly makes to any Agency or Department of the United States any false, fictitious, or fraudulent statements as to any matter within its jurisdiction.

12

EIA-800  

U.S. Energy Information Administration (EIA) Indexed Site

Site Name: Site Name: Email: Terminal Control Number (TCN): Fax : (202) 586-1076 Physical Address of Contact (e.g., Street Address, Building Number, Secure File Transfer: State: Zip: - Electronic Transmission: City: State: Zip: - Contact Name: Questions? Call: 202-586-6281 Ext: Product Code 990 490 491 492 493 Product Code 399 400 401 % % Comments: Identify any unusual aspects of your reporting month's operations. (To separate one comment from another, press ALT+ENTER.) Weighted Average API Gravity (at 60 o F) PART 4. SULFUR CONTENT AND API GRAVITY OF CRUDE OIL (Report either 030 or 040 but not both) o API Weighted Average Sulfur Content Input 040 FORM EIA-810 MONTHLY REFINERY REPORT This report is mandatory under the Federal Energy Administration Act of 1974 (Public Law 93-275). Failure to comply may result in criminal fines, civil penalties and

13

EIA-817  

U.S. Energy Information Administration (EIA) Indexed Site

Email: Email: Physical Address (e.g., Street Address, Building Number, Floor, Suite): Fax: (202) 586-1076 Secure File Transfer: City: State: Zip: - Electronic Transmission: City: State: Zip: - Contact Name: Phone No.: Ext: Fax No.: Email address: Questions? Call: 202-586-6254 FORM EIA-817 MONTHLY TANKER AND BARGE MOVEMENTS REPORT This report is mandatory under the Federal Energy Administration Act of 1974 (Public Law 93-275). Failure to comply may result in criminal fines, civil penalties and other sanctions as provided by law. For further information concerning sanctions and data protections see the provision on sanctions and the provision concerning the confidentiality of information in the instructions. Title 18 USC 1001 makes it a criminal offense for any person knowingly and willingly makes to any Agency or

14

EIA-800  

U.S. Energy Information Administration (EIA) Indexed Site

Email: Email: Floor, Suite): Fax: (202) 586-1076 City: State: Zip: - Secure File Transfer: Electronic Transmission: City: State: Zip: - Contact Name: Phone No.: Ext: Fax No.: Questions? Call: 202-586-3307 Email address: PADD 2 PADD 3 PADD 4 PADD 5 Mailing Address of Contact (e.g., PO Box, RR): If the physical and mailing addresses are the same, only complete the physical address. Comments: Identify any unusual aspects of your reporting week's operations. (To separate one comment from another, press ALT+ENTER.) For the PC Electronic Data Reporting Option (PEDRO) software, call (202) 586-9659. (See Form instructions, pg 1.) Quantities entered below should be the weekly equivalent of those reported monthly to the Energy Information Administration by your company on Form EIA-813, "Monthly Crude Oil Report".

15

EIA-801  

U.S. Energy Information Administration (EIA) Indexed Site

EIA ID NUMBER: If any Respondent Identification Data has changed since the last report, enter an "X" in the box: Company Name: Doing Business As: Email: Fax: (202) 586-1076 Secure File Transfer: City: State: Zip: - Electronic Transmission: City: State: Zip: - Contact Name: Phone No.: Ext: Fax No.: Questions? Call: 202-586-3307 Email address: Physical Address (e.g., Street Address, Building Number, Floor, Suite): Day Mo FORM EIA-801 WEEKLY BULK TERMINAL REPORT This report is mandatory under the Federal Energy Administration Act of 1974 (Public Law 93-275). Failure to comply may result in criminal fines, civil penalties and other sanctions as provided by law. For further information concerning sanctions and data protections see the provision on sanctions and the provision concerning the

16

EIA-800  

U.S. Energy Information Administration (EIA) Indexed Site

1. RESPONDENT IDENTIFICATION DATA 1. RESPONDENT IDENTIFICATION DATA PART 2. SUBMISSION/RESUBMISSION INFORMATION Year REPORT PERIOD: If this is a resubmission, enter an "X" in the box: EIA ID NUMBER: If any Respondent Identification Data has changed since the last report, enter an "X" in the box: Company Name: Doing Business As: Site Name: Email: Terminal Control Number (TCN): Fax: (202) 586-1076 Physical Address of Contact (e.g., Street Address, Building Number, Secure File Transfer: Floor, Suite): City: State: Zip: - Electronic Transmission: City: State: Zip: - Contact Name: Questions? Call: 202-586-3307 Phone No.: Ext: Fax No.: Email address: Day Mailing Address of Contact (e.g., PO Box, RR): If the physical and mailing addresses are the same, only complete the physical address.

17

EIA-820  

U.S. Energy Information Administration (EIA) Indexed Site

EIA ID NUMBER: EIA ID NUMBER: If this is a resubmission, enter an "X" in the box: If any Respondent Identification Data has changed since the last report, enter an "X" in the box: Company Name: Forms may be submitted using one of the following methods: Doing Business As: Site Name: Email: Terminal Control Number (TCN): Physical Address (e.g., Street Address, Building Number, Floor, Suite): Fax: (202) 586-1076 City: State: Zip: - Secure File Transfer: City: State: Zip: - Questions? Call: 202-586-6281 Contact Name: Phone No.: Ext: Fax No.: Email address: Mailing Address of Contact (e.g., PO Box, RR): If the physical and mailing addresses are the same, only complete the physical address. FORM EIA-820 REPORT YEAR 2014 This report is mandatory under the Federal Energy Administration Act of 1974 (Public Law 93-275). Failure to comply may result in criminal fines, civil penalties and

18

This form may be submitted to the EIA by mail, fax, e-mail, or secure file trans  

U.S. Energy Information Administration (EIA) Indexed Site

using a secure method of transmission: HTTPS. This is an industry standard method to send information over the web using secure, encrypted processes. (It is the same method that commercial companies communicate with customers when transacting business on the web.) To use this service, we recommend the use of Microsoft Internet Explorer 5.5 or later or Netscape 4.77 or later. Send your surveys using this secure method at: https://idc.eia.doe.gov/upload/noticeoog.jsp." using a secure method of transmission: HTTPS. This is an industry standard method to send information over the web using secure, encrypted processes. (It is the same method that commercial companies communicate with customers when transacting business on the web.) To use this service, we recommend the use of Microsoft Internet Explorer 5.5 or later or Netscape 4.77 or later. Send your surveys using this secure method at: https://idc.eia.doe.gov/upload/noticeoog.jsp." ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,," OMB No. 1905-0057" ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,," Expiration Date: 7/31/2016" ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,," Version No: 2013.002" "ANNUAL REPORT OF THE ORIGIN OF NATURAL GAS LIQUIDS PRODUCTION"

19

This form may be submitted to the EIA by mail, fax, e-mail, or secure file trans  

U.S. Energy Information Administration (EIA) Indexed Site

5.5 or later or Netscape 4.77 or later. Send your surveys using this secure method at: https://signon.eia.doe.gov/upload/noticeoog.jsp" 5.5 or later or Netscape 4.77 or later. Send your surveys using this secure method at: https://signon.eia.doe.gov/upload/noticeoog.jsp" ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"OMB No. 1905-0174" ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"Expiration Date: 12/31/2015" ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,"Version No.: 2013.01" "FORM EIA-782A" "REFINERS'/GAS PLANT OPERATORS' MONTHLY PETROLEUM PRODUCT SALES REPORT" "This report is mandatory under the Federal Energy Administration Act of 1974 (Public Law 93-275). Failure to comply may result in criminal fines, civil penalties and other sanctions as provided by law. Title 18 USC 1001 makes it a criminal offense for any person knowingly and willingly to make to any Agency or Department of the United States any false, fictitious, or fraudulent statements as to any matter within its jurisdiction. See Instructions for further details on the sanctions and the provisions concerning the confidentiality of information submitted on this form."

20

Dealing with Local Files Using the File API  

Science Journals Connector (OSTI)

Its a well-known fact that for the sake of security and privacy, browsers dont allow web applications to tamper with the local file system. Local files are used in a web application only when the user decide...

Bipin Joshi

2012-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "586-1076 secure file" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

T-647: PHP File Upload Bug May Let Remote Users Overwrite Files on the  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: PHP File Upload Bug May Let Remote Users Overwrite Files on 7: PHP File Upload Bug May Let Remote Users Overwrite Files on the Target System T-647: PHP File Upload Bug May Let Remote Users Overwrite Files on the Target System June 15, 2011 - 3:45pm Addthis PROBLEM: A vulnerability was reported in PHP. A remote user may be able to overwrite files on the target system. PLATFORM: PHP prior to 5.3.7 ABSTRACT: PHP is prone to a security-bypass vulnerability.Successful exploits will allow an attacker to delete files from the root directory, which may aid in further attacks. PHP 5.3.6 is vulnerable; other versions may also be affected. reference LINKS: PHP Security Notice PHP CVE-2011-2202 SecurityTracker Alert ID: 1025659 Secunia Advisory: SA44874 CVE-2011-2202 IMPACT ASSESSMENT: High Discussion: The vulnerability lies in the 'SAPI_POST_HANDLER_FUNC()' function in

22

82 Int. J. Security and Networks, Vol. 8, No. 2, 2013 Copyright 2013 Inderscience Enterprises Ltd.  

E-Print Network (OSTI)

. By exploiting DupeFile, adversary can store two or more files with the same name/path, with different contents tools: DupeFile Detector and DupeFile Extractor for detecting and recovering hidden files respectively, forensic analysis of file systems, forensic file carving, and security in WSNs and MANETs. He has published

Wu, Jie

23

Important Filing Information | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Important Filing Information Important Filing Information Important Filing Information Filing Information The Office of Hearings and Appeals (OHA) encourages electronic filing of submissions, by e-mail or by telefax. OHA's e-mail address for filing submissions is OHA.filings@hq.doe.gov; the OHA telefax number is (202) 287-1415. Note, however, that because of signature issues, we may ask you to file a signed original of a document. We will send an acknowledgment (by letter or e-mail) upon our receipt of all principal pleadings. If you choose to file by regular mail, we caution that under governmental security procedures now in place, the U.S. Postal Service randomly selects items of first class mail addressed to OHA for screening at a facility outside of OHA, e.g. for irradiation of potentially hazardous materials.

24

File Systems  

NLE Websites -- All DOE Office Websites (Extended Search)

File Systems File Systems File Systems For a general description of the different file systems available on PDSF please see Eliza File Systems and Other File Systems. Below is a summary of how STAR uses the various systems: /common The STAR software is installed on /common. For 32sl44 it is under /common/star/star44 and for sl53 it is under /common/star/star53. In both cases the software consists primarily of a STAR-specific ROOT installation on which releases of the STAR libraries are built as shown on the Local STAR Libraries page. /eliza3, /eliza6, /eliza9, /eliza14, /eliza15, /eliza17 STAR has space on 6 elizas as shown in the table below. File System star space (TB) use eliza3 39 production eliza6 9 production eliza9 39 production eliza14 34 production, user space under /eliza14/star/pwg

25

ADMINISTRATIVE RECORDS SCHEDULE 18: SECURITY, EMERGENCY PLANNING...  

Office of Environmental Management (EM)

records include the various files created by the Department to control and protect safeguards and security interests (e.g., classified information, sensitive unclassified...

26

File Formats  

NLE Websites -- All DOE Office Websites (Extended Search)

Home Page Home Page File Formats MODIS Product Subsets Output Data File Format Descriptions The MODIS product subsets for North America and Worldwide are available in several formats, which are described in the following text. MODIS Land Product ASCII Data Image Data Files in ASCII Grid Format QC-Filtered Data and Statistics Generated for this Request Land Cover Data in ASCII Grid Format Statistical Data for MODIS Land Products in Comma Separated Format Underlying BRDF Parameters Used in Generating this Request (available with Albedo MOD43B and MCD43B only) MODIS Land Product ASCII Data Description of File File Content: Data as read from MODIS Land Product HDF-EOS data files. These data are the starting point for deriving the other subset data products. Data Type: As indicated by Land Product Code (e.g., MOD15A2).

27

MICROCOMP output file  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

O:\END\EPAC300.lc (file 1 of 19) O:\END\EPAC300.lc (file 1 of 19) S.L.C. 109TH CONGRESS REPORT " ! HOUSE OF REPRESENTATIVES SENATE 1st Session 109- ENERGY POLICY ACT OF 2005 , 2005.-Ordered to be printed , from the committee of conference, submitted the following CONFERENCE REPORT [To accompany H.R. 6] The committee of conference on the disagreeing votes of the two Houses on the amendment of the Senate to the bill (H.R. 6), to en- sure jobs for our future with secure, affordable, and reliable energy, having met, after full and free conference, have agreed to rec- ommend and do recommend to their respective Houses as follows: That the House recede from its disagreement to the amendment of the Senate and agree to the same with an amendment as fol- lows: In lieu of the matter proposed to be inserted by the Senate

28

Security and Privacy Notice  

NLE Websites -- All DOE Office Websites (Extended Search)

Security and Privacy Notice Security and Privacy Notice Thank you for visiting the Office of Health, Safety and Security (HSS) web site and reviewing our position on security and privacy. SECURITY NOTICE This web site is part of a Federal computer system and is the property of the United States Government. It is for authorized use only. The Department of Energy monitors this web site for security purposes to ensure it remains available and to protect information in the system. The Department of Energy uses software programs and additional equipment to monitor network traffic to identify unauthorized attempts to access, obtain, alter, damage or destroy information, or otherwise to interfere with the system or its operation. Any and all uses of this system and all files on this system

29

EIA-176 Electronic Filing System (EFS)  

Gasoline and Diesel Fuel Update (EIA)

EIA-176 Electronic Filing System (EFS) EIA-176 Electronic Filing System (EFS) Released: January 17, 2013 Background The Form EIA-176, "Annual Report of Natural and Supplemental Gas Supply and Disposition," is used to collect data on the supply and disposition of natural gas in the United States. These data are collected by the Energy Information Administration (EIA), U.S. Department of Energy (DOE), to fulfill its responsibilities for gathering and reporting energy data. Reporting on the Form EIA-176 is mandatory. Electronic Filing System The Form EIA-176 Electronic Filing System (EFS) provides respondents with an efficient and effective means for filing the form using a personal computer (PC). Respondents have a choice of submitting data via either secure file transfer or email. Hardware / Software Requirements

30

Facility Security Officer Contractor Toolcart  

NLE Websites -- All DOE Office Websites (Extended Search)

U.S. DOE SECURITY CLEARANCES U.S. DOE SECURITY CLEARANCES Clearnce Home Initial Clearance Clearance Reinstate Clearance Upgrade Clearance Downgrade Clearance Extension Clearance Reciprocity Clearance Reinvestigation Clearance Termination Clearance Transfer Sandia National Laboratories sponsors and processes U.S. DOE Security Clearances for contractor personnel working on an authorized contract requiring access to classified information. Clearance Office Functions Contractor Pre-Process Background Review Certification Clearance File Change Drug Testing e-Fingerprinting Enrollment Process Maintaining a DOE Security Clearance During an Extended Absence DOE Personnel Security Reporting Requirements Data Report on Spouse/Cohabitant Name Change Change in Citizenship Contractor Clearance Tools Clearance Action Status Inquiries

31

Global Home File System at NERSC  

NLE Websites -- All DOE Office Websites (Extended Search)

Home Home Global Home Filesystem Overview Global home directories (or "global homes") provide a convenient means for a user to have access to source files, input files, configuration files, etc., regardless of the platform the user is logged in to. Wherever possible, you should refer to your home directory using the environment variable $HOME. The absolute path to your home directory (e.g., /u4/elvis/) may change, but the value of $HOME will always be correct. For security reasons, you should never allow "world write" access to your $HOME directory or your $HOME/.ssh directory. NERSC scans for such security weakness, and, if detected, will change the permissions on your directories. Platforms Utilizing Global Home The Global Home file system is available on all NERSC systems except PDSF.

32

TO: FILE  

Office of Legacy Management (LM)

TO: FILE TO: FILE FROM: ~~~r&m--- SUBJECT: MEMORANDUM DATE +!~&j!?~ _______ SITE NAME: CITY: -,&a o~-,--,-,--,-_-,sT~TE:-~A- P OWNER(S) --~=c-L&& ----- -------- Cu-rc"t: B_eh& --------------_- Owner contacted 0 yes 0 no; if yes, dete contacted ------------- TYPE OF OPERATION ----------------- 0 Research & Development 6 0 Production scale testing Pilot Scale 0 Bench Scale Process 0 Theoretical Studies 0 Sample 84 Analysis Y Facility Type Bi Manufacturing University 0 Research Organization 0 0 Government Sponsored Facility 0 Other --------------------- 0 Production 0 Disposal/Storage TYPE OF CONTRACT -------------w-w 0 Prime 0 Subcontract&r 6 Purchase Order cl Other information (i.e., cost + fixed fee, unit price, time & material, etc) ___

33

TO: FILE  

Office of Legacy Management (LM)

TO: FILE TO: FILE D iev' c FROM: ---L----l!!--- MEMORANDUM k+=+ 7 DATE--- _-- ----_---- past: ---------- - -- .---1---------. &4 k WOdY Curr="t:----------------------- Owner contacted ,es *no; ' 0, -if yes, date contacted TYPE OF OPERATION ----------------- p Research & Dews1 opment q Production scale testing 0 Pilot Scale q Sample 84 Analysis B Production q Facility Type 0 Hanufacturinq 0 University 0 Research Organization c] Government Sponsored Facility q Other --------------------- ' IvP!LoE-c!EI~ncI fl Prime 0 Subcontractor 0 Purchase Order !B Other information (i.e., cost + fixed fee, unit price, PIEWUED FIEWMED GOVT GOVT CONTRACTOR CONTRRCTOR OWE!! LEASE_D O!!!NH LE_ASEE OWNED ---------- ~-~LE!3_SEI! % LANDS i u 0 BUILDINGS EQUIPMENT

34

V-237: TYPO3 Security Bypass Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

V-237: TYPO3 Security Bypass Vulnerabilities V-237: TYPO3 Security Bypass Vulnerabilities V-237: TYPO3 Security Bypass Vulnerabilities September 9, 2013 - 6:00am Addthis PROBLEM: Some vulnerabilities have been reported in TYPO3 PLATFORM: TYPO3 6.x ABSTRACT: TYPO3 comes with the possibility to restrict editors to certain file actions (copy, delete, move etc.) and to restrict these actions to be performed in certain locations REFERENCE LINKS: Secunia Advisory SA54717 Security Focus ID 62257 IMPACT ASSESSMENT: Medium DISCUSSION: 1) Some errors when handling file actions can be exploited to bypass file action permission restrictions and e.g. create or read arbitrary files within or outside the webroot. 2) An error when validating file names within the file renaming functionality can be exploited to bypass the denied file extensions check

35

TO: FILE  

Office of Legacy Management (LM)

if' if' /, SO -1 : . . ' - ,? \\?.. . . ..- ,- I, al. I, .I (. ,g \. ' \ ,, " ' tlEMOHANDUM TO: FILE FROH: (?.)-/ki' + SITE ALTERNATE ---..~..~.~, NAME: ;d QJA I. /O", JL Ir,, e> 1 :' - _____ ---_--- ---+w- __________ -Nan= __- _____ - _________ Owner cork&ted I-J yes [Bno; If yes, data con'tacted _----__-_ TYPE OF OPERATION ---~~~~~---~~--__ a Research & Development 11 Facility Type 0 Production scale testing 0 Pilot Scale 3 Bench Scale Process Theoretical Studies cl Sample 81 finalysis !-J e4nufacturing 0 University q Research Organization IJ Government Sponsored Facil it) 0 Other ------------_ 0 Production 0 Disposal /Storage TYPE OF CONTRCICT -_-~~~~----~-~-- ,& Prime [II Subcontractor 0 Purchase Order 0 Other information (i.e., ~7,s:

36

TO: FILE  

Office of Legacy Management (LM)

, , TO: FILE ---w-o----- SUBJECT: 1 CITY: STATE: fld -------------------------- OWNER(S) -------_ Past: _----------------------- curr,ent : --------------------______ Owner cnntakted 0 yes RI-IO; if yes, date contacted----- ~TYPE OF OPERATION .: ,. 0. Research & Development n Facility Type 0 Production scale testing 0 Pilot Scale 0 Manufacturing 0 Ben&i Scale Process 0 University 0 Theoretical Studies IJ Research Organizatian a 0 Government Sample & Analysis .' 0 Production 0. Disposal f Storage a Prime 0 Subcnntract& 0 Purchase Order cl Other inf brmation (i . e., cast + fixed fee, unit price, time & material, qtc) --_---- ~----~---~~~----_-----~~---~ Ccntract/Purch&se Order t). ~--~-~---~~~----_------~---- ---------------------------------

37

TO: FILE  

Office of Legacy Management (LM)

tlEtlORANDUtl tlEtlORANDUtl TO: FILE 311% /1 DATE-----------~------- FROM: P. %a- w-----------_____ SUBJECT: F,/;-;d&;- /3ec+.e I SITE ALTERNATE NAME: --~~~-~-;,.--_~~~~-~-------------NAHE:----------------- _____ CITY: -!%!2~-&&-~- _______ STATE: s.-c&- OWNER(S) _--_--__ Past: ------------------------ Current: I Owner contacted 0 yes --_--~~~--~~~~--~_~--~~-~~ 0 no; if ye., date contacted 1 I TYPE OF OPERATION ---------------__ q Research & Development 0 Production scale testing a Pilot scale 0 Bench Scale Process 0" Theoretical Studies Sample b Analysis 0 Production 0 Disposal/Storage @- Facility Type 0 Government Sponsored Facility W Clther --_Lp2+k-4;- --------------- TYPE OF CONTRACT -_------------__ a Prime 0 Subcontract&

38

Security Cases | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

January 11, 2012 January 11, 2012 TSO-01113 - In the Matter of Personnel Security Hearing The individual currently is employed by a DOE contractor, and that contractor has requested that he receive a DOE security clearance. Based on financial issues contained in the individual's security file, the Local Security Office (LSO) conducted a Personnel Security Interview (PSI) with the individual in July 2011. PSI, DOE Ex. 13 In August 2011, the LSO issued the individual a Notification Letter, together with a statement (Enclosure 2) setting forth the information that created a substantial doubt about his eligibility to hold a DOE security clearance. (DOE Ex. 1). December 21, 2011 TSO-1106 - In the Matter of Personnel Security Hearing The Individual is an applicant for a DOE access authorization in connection

39

Global Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Applications Global Security science-innovationassetsimagesicon-science.jpg Global Security National security depends on science and technology. The United States relies on...

40

Scalable Security for Petascale Parallel File Systems  

E-Print Network (OSTI)

capabilities, high-performance computing, scalabilityin recent years. High performance computing (HPC) scienti?cLarge-scale high performance computing often involves

Leung, Andrew W.; Miller, Ethan L; Jones, Stephanie

2007-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "586-1076 secure file" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

TO: FILE  

Office of Legacy Management (LM)

pA.l4-l-j pA.l4-l-j TO: FILE I 4 MENORANDUM SUBJECT: aLwE?. .v --_---__ Past: Current: ----__-_____-----------~ -------------------_------ owner c:3ntacted q yes pm; if yes, date contacted ----------__- TYPE OF OPERATION ---_--__~~------_ 0 Research & Development 0 Production scale testing 0 Pilot 5cale 0 Bench Scale Process i Thearetical Studies Sample & Analysis 0 Producti on E Disposal/Storage Facility Type 0 Manufacturing 0 Uni verri ty 0 Research Organization 0 Government Sponsored Facility Cl Other &by-& e- -------- TYPE OF CONTRACT ~--_---_~_-----_ 0 Prime G Subcontractor *! Put-c!wse Order 0 Other information (i.e., cost + fixed fee, unit price, time & material, qtr) m--m--- -----------------_-------~~~ Contract/Purchase Order #

42

To: File  

Office of Legacy Management (LM)

iU i.1 ' iU i.1 ' i d1m1 To: File Fl-0lll: a. Wall0 Subject: FUSRAP review of the former Internationai Rare Metals site in Mt. Kisco New York. The former International Rare Metals Refinery in Mt. Eisco, NY began operations in the early 1940's. Throughout its operatic and in various correspondence it has also been known as "Pregs Mt. Ki sco Refinery" and most,recently, the Canadian Radium and Uranium Corporation site; During the Manhattan Engineer District (MED) era, the federal government through the MED, purchased uranium froni foreign sources, African ores and Canadian ores. The largest part of uranium in the early years were derived from the African ores. The contracts were only for the uranium in these ores. The agreements provided that all of the other valuable elements in

43

TO: FILE  

Office of Legacy Management (LM)

nEnoRANDUn nEnoRANDUn TO: FILE FR0f.t: ~L!S&km. ALTERNATE ---- -COME: ______ --~Z __________ I_v!E-!2E~_oEEeIIE!! p Research & Development 4 beq I I;om +obiylg 0 Production scale testing 0 Pilot Scale 0 ' Bench Scale Process i Theoretical Studies Sample & Analysis 0 Productiart Cl Disposal/Storage a Facility Type 0 Manufacturing 0 University 0 Research Organization 0 Government Sponsored Facility a Other --------------__----_ 0 VI Chic430 Other information (i.e., cost + fixed fee, unit price, time & material, etc) ------- Contract/R I) 7fo,-37+8 ----- ----- ------ ----- ________- __________-______--____ _C!?!!E3~_C12!E-E!!GE: -___~~~~~~-~---~~~~~~-~---- -__- -__ OWNERSHIP: AEC/UED AEC/UED GOVT GOUT co~TiacT0~ ~CONTRACTOR OWNEE LECISE_D EJE!2

44

TO: FILE  

Office of Legacy Management (LM)

' -1 1. ' -1 1. : . . , . . . "a7 MEMLlRANlJUtl TO: FILE FROM= -&k-k!!L-- l Owner-&ntacted 17 yes Current: ----- ---------- --__ -- -____ I If yes, data contacted ------------- TYPE OF OPERATION -------------____ IJ Research & Development cl Facility Type 0 Production scale testing Cl Pilot Scale a Bench Scale PrOCess 0 Theoretical Studies 0 Sample & Analysis Production 0 Disposal/Storage a Manuf actuiing , q University 0 Research Organizatian / IJ Government Sponsored Facility 0 Other I -------------------- 0 Prime 0 Subcantractk 0 Purchase Order 0 Other information (i.e., iost + fixed fee, unit price, , time & material, .$z) --e-L-- LL---------------------i---- Co"+act/Purchase Order # CONTRACTING PERIOD: __---------------- ----L'r'oll---- --------_-- ____________

45

1990 RECS Public Use Microdata Files  

Gasoline and Diesel Fuel Update (EIA)

1: Structural Characteristics of the Dwelling text.gif cvs file File 2: Floorspace Measurement Variables text file cvs file File 3: Equipment Variables text file cvs file File 4:...

46

CENTRAL FILES  

Office of Legacy Management (LM)

/ .- / .- ~ _. ,- *-.* . . CENTRAL FILES +, a/ o(-t.z2-5 AlLO 1 Pab-FJr 3. 19% TYtxP REPaT To A&7bA cM.m rlmc)HA~ ON JANtJm 23, 1956 f. A. W~~~+Y, M.D. c. 1. 08huRann 8nd J. A. Hlaeririg ob3e8tilw of Trlpr in @ ttd~, (;rulw 2?), 1956, a ttip na nda to UM Crrrit &abw8tury, cword, Ohio. The purpow o? this trip u&a to aondwt the WMnd ti 8 #etia8 of indUrtF%al mgiene run~yr uhiah hre been Thwr8port ia 8 66mpondzLusofthe Amu4ll;rmtr forth&, rtsnyu@raaaderith~.~~M Alb8ugh, emamrud~~roft&~b8 Cnft UbOP&tOraJ'. Duaar&ptian of Trtpr The m88h&nlng oper8t1oM 8t the Alba ah6p lmm UlrrWarf tho# sf&&8mBthrrbrsrtbiefint~~#rru&. r%vo tUX!'lWt %&t&88, m (1) M8hb8 UthM, iOUr 4 th 5) urbthPW(3)dF%ll pSW888SUW8 ba-8

47

NERSC File Systems  

NLE Websites -- All DOE Office Websites (Extended Search)

Systems Systems NERSC File Systems Overview NERSC file systems can be divided into two categories: local and global. Local file systems are only accessible on a single platform, providing best performance; global file systems are accessible on multiple platforms, simplifying data sharing between platforms. File systems are configured for different purposes. On each machine you have access to at least three different file system Home: Permanent, relatively small storage for data like source code, shell scripts, etc. that you want to keep. This file system is not tuned for high performance from parallel jobs. Referenced by the environment variable $HOME. Scratch: Large, high-performance file system. Place your large data files in this file system for capacity and capability computing. Data is

48

Security Rulemaking | Department of Energy  

Office of Environmental Management (EM)

Security Rulemaking Security Rulemaking Transportation Security Rulemaking Activities Security Rulemaking More Documents & Publications Transportation Security Rulemaking...

49

Security | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Security The Y-12 National Security Complex places the highest priority on maintaining and improving its security posture. We employ security police officers, cyber...

50

T-610: Red Hat kdenetwork security update | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Red Hat kdenetwork security update 0: Red Hat kdenetwork security update T-610: Red Hat kdenetwork security update April 26, 2011 - 7:11am Addthis PROBLEM: A directory traversal flaw was found in the way KGet, a download manager, handled the "file" element in Metalink files. An attacker could use this flaw to create a specially-crafted Metalink file that, when opened, would cause KGet to overwrite arbitrary files accessible to the user running KGet. PLATFORM: Red Hat Enterprise Linux Desktop (v. 6) Red Hat Enterprise Linux Server (v. 6) Red Hat Enterprise Linux Workstation (v. 6) ABSTRACT: A directory traversal flaw was found in the way KGet, a download manager, handled the "file" element in Metalink files. reference LINKS: RHSA-2011:0465-1 CVE-2011-1586 RH Classification RH Updates Support

51

Cyber Security Audit and Attack Detection Toolkit: Bandolier and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Cyber Security Audit and Attack Detection Toolkit: Bandolier and Cyber Security Audit and Attack Detection Toolkit: Bandolier and Portaledge, March 2010 Cyber Security Audit and Attack Detection Toolkit: Bandolier and Portaledge, March 2010 This project of the cyber security audit and attack detection toolkit will employ Bandolier Audit Files for optimizing security configurations and the Portaledge event detection capability for energy control systems. By building configuration audit and attack detection capabilities into tools already used by the energy sector, Bandolier and Portaledge offer energy asset owners low-cost and easily integrable control systems security solutions. Energy system operators can optimize the security of their control system configuration using Bandolier Security Audit Files, which assess the current configuration against an optimal security configuration.

52

Guidelines for Filing Monthly Reports | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Guidelines for Filing Monthly Guidelines for Filing Monthly Reports Guidelines for Filing Monthly Reports Reporting Requirements Importers and exporters of natural gas must file monthly reports on their activities, as required in DOE/FE Order No. 2464, dated February 1, 2008. Reports are required to contain certain information, but there is no requirement regarding the format for the monthly submissions. The collection of this information is approved by OMB No. 1901-0294, which has an expiration date of July 31, 2016. For the convenience of filers, the Office of Oil and Gas Global Security and Supply, Division of Natural Gas Regulatory Activities provides formats for reporting through Form FE-746R. Filing Forms With The Federal Government And Estimated Reporting Burden Respondents are not required to file or reply to any Federal collection of

53

V-117: Symantec Enterprise Vault for File System Archiving Unquoted Search  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Symantec Enterprise Vault for File System Archiving Unquoted 7: Symantec Enterprise Vault for File System Archiving Unquoted Search Path Lets Local Users Gain Elevated Privileges V-117: Symantec Enterprise Vault for File System Archiving Unquoted Search Path Lets Local Users Gain Elevated Privileges March 22, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in Symantec Enterprise Vault PLATFORM: Versions prior to Enterprise Vault 9.0.4 and 10.0.1 are vulnerable. ABSTRACT: Symantec Enterprise Vault (EV) for File System Archiving has an unquoted search path in the File Collector and File PlaceHolder services REFERENCE LINKS: SecurityTracker Alert ID: 1028330 Symantec Security Advisories SYM13-003 SecurityFocus ID: 58617 CVE-2013-1609 IMPACT ASSESSMENT: Medium DISCUSSION: This could potentially allow an authorized but non-privileged local user to

54

Cyber Security  

Office of Environmental Management (EM)

Associate CIO for Cyber Security (IM-30) Rod Turk Deputy Associate CIO for Cyber Security (IM-30) Paul Cunningham Incident Management Division (IM-32) Rob Ciochon Director Policy,...

55

CSV File Documentation: Consumption  

Gasoline and Diesel Fuel Update (EIA)

Consumption Consumption The State Energy Data System (SEDS) comma-separated value (CSV) files contain consumption estimates shown in the tables located on the SEDS website. There are four files that contain estimates for all states and years. Consumption in Physical Units contains the consumption estimates in physical units for all states; Consumption in Btu contains the consumption estimates in billion British thermal units (Btu) for all states. There are two data files for thermal conversion factors: the CSV file contains all of the conversion factors used to convert data between physical units and Btu for all states and the United States, and the Excel file shows the state-level conversion factors for coal and natural gas in six Excel spreadsheets. Zip files are also available for the large data files. In addition, there is a CSV file for each state, named

56

1999 CBECS Public Use Files  

Gasoline and Diesel Fuel Update (EIA)

1999 Commercial Buildings Energy Consumption Survey Detailed Tables. If you need assistance viewing this page, please contact 202-586-8800. Energy Information Administration Home Page 1999 Commercial Buildings Energy Consumption Survey Detailed Tables. If you need assistance viewing this page, please contact 202-586-8800. Energy Information Administration Home Page Home > Commercial Buildings Home > CBECS Public Use Data > 1999 Files Updated: October 2002 DATA: How are these files used? Download all format codes (text file, 9 Kb) Download all layout files and format codes (PDF file, 373 Kb) Note: The following are all text files. Layout files range from 3 to 6 KB; data files range from 488 Kb to 1.16 MB. File 1: General Building Information and Energy End Uses (Last modified 10/1/01) Layout File Data File File 2: Building Activities, Special Measures of Size, and Multibuilding Facilities (Last modified 10/1/01) Layout File Data File

57

Information Security: Coordination of Federal Cyber Security...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security: Coordination of Federal Cyber Security Research and Development Information Security: Coordination of Federal Cyber Security Research and Development GAO recommends that...

58

PDSF's Eliza File Systems  

NLE Websites -- All DOE Office Websites (Extended Search)

Eliza File Systems Eliza File Systems Eliza File Systems Storage at PDSF is organized by group and all partitions are exported to all the nodes in the cluster. Please note that files on these file systems are not backed up. It is the responsibility of users to back up their files themselves as necessary. Over the years at PDSF there have been incidents which resulted in a loss of data from disk, often related to aging hardware. Note that the way to display the SGE io units on the command line is "qconf -se global". Disk Vault Experiments SGE io units Disk Space (TB) Directories eliza1 Atlas 400 35 atlas eliza2 Atlas 200 35 atlas eliza5 Cuore, Kamland 400 34 cuore kamland eliza6 Alice, RNC, Star 400 34 alice rnc star eliza7 Dayabay 200 24 dayabay icecube

59

BPA files reciprocity tariff  

NLE Websites -- All DOE Office Websites (Extended Search)

files-reciprocity-tariff Sign In About | Careers | Contact | Investors | bpa.gov Search News & Us Expand News & Us Projects & Initiatives Expand Projects & Initiatives...

60

File:20121127144703735.pdf | Open Energy Information  

Open Energy Info (EERE)

pdf Jump to: navigation, search File File history File usage File:20121127144703735.pdf Size of this preview: 463 599 pixels. Other resolution: 464 600 pixels. Full...

Note: This page contains sample records for the topic "586-1076 secure file" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

Security Cases  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

security-cases Office of Hearings and Appeals 1000 security-cases Office of Hearings and Appeals 1000 Independence Ave., SW Washington, DC, 20585 202-287-1566 en PSH-13-0103 - In the Matter of Personnel Security http://energy.gov/oha/downloads/psh-13-0103-matter-personnel-security security" class="title-link">PSH-13-0103 - In the Matter of Personnel Security

62

Infrastructure Security  

NLE Websites -- All DOE Office Websites (Extended Search)

for the U.S. Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL85000. SAND2013-7809W to enhance the nation's security and prosperity...

63

Using pico to edit files  

E-Print Network (OSTI)

UW PICO(tm) 2.9 File: filename [You will type stuff in this area. -S. Bell] [ New file ] ^G Get Help ^O WriteOut ^R Read File ^Y Prev Pg ^K Cut Text ^C Cur Pos ^X...

64

Cyber Security | National Security | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

National Security Home | Science & Discovery | National Security | Initiatives | Cyber Security SHARE Cyber Security Through Science A Science-Based Approach image ORNL uses a science-based approach that combines experimentation, theory, modeling, and high performance computing to solve some of the nation's cyber security grand challenges. Significant, 'game-changing' transformation requires a science-based approach that combines fundamental understanding with experimentation, theory, and modeling. The most successful scientific programs use peer review to maximize intellectual capital and prioritize research needs. The Department of Energy has applied this approach through programs such as the Scientific Discovery through Advanced Computing (SciDAC) and ASCI,

65

U-216: HP StorageWorks File Migration Agent Buffer Overflows Let Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: HP StorageWorks File Migration Agent Buffer Overflows Let 6: HP StorageWorks File Migration Agent Buffer Overflows Let Remote Users Execute Arbitrary Code U-216: HP StorageWorks File Migration Agent Buffer Overflows Let Remote Users Execute Arbitrary Code July 19, 2012 - 7:14am Addthis PROBLEM: HP StorageWorks File Migration Agent Buffer Overflows Let Remote Users Execute Arbitrary Code PLATFORM: HP StorageWorks File Migration Agent ABSTRACT: Two vulnerabilities were reported in HP StorageWorks File Migration Agent. reference LINKS: SecurityTracker Alert ID: 1027281 ZDI-12-127 ZDI-12-126 IMPACT ASSESSMENT: High Discussion: The vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of HP StorageWorks File Migration Agent. Authentication is not required to exploit this vulnerability. 1. (ZDI-12-127) The specific flaw exists within the HsmCfgSvc.exe service

66

U-216: HP StorageWorks File Migration Agent Buffer Overflows Let Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

U-216: HP StorageWorks File Migration Agent Buffer Overflows Let U-216: HP StorageWorks File Migration Agent Buffer Overflows Let Remote Users Execute Arbitrary Code U-216: HP StorageWorks File Migration Agent Buffer Overflows Let Remote Users Execute Arbitrary Code July 19, 2012 - 7:14am Addthis PROBLEM: HP StorageWorks File Migration Agent Buffer Overflows Let Remote Users Execute Arbitrary Code PLATFORM: HP StorageWorks File Migration Agent ABSTRACT: Two vulnerabilities were reported in HP StorageWorks File Migration Agent. reference LINKS: SecurityTracker Alert ID: 1027281 ZDI-12-127 ZDI-12-126 IMPACT ASSESSMENT: High Discussion: The vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of HP StorageWorks File Migration Agent. Authentication is not required to exploit this vulnerability.

67

Safety, Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Safety, Security Safety, Security Safety, Security LANL's mission is to develop and apply science and technology to ensure the safety, security, and reliability of the U.S. nuclear deterrent; reduce global threats; and solve other emerging national security and energy challenges. Contact Operator Los Alamos National Laboratory (505) 667-5061 We do not compromise safety for personal, programmatic, or operational reasons. Safety: we integrate safety, security, and environmental concerns into every step of our work Our commitments We conduct our work safely and responsibly to achieve our mission. We ensure a safe and healthful environment for workers, contractors, visitors, and other on-site personnel. We protect the health, safety, and welfare of the general public. We do not compromise safety for personal, programmatic, or

68

Lab announces security changes  

NLE Websites -- All DOE Office Websites (Extended Search)

Lab announces security changes Lab announces security changes The Laboratory is implementing several changes to its security procedures as the result of a recent security...

69

Security Specialist  

Energy.gov (U.S. Department of Energy (DOE))

A successful candidate in this position will serve as a Security Specialist with responsibility as the performance monitor for protective force operations conducts line management oversight of the...

70

Global Security  

NLE Websites -- All DOE Office Websites (Extended Search)

nonpartisan organization with a mission to strengthen global security by reducing the risk of use and preventing the spread of nuclear, biological, and chemical weapons and to...

71

Global security  

SciTech Connect

Patrick Lynch helps technical staff, academic leaders and governments around the world improve the safety and security of their nuclear power programs.

Lynch, Patrick

2014-07-14T23:59:59.000Z

72

Cyber Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Cyber Security Previous cybersecurity evaluations and designs were often dependent upon personal experience and limited empirical evidence. An LDRD project focused on cybersecurity...

73

Global security  

ScienceCinema (OSTI)

Patrick Lynch helps technical staff, academic leaders and governments around the world improve the safety and security of their nuclear power programs.

Lynch, Patrick

2014-07-15T23:59:59.000Z

74

Infrastructure Security  

NLE Websites -- All DOE Office Websites (Extended Search)

to enhance the nation's security and prosperity through sustainable, transformative approaches to our most challenging energy, climate, and infrastructure problems. vision...

75

Transportation Security  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Preliminary Draft - For Review Only 1 Transportation Security Draft Annotated Bibliography Review July 2007 Preliminary Draft - For Review Only 2 Work Plan Task * TEC STG Work...

76

BPA files reciprocity tariff  

NLE Websites -- All DOE Office Websites (Extended Search)

RELEASE Friday, March 30, 2012 CONTACT: Doug Johnson, 503-230-5840 or 503-230-5131 BPA files reciprocity tariff Portland, Ore. - After a year-long extensive and collaborative...

77

LAWSUIT FILED OVER TERRORISM STUDY  

Science Journals Connector (OSTI)

LAWSUIT FILED OVER TERRORISM STUDY ... Justice sued over delay in assessing terrorist threat to chemical companies ...

JEFF JOHNSON

2002-03-18T23:59:59.000Z

78

T-704: RSA enVision Lets Remote Users View Files and Remote Authenticated  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

704: RSA enVision Lets Remote Users View Files and Remote 704: RSA enVision Lets Remote Users View Files and Remote Authenticated Users Obtain Password T-704: RSA enVision Lets Remote Users View Files and Remote Authenticated Users Obtain Password August 29, 2011 - 3:45am Addthis PROBLEM: Allows remote attackers to obtain sensitive information by sniffing the network or leveraging access to a recipient mailbox. PLATFORM: RSA enVision Version(s): 3.x, 4.x ABSTRACT: RSA enVision lets remote users view files and remote authenticated users obtain password. reference LINKS: SecurityTracker Alert ID: 1025979 CVE-2011-2736 CVE-2011-2737 RSA enVision Product Security IMPACT ASSESSMENT: Medium Discussion: Two vulnerabilities were reported in RSA enVision. A remote user can view files on the target system. A remote authenticated user can obtain

79

T-704: RSA enVision Lets Remote Users View Files and Remote Authenticated  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: RSA enVision Lets Remote Users View Files and Remote 4: RSA enVision Lets Remote Users View Files and Remote Authenticated Users Obtain Password T-704: RSA enVision Lets Remote Users View Files and Remote Authenticated Users Obtain Password August 29, 2011 - 3:45am Addthis PROBLEM: Allows remote attackers to obtain sensitive information by sniffing the network or leveraging access to a recipient mailbox. PLATFORM: RSA enVision Version(s): 3.x, 4.x ABSTRACT: RSA enVision lets remote users view files and remote authenticated users obtain password. reference LINKS: SecurityTracker Alert ID: 1025979 CVE-2011-2736 CVE-2011-2737 RSA enVision Product Security IMPACT ASSESSMENT: Medium Discussion: Two vulnerabilities were reported in RSA enVision. A remote user can view files on the target system. A remote authenticated user can obtain

80

Renewal-anomalous-heterogeneous files  

E-Print Network (OSTI)

Renewal-anomalous-heterogeneous files are solved. A simple file is made of Brownian hard spheres that diffuse stochastically in an effective 1D channel. Generally, Brownian files are heterogeneous: the spheres' diffusion coefficients are distributed and the initial spheres' density is non-uniform. In renewal-anomalous files, the distribution of waiting times for individual jumps is exponential as in Brownian files, yet obeys: {\\psi}_{\\alpha} (t)~t^(-1-{\\alpha}), 0renewal as all the particles attempt to jump at the same time. It is shown that the mean square displacement (MSD) in a renewal-anomalous-heterogeneous file, , obeys, ~[_{nrml}]^{\\alpha}, where _{nrml} is the MSD in the corresponding Brownian file. This scaling is an outcome of an exact relation (derived here) connecting probability density functions of Brownian files and renewal-anomalous files. It is also shown that non-renewal-anomalous files are slower than the corresponding renewal ones.

Ophir Flomenbom

2010-08-13T23:59:59.000Z

Note: This page contains sample records for the topic "586-1076 secure file" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

Energy Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Energy Security Energy Security Energy Security LANL's mission is to develop and apply science and technology to ensure the safety, security, and effectiveness of the U.S. nuclear deterrent; reduce global threats; and solve other emerging national security and energy challenges. April 12, 2012 A closed photobioreactor system is essentially a series of plastic or glass containers for water and algae. A closed photobioreactor system is essentially a series of plastic or glass containers for water and algae. Proponents of such bioreactors (compared to open ponds) say the growth environment can be more easily controlled; they prevent evaporation; and light penetrates through all sides of the container, which increases cell density. However, bioreactors suffer high materials and energy costs as well as mixing and gas-exchange

82

Cyber Security Guidelines, Information Technology Division, ITD  

NLE Websites -- All DOE Office Websites (Extended Search)

BNL Cyber Security Guidelines BNL Cyber Security Guidelines Appropriate Use Unauthorized and Malicious Access and Actions Blatant Disregard for Laboratory Computer Security Privacy of Electronic Files, and E-MAIL Publishing & Accessing Information on Electronic Networks The Laboratory's main concerns are protecting data and systems critical to operations in pursuit of its mission. The Laboratory's Computer Security Plan covers Laboratory systems, whether on-site and connected directly to the Laboratory network, or on- or off-site and connected to the Laboratory network by the telephone system or other means. The procedures and rules described here cover these systems no matter who is the owner or the method of connection to the network. Laboratory employees and registered users are responsible for their own actions under the computer security policy, as well as for the actions of any person who they permit to access a Laboratory system.

83

defense nuclear security | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

nuclear security | National Nuclear Security Administration People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response...

84

nuclear security | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

security | National Nuclear Security Administration People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our...

85

Security In Information Systems  

E-Print Network (OSTI)

rights, and they are proposing security policies, security planning, personal data protection laws, etc

Candan, Selçuk

86

Security | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security Security Security Security program under Office of Health, Safety and Security developes security policy, provides security expertise to assist field elements in planning site protection strategies and coordinates with domestic authorities to provide safeguards and security technical assistance, technical systems support, and technology development and deployment opportunities. Departmental Personnel Security, also ensures that Departmental personnel security programs (included the National Nuclear Security Administration) are consistent and effectively implemented. Headquarters Facilities Master Security Plan The purpose of the Headquarters Facility Master Security Plan (HQFMSP) is to inform employees, contractors, and visitors of the security procedures

87

ENERGY SECURITY  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

national strategy for national strategy for ENERGY SECURITY recommendations to the nation on reducing u.s. oil dependence september 2008 a project of a project of a national strategy for energy security Recommendations to the Nation on Reducing U.S. Oil Dependence september 2008 Table of Contents 2 Energy Security Leadership Council 3 Statement of Purpose 4 Letter to the President, the Congress, and the American People 7 Outline of Main Body of Report 13 Introduction 21 Policy Recommendations: Summary 33 Part I · Diversify Energy Supplies for the Transportation Sector

88

File:07ORDExpeditedPlantCommissioningProcess.pdf | Open Energy...  

Open Energy Info (EERE)

File Edit History Facebook icon Twitter icon File:07ORDExpeditedPlantCommissioningProcess.pdf Jump to: navigation, search File File history File usage Metadata...

89

Transportation Security | ornl.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

Transportation Security SHARE Global Threat Reduction Initiative Transportation Security Cooperation Secure Transport Operations (STOP) Box Security of radioactive material while...

90

Personnel Security  

Directives, Delegations, and Requirements

The manual establishes the overall objectives and requirements for the Department of Energy Personnel Security Program. Cancels DOE M 472.1-1B. Canceled by DOE O 472.2.

2005-08-26T23:59:59.000Z

91

Security Rulemaking  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2 NATIONAL TRANSPORTATION STAKEHOLDERS FORUM 2 NATIONAL TRANSPORTATION STAKEHOLDERS FORUM Knoxville, TN - May 16, 2012 2 NRC Actions Since September 11, 2001 * Interim solution - enhance existing regulations through Security Orders * Objectives of the Orders are enhanced control of material to - Prevent unauthorized access - Prevent malevolent use of material - Mitigate consequences * Orders were issued to NRC licensees that transport: - Spent Nuclear Fuel - IAEA Code of Conduct Category 1 and 2 quantities of radioactive material Security Rulemakings 3 NRC Ongoing Activities * Orders are an interim measure * Long-term approach is to enhance transport security through public rulemaking * Rulemaking process in progress for - SNF Transportation Security - Physical Protection of Category 1 and 2 material (both fixed

92

Personnel Security  

Directives, Delegations, and Requirements

The Order establishes requirements for a successful, efficient and cost-effective personnel security program to ensure accurate, timely and equitable determinations of individuals eligibility for access to classified information and fitness for placement or retention in national security positions. Cancels DOE M 470.4-5, DOE N 470.4 and DOE N 470.5. Admin Chg 1, 10-8-13.

2011-07-27T23:59:59.000Z

93

PSH-12-0021 - In the Matter of Personnel Security Hearing | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

21 - In the Matter of Personnel Security Hearing 21 - In the Matter of Personnel Security Hearing PSH-12-0021 - In the Matter of Personnel Security Hearing The Individual is a contractor employee at a DOE facility. The Local Security Office (LSO) received information that the Individual had not filed a state income tax return for the year 2007. Exhibit (Ex.) 3 at 1. Consequently, LSO conducted a personnel security interview (PSI) with the Individual in October 2011. Ex. 7. Because the 2011 PSI failed to resolve the security concerns raised by the Individual's failure to file tax returns, the LSO informed the Individual, in a February 2012 notification letter (Notification Letter), that derogatory information existed which raised security concerns under 10 C.F.R. § 710.8 (l) (Criterion L) and that her security clearance was suspended. Ex. 1. The Notification Letter

94

V-190: ASUS RT-N66U Router AiCloud Security Bypass Security Issue |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: ASUS RT-N66U Router AiCloud Security Bypass Security Issue 0: ASUS RT-N66U Router AiCloud Security Bypass Security Issue V-190: ASUS RT-N66U Router AiCloud Security Bypass Security Issue July 2, 2013 - 12:38am Addthis PROBLEM: ASUS RT-N66U Router AiCloud Security Bypass Security Issue PLATFORM: ASUS RT-N66U Router firmware versions 3.0.0.4.270 and 3.0.0.4.354. ABSTRACT: A security issue in ASUS RT-N66U Router has been reported REFERENCE LINKS: Secunia Advisory SA53931 neohapsis IMPACT ASSESSMENT: Medium DISCUSSION: The security issue is caused due to the device not properly restricting access when processing certain HTTPS requests and can be exploited to gain access to otherwise restricted functionality and e.g. disclose the contents of arbitrary files and directories. Successful exploitation requires the AiCloud web service to be enabled.

95

File:Coordination.pdf | Open Energy Information  

Open Energy Info (EERE)

Coordination.pdf Jump to: navigation, search File File history File usage File:Coordination.pdf Size of this preview: 464 599 pixels. Other resolution: 464 600 pixels. Go to...

96

Project Directories File System at NERSC  

NLE Websites -- All DOE Office Websites (Extended Search)

Project File System Project File System Overview The project file system is a global file system available to all NERSC computational systems. It allows groups of NERSC users to...

97

Tag: security | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

security security Tag: security Displaying 1 - 5 of 5... Category: Security Security Y-12 places the highest priority on maintaining and improving its security posture. More... Category: News Johnson shares perspective on security Rod Johnson, B&W Y-12 deputy general manager of Security, recently discussed the security atmosphere since his arrival last August and what he sees as Y-12's security future. More... Category: News Y-12 to Install New Fence to Reduce Trespassing The National Nuclear Security Administration today announced plans to extend the boundary fence at the Y-12 National Security Complex along Scarboro Road. The new fence is expected to be in place by April 4. More... Category: News New institute promotes nuclear security Y-12 is partnering with the University of Tennessee and others to provide

98

T-628: Debian APR Library Security Update | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

T-628: Debian APR Library Security Update T-628: Debian APR Library Security Update T-628: Debian APR Library Security Update May 23, 2011 - 3:35pm Addthis PROBLEM: Debian APR Library Security Update. PLATFORM: APR packages: 2009.0, 2010.1, Corporate 4.0, Enterprise Server 5.0 ABSTRACT: A flaw was found in the APR library, which could be exploited through Apache HTTPD's mod_autoindex. reference LINKS: Debian Security Advisory DSA-2237-2 Security Database Adviory Security Focus Advisory CVE-2011-1928 CVE-2011-0419 Secunia Advisory SA44574 IMPACT ASSESSMENT: Medium Discussion: A directory indexed by mod_autoindex contained files with sufficiently long names, a remote attacker could send a carefully crafted request which would cause excessive CPU usage. This could be used in a denial of service attack.

99

NERSC Increases System Storage and Security for Users  

NLE Websites -- All DOE Office Websites (Extended Search)

Increases Increases System Storage and Security for Users NERSC Increases System Storage and Security for Users April 28, 2009 Franklin Upgrades Improve I/O Performance Throughout the month of March the Cray XT4 machine Franklin underwent a series of upgrades and improvements, including a major I/O upgrade. The disk capacity of the scratch file system was increased by 30% to 460 TB, and the I/O bandwidth was nearly tripled to an aggregate write performance of 32 GB/sec, compared to 11 GB/s before the upgrade. Instead of adding the new hardware to the existing scratch file system, NERSC chose to implement a second scratch file system so that Franklin now has two scratch file systems, each with a peak write bandwidth of 16 GB/sec. "We doubled the amount of I/O hardware and nearly tripled the bandwidth,

100

Energy Security Council  

NLE Websites -- All DOE Office Websites (Extended Search)

Energy Security Council Energy Security Council Reliable, secure, sustainable carbon energy solutions for the nation. Contact Albert Migliori (505) 663-5627 Email David Watkins...

Note: This page contains sample records for the topic "586-1076 secure file" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

Transportation Security  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

For Review Only 1 Transportation Security Draft Annotated Bibliography Review July 2007 Preliminary Draft - For Review Only 2 Work Plan Task * TEC STG Work Plan, dated 8/2/06, Product #16, stated: "Develop an annotated bibliography of publicly-available documents related to security of radioactive material transportation." * Earlier this year, a preliminary draft annotated bibliography on this topic was developed by T-REX , UNM, to initially address this STG Work Plan Task. Preliminary Draft - For Review Only 3 Considerations in Determining Release of Information * Some "Publicly-available" documents could potentially contain inappropriate information according to standards set by DOE information security policy and DOE Guides. - Such documents would not be freely

102

Message Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Message Message Security Services Overview ECS Audio/Video Conferencing Fasterdata IPv6 Network Network Performance Tools (perfSONAR) ESnet OID Registry PGP Key Service Virtual Circuits (OSCARS) OSCARS Case Study Documentation User Manual FAQ Design Specifications Functional Specifications Notifications Publications Authorization Policy Default Attributes Message Security Clients For Developers Interfaces Links Hardware Requirements DOE Grids Service Transition Contact Us Technical Assistance: 1 800-33-ESnet (Inside the US) 1 800-333-7638 (Inside the US) 1 510-486-7600 (Globally) 1 510-486-7607 (Globally) Report Network Problems: trouble@es.net Provide Web Site Feedback: info@es.net Message Security Overview The OSCARS Web pages and Web Services are run within a Tomcat container which uses SSL connections to encrypt all messages. The OSCARS Web Service

103

V-127: Samba Bug Lets Remote Authenticated Users Modify Files | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Samba Bug Lets Remote Authenticated Users Modify Files 7: Samba Bug Lets Remote Authenticated Users Modify Files V-127: Samba Bug Lets Remote Authenticated Users Modify Files April 5, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in Samba. PLATFORM: The vulnerabilities are reported in version(s): 3.6.0 - 3.6.5 ABSTRACT: A remote authenticated user can modify files on the target share REFERENCE LINKS: SecurityTracker Alert ID: 1028389 Samba Security Announcement CVE-2013-0454 IMPACT ASSESSMENT: Medium DISCUSSION: A remote authenticated user can perform operations on the target CIFS export that are not permitted by the CIFS share access control settings. This may include writing to read-only shares. IMPACT: Modification of user information SOLUTION: Update to 3.6.6 and higher or apply the following patch Addthis

104

V-127: Samba Bug Lets Remote Authenticated Users Modify Files | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Samba Bug Lets Remote Authenticated Users Modify Files 7: Samba Bug Lets Remote Authenticated Users Modify Files V-127: Samba Bug Lets Remote Authenticated Users Modify Files April 5, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in Samba. PLATFORM: The vulnerabilities are reported in version(s): 3.6.0 - 3.6.5 ABSTRACT: A remote authenticated user can modify files on the target share REFERENCE LINKS: SecurityTracker Alert ID: 1028389 Samba Security Announcement CVE-2013-0454 IMPACT ASSESSMENT: Medium DISCUSSION: A remote authenticated user can perform operations on the target CIFS export that are not permitted by the CIFS share access control settings. This may include writing to read-only shares. IMPACT: Modification of user information SOLUTION: Update to 3.6.6 and higher or apply the following patch Addthis

105

Information Security  

Directives, Delegations, and Requirements

Establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Section E, Technical Surveillance Countermeasures Program, is Official Use Only. Please contact the DOE Office of Health, Safety and Security at 301-903-0292 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A

2007-06-29T23:59:59.000Z

106

Information Security  

Directives, Delegations, and Requirements

This Manual establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Attachment E, Technical Surveillance Countermeasures Program, is for Official Use Only. Contact the Office of Security and Safety Performance Assurance at 301-903-3653 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A.

2005-08-26T23:59:59.000Z

107

Chapter_8_Opertions_Security_Program  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Operations Security Program Operations Security Program This chapter covers the OPSEC Program in place at DOE HQ to fulfill the requirements of DOE Order 471.6, Section 4.f, Information Security Manual. The OPSEC Program seeks to assist HQ Elements in identifying and protecting Critical Information (CI) from inadvertent or unauthorized disclosure and in protecting classified matter. CI includes those classified or sensitive unclassified areas, activities, functions, data, or information about an activity or organization deemed sufficiently important to be protected from an adversary. CI, when disclosed without proper authorization, has detrimental impact on national security and or departmental operations. Examples of CI that must be protected are personnel files, proposal and contract documents, or financial data regarding a project. CI is

108

SECURITY HANDBOOK 2 UH IT SECURITY HANDBOOK  

E-Print Network (OSTI)

Administration · 2-Factor Authentication Administration for PCI compliance · Web Site Security Scanning, please contact security@uh.edu. · Web Site Security Scanning · 2-Factor Authentication Administration

Azevedo, Ricardo

109

Tag: Security | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Search Tags Tag: Security Tag: Security Displaying 1 - 6 of 6... Category: Security Sheltering in Place If you are advised to shelter-in-place by local news or our website,...

110

MEMORANDUfl J: FILE DATE  

Office of Legacy Management (LM)

J: FILE DATE J: FILE DATE // //r /so -----------w------m FROM: 9. 34oyc -w--------v----- SUBJECT: D3 Bo;s CL&;C J mL-;+J; - Rcc cap 049 /'A :j$: &336;s L-.fh~ w-f L-1 ALE"nirTE __ ------------- --- ---_------------------ CITY: &u+M- - &. -w---v------ ---B-------w STATE: 0 h' -a---- OWNER(S) --pi::;- l>cl, b af.5 CA.-*>J CD Current: Gr;W i- ~U~&;P~ -------------,,' ,-,,,,-, Owner contacted 0 yes jg no; -------------------------- if yes, date contacted ------m------ TYPE OF OPERATION --w--w----------- & Research & Development a Facility Type 0 Production scale testing Cl Pilot Scale 0 Bench Scale Process 0 Theoretical Studies w Sample & Analysis 0 Manufacturing 0 University 0 Research Organization 0 Government Sponsored Facility

111

TO: FILE MEMORANDUM  

Office of Legacy Management (LM)

FILE FILE MEMORANDUM DATE +zljlk> - - - - ---_ _ _ ALTERNATE NAME: CITY: -!~Lh_-~~~bl--~--------STATE: --%&A --~~~~~~---~~~------__ a OWNE=t (!, ----L--- P a s t i awne~-;Pntacted ?? yes --~~~~~-----_------_______ ; i f y e s , d a t e c o n t a c t e d ----------___ TYPE O& OPERATION -----+--------- & Development cl Facility Type 0 D i spbsal/Storage 0 Ma,nuf acturing 0 U n i v e r s i t y 0 R e s e a r c h O r g a n i z a t i o n / 0 Government 0 O t h e r Sponsored Facility -------------------L- TYPE OF CONTRACT -----------_____ 0 Prime 0 S u b & t r a c t o r ??Purctase Order ? Other information (i.e., cost / + fixed fee, unit price, time & material, gtc:) ------- ! ---------------------------- ~ .Ccntract/Purchase O r d e r - - - - - - - - I, # --~~-~-_~~~~---- CONTRACTING PESIOD- i -------e------L---- .I --~-~~r~-~~-~~--- ______ ~--~--- OWNERSHIP:

112

Northern Pass WLT Filing  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

September 12, 2013 Electronic filing September 12, 2013 Electronic filing Christopher Lawrence Office of Electricity Delivery and Energy Reliability (OE-20), U.S. Department of Energy, 1000 Independence Avenue, SW. Washington, DC 20585 Fax: (202) 586-8008 Christopher.Lawrence@hq.doe.gov Re: Petition by The Weeks Lancaster Trust to intervene in the matter of the Northern Pass Transmission LLC Application for a Presidential Permit (OE Docket No. PP-371) Dear Mr. Lawrence, Following is the petition by The Weeks Lancaster Trust LLC to intervene and comment in the matter of Northern Pass Transmission LLC's Application for a Presidential Permit (PP-371). In accordance with the Notice of Application for this proceeding (75FR 69990), we are also sending a hard copy to the address above. Please contact us by

113

Security rethink  

Science Journals Connector (OSTI)

......breaches or heightening the risks. One of my clients...business to the socio-political situation of particular...based on the return on investment in keeping a high standard...times that security risks are at their highest...lay-offs. The return on investment must consider the positive......

Michael Chua

2002-09-01T23:59:59.000Z

114

Security Conditions  

Directives, Delegations, and Requirements

To ensure that DOE uniformly meets the protection requirements specified in Presidential Decision Directive 39, "U.S. Policy on Counterterrorism (U)." Attachment 2 is no longer available online. Please e-mail your request for the Attachment to: Security.Directives@hq.doe.gov. DOE N 251.44, dated 05/06/02, extends this directive until 12/31/02.

2000-09-18T23:59:59.000Z

115

Personnel Security  

Directives, Delegations, and Requirements

The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals eligibility for access to classified information and Special Nuclear Material (SNM). Admin Chg 1, 10-8-13.

2011-07-27T23:59:59.000Z

116

Physical Security Systems | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Physical Security Systems | National Nuclear Security Administration Physical Security Systems | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Physical Security Systems Home > About Us > Our Programs > Nuclear Security > Physical Security Systems Physical Security Systems After the 9/11 terrorist attacks, NNSA took steps to protect its critical

117

Physical Security Systems | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Physical Security Systems | National Nuclear Security Administration Physical Security Systems | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Physical Security Systems Home > About Us > Our Programs > Nuclear Security > Physical Security Systems Physical Security Systems After the 9/11 terrorist attacks, NNSA took steps to protect its critical

118

Security Forms | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

NMMSS Information, Reports & Forms Security Forms Security Forms U.S. Department of Energy U.S. Nuclear Regulatory Commission Nuclear Materials Management & Safeguards...

119

U-059: Blackberry PlayBook File Sharing Option Lets Local Users Gain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Blackberry PlayBook File Sharing Option Lets Local Users 9: Blackberry PlayBook File Sharing Option Lets Local Users Gain Elevated Privileges U-059: Blackberry PlayBook File Sharing Option Lets Local Users Gain Elevated Privileges December 13, 2011 - 6:00am Addthis PROBLEM: Blackberry PlayBook File Sharing Option Lets Local Users Gain Elevated Privileges. PLATFORM: BlackBerry PlayBook tablet software version 1.0.8.4985 and earlier ABSTRACT: A local user can obtain root privileges on the target tablet system. reference LINKS: SecurityTracker Alert ID:1026386 Vulnerability Summary for CVE-2011-0291 BlackBerry Technical Solution Center IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in Blackberry PlayBook. A local user can obtain elevated privileges on the target system. On a tablet with File Sharing enabled and connected via USB to a system running BlackBerry

120

U-075: Apache Struts Bug Lets Remote Users Overwrite Files and Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

075: Apache Struts Bug Lets Remote Users Overwrite Files and 075: Apache Struts Bug Lets Remote Users Overwrite Files and Execute Arbitrary Code U-075: Apache Struts Bug Lets Remote Users Overwrite Files and Execute Arbitrary Code January 5, 2012 - 8:15am Addthis PROBLEM: Apache Struts Bug Lets Remote Users Overwrite Files and Execute Arbitrary Code PLATFORM: Version(s): 2.1.0 - 2.3.1 ABSTRACT: A remote user can execute arbitrary Java code on the target system. reference LINKS: SecurityTracker Alert ID: 1026484 Secunia Advisory SA47393 Bugtraq ID: 51257 Apache Struts 2 Documentation S2-008 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in Apache Struts. A remote user can execute arbitrary Java code on the target system. A remote user can overwrite arbitrary files on the target system. A remote user can send specially

Note: This page contains sample records for the topic "586-1076 secure file" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

Security seal  

DOE Patents (OSTI)

Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to "fingerprints" are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

Gobeli, Garth W. (Albuquerque, NM)

1985-01-01T23:59:59.000Z

122

Nonproliferation & International Security | National Nuclear Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Nonproliferation & International Security | National Nuclear Security Nonproliferation & International Security | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nonproliferation & International Security Home > About Us > Our Programs > Nonproliferation > Nonproliferation & International Security Nonproliferation & International Security

123

Nonproliferation & International Security | National Nuclear Security  

National Nuclear Security Administration (NNSA)

Nonproliferation & International Security | National Nuclear Security Nonproliferation & International Security | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nonproliferation & International Security Home > About Us > Our Programs > Nonproliferation > Nonproliferation & International Security Nonproliferation & International Security

124

2014 Headquarters Facilities Master Security Plan- Chapter 14, Cyber Security  

Energy.gov (U.S. Department of Energy (DOE))

2014 Headquarters Facilities Master Security Plan - Chapter 14, Cyber Security Describes the DOE Headquarters Cyber Security Program.

125

MEHORANDUfl TO: FILE SUBJECT:  

Office of Legacy Management (LM)

MEHORANDUfl MEHORANDUfl TO: FILE ------_____ SUBJECT: OWNER (S) -----_-- Post:-------_-------_________ current: ---------_---------_______ Owner contacted 0 yes Qnna; if yes, date contacted -------_--___ TYPE OF OPERATION ~~~---~~_-----__- 0 Research & Develapment x Facility Type 0 Production scale testing 0 Pilot Scale 0 Bench Scale Pkoces;s i ,Theoretical Studies Sample & Analysis 0 Manufacturing 0 University 0 Research Drganizaticn 0 Government Sponsored Facility & other &ded-S~AWe-- c Production 0 Di cposal /Storage TYPE OF CONTRACT ---------------- 5 Prime 0 Q Subcontract& -$JJ$~~~$~~' ~~*' - T04' L Other information (i.e., cost + fixed fee, unit price, 0 Purchase Order time 81 material, qtr) ------- _----__------_---__--------- Cantract/Purkhaae Order #-@ -'

126

MEMORANDUM TO: FILE  

Office of Legacy Management (LM)

.f ! I I (' ii MEMORANDUM TO: FILE DATE 5 +/9! ----- ------------- FROM: D. Jxw+ a--------------- SUBJECT: E/;vlr;l~&~- fico -de+& Y&U- c . 6. %qo+y& + 3-r SITE NAME: c- G* ~.&-J&-& 4 fib+< ALTERNATE -------a----- _------------------------ NAME: ---------------------- CITY: &w;-&u; & ----------------------e-w- STATE: /+?# ------ OWNER(S) ---pi;;;- c * c. s&r--&&+ ------------ -- -------- Current: un W&e k Owner contacted 0 yes a no; ---w-------------------m-- if yes, date contacted -----a------- TYPE OF OPERATION ----------------- a Research 81 Development 0 Facility Type fl Production scale testing 0 Pilot Scale 0 Bench Scale Process 0 Theoretical Studies 0 Sample & Analysis 0 Production

127

MEIIORANDUM TO: FILE  

Office of Legacy Management (LM)

MEIIORANDUM MEIIORANDUM TO: FILE FROM: A. &/b~ ----------_----_ SUBJECT: TYPE OF OPERATION ~_~~_--~~_------_ q Research & Development 0 Production scale testing 0 Pilat Scale 0 Bench Scale Process 0 Theoretical Studies 0 Sample & Analysis q Facility Type 0 Manufacturing 0 University 0 Research Organization 0 Gavernment Sponsored Faci 1 i ty 0 Other ~~~~~~~-~~--_--___--- 0 Product: on a Disposal/Stiorage TYPE OF CONTRACT ------_----__--_ 0 Prime q Other information (i.e., cost 0 Subcontractor + fixed fee, unit price, U Purchase Order time & material, gtc) ------- -L-------------------------- .&ntr&/Purchase Order #-$&z a :~-_~~;;~~~-~~~~-~-~~bh~' ,~. CENTRACTING PERIOD: raj * ------------------------------------- OWNERSHIP: AEC/MED AEC/MED GOVT GOUT CONTRACTOR CONTRACToR

128

MEMORANDUM TO: FILE  

Office of Legacy Management (LM)

. . 8, +::.-., . MEMORANDUM TO: FILE FROM: A* d&k -------- SUBJECT: SITE NAME: ---------------i--__--____ if yes, date contacted --i---------- TYPE OF OPERATION ~-~_---_-~~~--__- 0 Research & Development 0 Production scale testing Cl Pilot Scale 0 Bench Scale Process i Theoretical Studies Sample & Analysis Cl Productian I3 Disposal /Storage Facility Type/ 0 Research Okganitation 0 Government~Spcnsored Facil$ty 0 Other ~~~~~~~--~-~~-_~~---- TYPE OF CONTRACT ~--_---_-~~----_ 0 Prime 0 Subcontract& 0 Purchase Order Cant.r&t/Purchase Order / I CI Other information (i.e., cost + fixed fee, unit pr~ice, time & material,.gtc) '~ ------- ---------------------------- CP!IE!!CIL~E-PSELgQ: rst4 ----------------------------- OWNERSHIP:

129

MEMORANDUM TO: FILE  

Office of Legacy Management (LM)

3 3 MEMORANDUM TO: FILE FROM: D, h&Z *_ --------------__ SITE NA,,E: -------- CITY: -%+&6!? -------------------------- STATE: CT cr: 13 ------ WNERL_S, Past: -------_____-----_-_____ current: -----------------------~-- Owner contacted q yes q no; if yes, date contacted / TYPE OF OPERATION ----------------- J& Research & Development i \ 0 Production scale testing 0 Pilot Scale 0 Bench Scale Process i Theoretical Studies Sample & Analysis m Production e9 Facility Type p Manufacturing rJ University $ Research Organizat 0 Government Sponsor 0 Other I ------------ ,-, I I TFaLility Other information (i.e., cost + fixed fee, unit price, Contract/Purchase ~~~~---~~~_---~~~~---------- I OWNERSHiP: AEC/MED AECbED GOVT GOUT I CONTRACTOR CONTRACTOR

130

File:07TXBRECGeneratorCertification.pdf | Open Energy Information  

Open Energy Info (EERE)

TXBRECGeneratorCertification.pdf Jump to: navigation, search File File history File usage Metadata File:07TXBRECGeneratorCertification.pdf Size of this preview: 463 599 pixels....

131

File:03MTCEncroachmentOverview.pdf | Open Energy Information  

Open Energy Info (EERE)

MTCEncroachmentOverview.pdf Jump to: navigation, search File File history File usage Metadata File:03MTCEncroachmentOverview.pdf Size of this preview: 463 599 pixels. Other...

132

File:(PECC) Special Program on Climate Change SUMMARY (english...  

Open Energy Info (EERE)

PECC) Special Program on Climate Change SUMMARY (english).pdf Jump to: navigation, search File File history File usage File:(PECC) Special Program on Climate Change SUMMARY...

133

File:CDPHE Industrial Individual Wastewater Discharge Permit...  

Open Energy Info (EERE)

Industrial Individual Wastewater Discharge Permit Application.pdf Jump to: navigation, search File File history File usage Metadata File:CDPHE Industrial Individual Wastewater...

134

Using Operational Security (OPSEC) to Support a Cyber Security...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Using Operational Security (OPSEC) to Support a Cyber Security Culture in Control Systems Environments Using Operational Security (OPSEC) to Support a Cyber Security Culture in...

135

TSO-1105 - In the Matter of Personnel Security Hearing | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

105 - In the Matter of Personnel Security Hearing 105 - In the Matter of Personnel Security Hearing TSO-1105 - In the Matter of Personnel Security Hearing The individual currently is employed by a DOE contractor, and has held a DOE security clearance for several years. Based on issues contained in the individual's security file, the Local Security Office (LSO) conducted a Personnel Security Interview (PSI) with the individual in June 2011. PSI, DOE Ex. 6. In August 2011, the LSO suspended the individual's DOE security clearance and issued her a Notification Letter, together with a statement (Enclosure 2) setting forth the information that created a substantial doubt about the individual's eligibility to hold a DOE security clearance. (DOE Ex. 1). Specifically, the LSO alleges that the individual has raised a concern under 10 C.F.R. § 710.8(f) (Criterion F)

136

Transportation Security | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Transportation Security Transportation Security Transportation Security More Documents & Publications Overview for Newcomers West Valley Demonstration Project Low-Level Waste...

137

Case: 1:14-cv-01416 Document#: 1 Filed: 02/27/14 Pagel of 26 Pagel D#:1 UNITED STATES DISTRICT COURT  

E-Print Network (OSTI)

Case: 1:14-cv-01416 Document#: 1 Filed: 02/27/14 Pagel of 26 Pagel D#:1 UNITED STATES DISTRICT of the defendants' public documents, conference calls and announcements made by defendants, United States securities;Case: 1:14-cv-01416 Document#: 1 Filed: 02/27/14 Page 2 of 26 PagelD #:2 10(b) and 20(a

Straight, Aaron

138

Comparing Inverted Files and Signature Files for Searching a Large Lexicon  

E-Print Network (OSTI)

Comparing Inverted Files and Signature Files for Searching a Large Lexicon BEN CARTERETTE1 , FAZLI, 2003 To appear in Information Processing and Management Abstract Signature files and inverted files, a bit-sliced signature file can be compressed to a smaller size than an inverted file if each n

Can, Fazli

139

Border Security | ornl.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

Border Security SHARE Border Security Testing of unmanned aerial surveillance equipment. ORNL performs border security research at the Security Sciences Field Laboratory (SSFL),...

140

Information Security | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Information Security | National Nuclear Security Administration Information Security | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Information Security Home > About Us > Our Programs > Nuclear Security > Information Security Information Security Information security deals with requirements for the protection and control of information and matter required to be classified or controlled by

Note: This page contains sample records for the topic "586-1076 secure file" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

Security for grids  

SciTech Connect

Securing a Grid environment presents a distinctive set of challenges. This paper groups the activities that need to be secured into four categories: naming and authentication; secure communication; trust, policy, and authorization; and enforcement of access control. It examines the current state of the art in securing these processes and introduces new technologies that promise to meet the security requirements of Grids more completely.

Humphrey, Marty; Thompson, Mary R.; Jackson, Keith R.

2005-08-14T23:59:59.000Z

142

File:20121127144736519.pdf | Open Energy Information  

Open Energy Info (EERE)

1127144736519.pdf 1127144736519.pdf Jump to: navigation, search File File history File usage File:20121127144736519.pdf Size of this preview: 463 × 599 pixels. Other resolution: 464 × 600 pixels. Full resolution ‎(1,275 × 1,650 pixels, file size: 116 KB, MIME type: application/pdf) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 15:55, 27 November 2012 Thumbnail for version as of 15:55, 27 November 2012 1,275 × 1,650 (116 KB) Dklein2012 (Talk | contribs) You cannot overwrite this file. Edit this file using an external application (See the setup instructions for more information) File usage There are no pages that link to this file. Retrieved from "http://en.openei.org/w/index.php?title=File:20121127144736519.pdf&oldid=53999

143

Help:Uploading Files | Open Energy Information  

Open Energy Info (EERE)

Uploading Files Uploading Files Jump to: navigation, search Click on the upload file link at the bottom of the page (NOTE: you must be logged in to have this option). Uploading tutorial.JPG Click on the "choose file" button to choose the file you would like to upload Uploading tutorial2.JPG Choose the file on your local drive that you would like to upload to OpenEI. Uploading tutorial3.JPG Click "upload file" to upload onto OpenEI Uploading tutorial4.JPG Finally, use the file name along with the instructions below to insert into the wikipage. Uploading tutorial5.JPG Links Link to description page If you put a colon (:) before File:, the image will not be embedded and the link will lead to the description page of the file. [[:File:Example.jpg]] [[:File:Example.jpg|Sunflowers]]

144

File:Install.pdf | Open Energy Information  

Open Energy Info (EERE)

Install.pdf Install.pdf Jump to: navigation, search File File history File usage File:Install.pdf Size of this preview: 463 × 599 pixels. Other resolution: 464 × 600 pixels. Full resolution ‎(1,275 × 1,650 pixels, file size: 86 KB, MIME type: application/pdf) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 13:48, 1 November 2012 Thumbnail for version as of 13:48, 1 November 2012 1,275 × 1,650 (86 KB) Dklein2012 (Talk | contribs) You cannot overwrite this file. Edit this file using an external application (See the setup instructions for more information) File usage There are no pages that link to this file. Retrieved from "http://en.openei.org/w/index.php?title=File:Install.pdf&oldid=53281

145

File:Oregonshpodocumentationstandards.pdf | Open Energy Information  

Open Energy Info (EERE)

Oregonshpodocumentationstandards.pdf Oregonshpodocumentationstandards.pdf Jump to: navigation, search File File history File usage File:Oregonshpodocumentationstandards.pdf Size of this preview: 463 × 599 pixels. Other resolution: 464 × 600 pixels. Full resolution ‎(1,275 × 1,650 pixels, file size: 31 KB, MIME type: application/pdf) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 11:37, 20 November 2012 Thumbnail for version as of 11:37, 20 November 2012 1,275 × 1,650 (31 KB) Dklein2012 (Talk | contribs) You cannot overwrite this file. Edit this file using an external application (See the setup instructions for more information) File usage There are no pages that link to this file. Retrieved from "http://en.openei.org/w/index.php?title=File:Oregonshpodocumentationstandards.pdf&oldid=538466"

146

File:DIAsample.pdf | Open Energy Information  

Open Energy Info (EERE)

DIAsample.pdf DIAsample.pdf Jump to: navigation, search File File history File usage File:DIAsample.pdf Size of this preview: 776 × 600 pixels. Full resolution ‎(1,650 × 1,275 pixels, file size: 280 KB, MIME type: application/pdf) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 15:53, 2 August 2012 Thumbnail for version as of 15:53, 2 August 2012 1,650 × 1,275 (280 KB) Andbailey (Talk | contribs) You cannot overwrite this file. Edit this file using an external application (See the setup instructions for more information) File usage The following page links to this file: Identify types of development and climate impacts that are country priorities Retrieved from "http://en.openei.org/w/index.php?title=File:DIAsample.pdf&oldid=501432

147

File:Installnot.pdf | Open Energy Information  

Open Energy Info (EERE)

Installnot.pdf Installnot.pdf Jump to: navigation, search File File history File usage File:Installnot.pdf Size of this preview: 463 × 599 pixels. Other resolution: 464 × 600 pixels. Full resolution ‎(1,275 × 1,650 pixels, file size: 175 KB, MIME type: application/pdf) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 16:12, 13 November 2012 Thumbnail for version as of 16:12, 13 November 2012 1,275 × 1,650 (175 KB) Dklein2012 (Talk | contribs) You cannot overwrite this file. Edit this file using an external application (See the setup instructions for more information) File usage There are no pages that link to this file. Retrieved from "http://en.openei.org/w/index.php?title=File:Installnot.pdf&oldid=536509"

148

File:Apschem.pdf | Open Energy Information  

Open Energy Info (EERE)

Apschem.pdf Apschem.pdf Jump to: navigation, search File File history File usage File:Apschem.pdf Size of this preview: 463 × 599 pixels. Other resolution: 464 × 600 pixels. Full resolution ‎(1,275 × 1,650 pixels, file size: 105 KB, MIME type: application/pdf) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 12:25, 14 November 2012 Thumbnail for version as of 12:25, 14 November 2012 1,275 × 1,650 (105 KB) Dklein2012 (Talk | contribs) You cannot overwrite this file. Edit this file using an external application (See the setup instructions for more information) File usage There are no pages that link to this file. Retrieved from "http://en.openei.org/w/index.php?title=File:Apschem.pdf&oldid=536777

149

Office of the CISO, December 2010 Information Security Risk Advisory  

E-Print Network (OSTI)

Office of the CISO, December 2010 Information Security Risk Advisory Web Browsing Software attacks that exploit web browsers (e.g., Internet Explorer, Firefox, Safari, Chrome, Opera) are on the rise. Cyber criminals frequently attack web browsers to take control of computers, delete files, steal personally

Queitsch, Christine

150

MEHORANDUM TO: FILE  

Office of Legacy Management (LM)

MEHORANDUM MEHORANDUM TO: FILE FR0t-t: -~+?!+-- SUBJECT: u - 5..7. am . . ALTERNATE W% : ---\L-&--~~+. ___- ____ S-fA-rE: t-4 ;5- ------ wJ!%RLSL " Past: ------------------------ Current: --~~---~---__~~~-------~-- Owner contacted 0 yes -glnos if yes, date cotitectad TYPE OF OPERATION ---------_----__- 0 Research & Development 0 Facility Type 0 Production scale testing 0 Pilot Scale 0 Bench Scale Process *I Theoretical Studies 0 Sample & kialysis 0 Production 0 Disposal /Storage IV!?LPExB?!IBfiEI 0 Uanuf ecturing 0 University 0 Research Organization IfJ ,"WW="""s, ---------------___--_ 0 Prims 0 Subcontractor 0 Purchase Order 0 Other information (i.e., cost + fixed fee, unit price, time 81 material, etc) ------- Contract/Purchase Order #

151

MEMORANDUM TO: FILE DATE  

Office of Legacy Management (LM)

-.. -.. 37qg: MEMORANDUM TO: FILE DATE =b-- FROM: ---L- _------__ u . SUBJECT: SITE ACl= ALTERNATE NAME: -_______-~-----------------NA~E:__( CITY:--~---------_-STATE:-~~ (2 OWNE!sI_SL f Past- L&cl= w ------------------- ----- Current- w buL.r - ------------ ownq cm-ltacted 0 yes @ "no; if yes, data cnntacte TYPE OF OPERATION -------------_~-~ q Research & Development 0 Production %.cale testing 0 Pilot Scale 0 Bench Scale Process 0 Theoretical Studies 0 Sample 84 Analysis 0 Production i2 Disposal/Storage 0 Facility T 0 Hanufac 0 Univerrj 0 .R esearc 0 Governm 14 Other 1 I lil IrJ y,/3 Prime 0 Other infcrkion Subcwkractbr (i.e., ?bst + fixed fee! &nit price, Cl Purchase Order time & mate

152

GlNTRM FILES  

Office of Legacy Management (LM)

: .; : .; GlNTRM FILES .- Red Rwtaaie!a .=?%A .-m JJullen mtoxges8ntuuo -006 .017 .olb J-m .021 .OLt .Ol2 *Jeta Lhh .029 .0X9 ,026 ~k~exwteethaae~oyeencloee~ttothxflcmrof bUckaide. After the deccxmdnatimpxcblarrrro mlved.the rt8tma dt&itO lo- &ctioacoilrpasdistuEeed. 1. . ,, -. . . ' The conparty visited 3~ciali.z.e~ ja the a.ppLicatica of Znductiw beat. The purpose of this trip wa s to advise on haaBh and safety measures for the preoceeptance testing of inductioo heat treating equipment procmed by NU3. Tim conclusims &am attaining to the health and safety hazards involved in the iaducti0n heat treating of uraaim mtal axe stated in amtber trip report (D. i. Plowers to J. A. Quigley. LLD,, 12/18/58). Based ca those comzlosions. ,tbe following recomandations were given .to Ajax-

153

MEMORANDUM TO: FILE FROM:  

Office of Legacy Management (LM)

p' p' : , .; ' _ ' < 3.518 MEMORANDUM TO: FILE FROM: -Ye L&a --------e---e--- DATE 6j8/8 7 v---s -- ---------- SUBJECT: ;&l a+-b IA T~cornqm Q afib4 SITE NAME: CITY: & &&at leg co Current: ------------------------ Owner contacted 0 yes p no; if yem, date contacted --w---w------ TYPE OF OPERATION The T$SYI L-- Tj flmf ----------------- FResearch & Development a Facility 0 Production scale testing 0 Pilot Scale p Manufacturing 0 Bench Scale Process [3 University 0 Theoretical Studies 0 Research Organization 0 Sample t Analysis 0 Government Sponsored Facility 0 Other --------------------- 0 Production 0 Disposal/Storage TYPE OF CONTRACT ---------------- p Prim* tLl fo$q rJ WQ 0 Subcontractor 0 Purchase Order Cl Other information (i.e., cost

154

MEMORANDUrl TO: FILE  

Office of Legacy Management (LM)

MEMORANDUrl MEMORANDUrl TO: FILE FROM: 3. Lfwhle ---------------- ALTERNATE CITY: ---&!!!J&~~s__~- ________ STATE: --!?-c- (C&IO> OE!!EEL_S1 past: --rc;,b,&&~c! ---- current: --------- ---------- ---__-_ Owner contacted 0 yes g noi if yes, date contacted------ TYPE OF OPERATION ----------------- fl Research & Development 0 Production scale testing 0 Pilot Scale 0 Bench Scale Process p Theoretical Studies cl Sample s1 Analysis 0 Production 0 Disposal/Storage m Facility Type 0 tlanuf acturing p University 0 Research Organization 0 Government Sponsored Facility 0 Other --------------_______ B Prime AKC- cl. G&-Fo~~:~ q Other information (i.e., cost 0 Subcontractor + fixed fee, unit price, 0 Purchase Order C!2!LFSCII!!E-!33X!Z!:

155

HEMORANDUH TO: FILE DATE  

Office of Legacy Management (LM)

HEMORANDUH HEMORANDUH TO: FILE DATE 1123 lLjl ---WV-------------- FROM: P. s&w+ -------v-----s-- SUBJECT: lJ+ - e;& SITE NAME: LJo"zL - /L,' de Cd -J--h=- ALTERNATE l --e-e-- ------w------- ---,,,' ,m--, NAME: ---------------------- CITY: LL-pL~ ------------ ------------- STATE3 e--w-- OWNER tS) -----w-- Past I --k-!!.l~ -pa L . -v-----w------- Current: Owner contac?-ed 0 yes 0 no; if yes, I+Lff A zid;&m - -------------------------- date contacted ------B--m--- TYPE OF OPERATION ----------------- a Research 81 Development a Facility Type 0 Production scale testing 0 Pilot Scale 0 Bench Scale Procesr 0 Theoretical Studies 0 Sample & Analysis m Manuf acturinq 0 University 0 Research Organization 0 Government Sponrored Facility 0 Other

156

MEMORANDUM TO: FILE  

Office of Legacy Management (LM)

' ' a 7 > 3gI, q OH.I-r7.-I (jt' , ""7 MEMORANDUM TO: FILE FROM: ' 'Y OIL&i cz ,,,',, -------we- SUBJECT: SITE NAME: _____ CITY:-AQY&- --------------e----e-- OWNER(S) Owner contacted n yes =urr="t: ----- -Llz2-:---,-- -----___ &,&/4$- '1 :) ' if yes, data contacted ------------- TYPE OF OPERATION ----------------- a Research t Development lti- Facility Type 0 Production scale testing a Manufacturing 5 University 0 Research Organization 0 Government Sponsored Facility Cl Pilot Scale Cl Bench Scale Process : Theoretical Studies Sample SC Analysis 0 Production 0 Di 3posal /Storage TYPE OF CONTRACT -------------w-e BP rime 54, 1; cl Subcontractor a Purchase Order cs dL+f' d~ a 0 Other --------------------- Other information (i.e., cost

157

MEMORQNDUM TO: FILE  

Office of Legacy Management (LM)

MEMORQNDUM MEMORQNDUM TO: FILE 7./27/S 7. DATE------------------ M LAU FROt+ ---~--e--------e SITE ALTERNATE NAME: Net b-0 c/i-w, fS ~?L~-----------------N~~E:____---___------------ -----------------+-- CITY:-K_2_EJ=as+ Gz+q s+, pQ~:'&-STATE: cd past:----------------------- Curre"t:-------------------------- Owner contacted 0 yes sno; if yes, date contacted _ TYPE OF OPERATION ~~----_~~~---~~-- B Research & Development 0 'Production scale testing 0 Pilot Scale 0 Bench Scale Process 0 Theoretical Studies q Sample 81 Analysis 0 Praduction 0 Disposal/Storage m Facility Type 0 rlanuf acturing rJ University a Research Organization 0 Sovernment Sponsored Facility U Other --~~~---_~--~-_~~~~-_ q Prime, B Subcontractor a Purchase Order 0 Other information (i.e., cost

158

TO: FILE DATE  

Office of Legacy Management (LM)

tlEi?ORANDUH tlEi?ORANDUH TO: FILE DATE FFtOil: c ----'- Y '%d 6- ----_----_ SUBJECT: SITE NAME: ----------STATE: Owner contacted 0 yes qno; if yes, date contacted ---------__-- TYPE OF OPERATION ----~_--_--~----_ &Research & Development @ Praduction scale testing. 0 Pilat Scale 0 Bench Scale Process a Theoretical Studies 0 Sample & Analysis tin Facility Type R Manufacturing IJ University 0 Research Organization IJ Gavernment Sponsored Facility 0 Other ----------------' --~- 0 Production E Disposal/Storage TYPE OF CONTRACT ~~_-~--_---_--__ P Prime 0 I Cl Subcontractor Other information (i.e., cost K Purchase Order jZM pati !& MC4 + fixed fee, unit price, time 81 material, etc) ---------------------_----~-- OWNERSHIP: AEC/MED AEC/MED GOVT GOVT

159

Designing security into software  

E-Print Network (OSTI)

When people talk about software security, they usually refer to security applications such as antivirus software, firewalls and intrusion detection systems. There is little emphasis on the security in the software itself. ...

Zhang, Chang Tony

2006-01-01T23:59:59.000Z

160

Review: Intranet Security  

Science Journals Connector (OSTI)

......Review Review: Intranet Security Reviewed by John Williamson Intranet Security John Vacca...Advanced Computer Technology and the Law Curtis...that in advanced technology the legal system...Wolverhampton University Intranet Security ?? Intranet......

John Williamson

1998-05-01T23:59:59.000Z

Note: This page contains sample records for the topic "586-1076 secure file" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

National Nuclear Security Administration  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

National Nuclear Security Administration National Nuclear Security Administration Ofice of Secure Transportation mKlK= Box RQMM= ^luquerqueI= kj= UTNUR= ;JAN 03 213 MEMORANDUM FOR GREGORY eK= WOODS GENERAL COUNSEL DEPARTMENT OF ENERGY FROM: SUBJECT: JEFFREY P. HARREL ASSIST ANT DEPU FOR SECURE 2013 ANNUAL PLANNING SUMMARY In response to your memorandum of December TI= 2012, the following information is provided for the National Nuclear Security Administration Ofice of Secure

162

Office of Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Security Home Sub Offices › Security Policy › Security Assistance › Departmental Personnel Security Mission & Functions › Security Policy › Security Assistance › Departmental Personnel Security Human Reliability Program (HRP) Guidance Documents Security Technology Information Archive (STIA) Related Links › DOE › DOE CIO › NNSA › DOE CFO › NTC › S&S PIR Contact Us HSS Logo Welcome to the Office of Security Mission and Functions The Office of Security (HS-50) developes security policy, provides security expertise to assist field elements in planning site protection strategies and coordinates with domestic authorities to provide safeguards and security technical assistance, technical systems support, and technology development and deployment opportunities. The Office of Security, through the Office of Departmental Personnel Security, also ensures that Departmental personnel security programs (included the National Nuclear Security Administration) are consistent and effectively implemented.

163

Personnel Security Activities  

Directives, Delegations, and Requirements

Establishes objectives, requirements and responsibilities for the Personnel Security Program and Personnel Security Assurance Program. Cancels DOE O 472.1B

2003-03-25T23:59:59.000Z

164

Security | Department of Energy  

Energy Savers (EERE)

Security Security Preventing nuclear weapons materials and technologies from falling into the hands of adversaries seeking to develop weapons of mass destruction is the top...

165

Security & Privacy | EMSL  

NLE Websites -- All DOE Office Websites (Extended Search)

Security & Privacy Security & Privacy Privacy Notice We collect no personal information about you without your knowledge when you visit this site, although you may choose to...

166

File:Lucs.pdf | Open Energy Information  

Open Energy Info (EERE)

Lucs.pdf Lucs.pdf Jump to: navigation, search File File history File usage File:Lucs.pdf Size of this preview: 463 × 599 pixels. Other resolution: 464 × 600 pixels. Go to page 1 2 3 4 Go! next page → next page → Full resolution ‎(1,275 × 1,650 pixels, file size: 111 KB, MIME type: application/pdf, 4 pages) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 15:40, 19 November 2012 Thumbnail for version as of 15:40, 19 November 2012 1,275 × 1,650, 4 pages (111 KB) Dklein2012 (Talk | contribs) You cannot overwrite this file. Edit this file using an external application (See the setup instructions for more information) File usage There are no pages that link to this file. Retrieved from

167

File:Energydatabusfacthseet.pdf | Open Energy Information  

Open Energy Info (EERE)

Energydatabusfacthseet.pdf Energydatabusfacthseet.pdf Jump to: navigation, search File File history File usage Metadata File:Energydatabusfacthseet.pdf Size of this preview: 463 × 599 pixels. Other resolution: 464 × 600 pixels. Go to page 1 2 Go! next page → next page → Full resolution ‎(1,275 × 1,650 pixels, file size: 385 KB, MIME type: application/pdf, 2 pages) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 15:59, 10 July 2013 Thumbnail for version as of 15:59, 10 July 2013 1,275 × 1,650, 2 pages (385 KB) Graham7781 (Talk | contribs) You cannot overwrite this file. Edit this file using an external application (See the setup instructions for more information) File usage The following 3 pages link to this file:

168

File:Bonnevillepowerfactsheet.pdf | Open Energy Information  

Open Energy Info (EERE)

Bonnevillepowerfactsheet.pdf Bonnevillepowerfactsheet.pdf Jump to: navigation, search File File history File usage Metadata File:Bonnevillepowerfactsheet.pdf Size of this preview: 463 × 599 pixels. Other resolution: 464 × 600 pixels. Go to page 1 2 Go! next page → next page → Full resolution ‎(1,275 × 1,650 pixels, file size: 648 KB, MIME type: application/pdf, 2 pages) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 15:53, 10 July 2013 Thumbnail for version as of 15:53, 10 July 2013 1,275 × 1,650, 2 pages (648 KB) Graham7781 (Talk | contribs) You cannot overwrite this file. Edit this file using an external application (See the setup instructions for more information) File usage The following page links to this file:

169

File:Noaafactsheet.pdf | Open Energy Information  

Open Energy Info (EERE)

Noaafactsheet.pdf Noaafactsheet.pdf Jump to: navigation, search File File history File usage Metadata File:Noaafactsheet.pdf Size of this preview: 463 × 599 pixels. Other resolution: 464 × 600 pixels. Go to page 1 2 Go! next page → next page → Full resolution ‎(1,275 × 1,650 pixels, file size: 551 KB, MIME type: application/pdf, 2 pages) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 15:55, 10 July 2013 Thumbnail for version as of 15:55, 10 July 2013 1,275 × 1,650, 2 pages (551 KB) Graham7781 (Talk | contribs) You cannot overwrite this file. Edit this file using an external application (See the setup instructions for more information) File usage The following page links to this file: Federal Memorandum of Understanding for Hydropower/Participating

170

File:Npsfactsheet.pdf | Open Energy Information  

Open Energy Info (EERE)

Npsfactsheet.pdf Npsfactsheet.pdf Jump to: navigation, search File File history File usage Metadata File:Npsfactsheet.pdf Size of this preview: 463 × 599 pixels. Other resolution: 464 × 600 pixels. Go to page 1 2 Go! next page → next page → Full resolution ‎(1,275 × 1,650 pixels, file size: 657 KB, MIME type: application/pdf, 2 pages) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 15:56, 10 July 2013 Thumbnail for version as of 15:56, 10 July 2013 1,275 × 1,650, 2 pages (657 KB) Graham7781 (Talk | contribs) You cannot overwrite this file. Edit this file using an external application (See the setup instructions for more information) File usage The following page links to this file: Federal Memorandum of Understanding for Hydropower/Participating

171

Help:Managing files | Open Energy Information  

Open Energy Info (EERE)

Managing files Managing files Jump to: navigation, search If file uploads are enabled, you can upload certain types of files to the wiki. This is particularly useful for uploading images, which you want to place on an article, but you can also upload other types of files. Upload a file Prepare the file for upload. Make sure the file is exactly as you want it. In the sidebar, under "toolbox", click "upload file." Click "Browse" next to the "Source filename:" to locate the file on your computer (the name of the "browse" button depends on your web browser). Change the "Destination filename:" to something descriptive, if necessary. Fill in the "Summary," if necessary. Click the "Upload file" button.

172

Safeguards & Security | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

173

PSH-11-0025 - In the Matter of Personnel Security Hearing | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

25 - In the Matter of Personnel Security Hearing 25 - In the Matter of Personnel Security Hearing PSH-11-0025 - In the Matter of Personnel Security Hearing The individual currently is employed by a DOE contractor, and that contractor has requested that he receive a DOE security clearance. Based on issues contained in the individual's security file, the Local Security Office (LSO) conducted a Personnel Security Interview with the individual in August 2011 (the 2011 PSI, DOE Ex. 8). In September 2011, a DOE-consultant psychologist (the DOE-consultant Psychologist) evaluated the individual, and memorialized her findings in a Psychological Evaluation Report (the Report, DOE Ex. 6). In October 2011, the LSO issued a Notification Letter to the individual, together with a Summary of Security Concerns (Enclosure 2) setting forth the information that created a

174

PSH-12-0020 - In the Matter of Personnel Security Hearing | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

20 - In the Matter of Personnel Security Hearing 20 - In the Matter of Personnel Security Hearing PSH-12-0020 - In the Matter of Personnel Security Hearing The individual is employed by a DOE contractor, and has held a DOE access authorization for several years. Based on financial issues contained in the individual's security file, the Local Security Office (LSO) issued letters of interrogatory (LOI) to the individual in August 2009 and June 2011. DOE Exs. 18 and 16. The LSO also conducted Personnel Security Interviews (PSIs) with the individual in December 2010, November 2011 and December 2011. DOE Exs. 20, 21 and 22. In January 2012, the LSO issued the individual a Notification Letter, together with a Summary of Security Concerns (Enclosure 2) setting forth the information that created a substantial doubt about his eligibility to hold a DOE security clearance.

175

PSH-11-0021 - In the Matter of Personnel Security Hearing | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1-0021 - In the Matter of Personnel Security Hearing 1-0021 - In the Matter of Personnel Security Hearing PSH-11-0021 - In the Matter of Personnel Security Hearing The individual currently is employed by a DOE contractor, and that contractor has requested that he receive a DOE security clearance. Based on issues contained in the individual's security file, the Local Security Office (LSO) conducted a Personnel Security Interview with the individual in May 2011 (the 2011 PSI, DOE Ex. 17). In July 2011, a DOE-consultant psychiatrist evaluated the individual, and memorialized her findings in a Psychological Evaluation Report (the Report, DOE Ex. 6). In October 2011, the LSO issued a Notification Letter to the individual, together with a Summary of Security Concerns (Enclosure 2) setting forth the information

176

File:WATER CODE CHAPTER 11.pdf | Open Energy Information  

Open Energy Info (EERE)

Community Login | Sign Up Search File Edit History Facebook icon Twitter icon File:WATER CODE CHAPTER 11.pdf Jump to: navigation, search File File history File usage Metadata...

177

Office of Security Policy  

NLE Websites -- All DOE Office Websites (Extended Search)

Office of Security Policy Office of Security Policy Mission and Functions The Office of Security Policy develops and promulgates safeguards and security policy governing the protection of National Security and other critical assets entrusted to the Department. Director's Perspective Welcome to the Office of Security Policy Jack Cowden, Director The Office of Security Policy analyzes, develops and interprets safeguards and security policy governing national security functions and the protection of related critical assets entrusted to the Department. This includes the protection of DOE nuclear facilities, nuclear weapons components, special nuclear materials and classified information. Our broad topical areas are organized as: Program Planning and Management, Protection Program Operations (which includes both physical security and protective forces), Information Security and Material Control and Accountability.

178

U-155: WebCalendar Access Control and File Inclusion Bugs Let Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: WebCalendar Access Control and File Inclusion Bugs Let 5: WebCalendar Access Control and File Inclusion Bugs Let Remote Users Potentially Execute Arbitrary Code U-155: WebCalendar Access Control and File Inclusion Bugs Let Remote Users Potentially Execute Arbitrary Code April 25, 2012 - 7:00am Addthis PROBLEM: WebCalendar Access Control and File Inclusion Bugs Let Remote Users Potentially Execute Arbitrary Code PLATFORM: 1.2.4 and prior versions ABSTRACT: Two vulnerabilities were reported in WebCalendar. A remote user may be able to execute arbitrary PHP code on the target system. reference links: SecurityTracker Alert ID: 1026966 CVE-2012-1495 CVE-2012-1496 IMPACT ASSESSMENT: Medium Discussion: A remote user can access '/install/index.php' to potentially modify '/includes/settings/' with arbitrary values or PHP code. A remote

179

V-177: VMware vCenter Chargeback Manager File Upload Handling Vulnerability  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

177: VMware vCenter Chargeback Manager File Upload Handling 177: VMware vCenter Chargeback Manager File Upload Handling Vulnerability V-177: VMware vCenter Chargeback Manager File Upload Handling Vulnerability June 13, 2013 - 6:00am Addthis PROBLEM: vCenter Chargeback Manager Remote Code Execution PLATFORM: VMware vCenter Chargeback Manager 2.x ABSTRACT: The vCenter Chargeback Manager contains a critical vulnerability that allows for remote code execution REFERENCE LINKS: Secunia Advisory SA53798 VMWare Security Advisory VMSA-2013-0008 CVE-2013-3520 IMPACT ASSESSMENT: Medium DISCUSSION: The vCenter Chargeback Manager (CBM) contains a flaw in its handling of file uploads. Exploitation of this issue may allow an unauthenticated attacker to execute code remotely. IMPACT: System Access SOLUTION: Vendor recommends updating to version 2.5.1

180

Secure Manufacturing | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Secure Secure Manufacturing Secure Manufacturing The depth and breadth of Y-12's manufacturing capabilities and expertise enable Y-12 to address current and emerging national security challenges by providing leadership and direction to perform the following activities: solving unique, high-risk manufacturing problems; eliminating the most difficult manufacturability and development obstacles; protecting classified and proprietary materials, components, and information; developing unique technologies to optimize manufacturing and systems performance; and executing projects cost effectively and with timeliness. Y-12 accomplishes this mission to meet the national security challenges of today and those of the future, with capability and expertise in the following areas:

Note: This page contains sample records for the topic "586-1076 secure file" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

EIA-411 Data File  

Gasoline and Diesel Fuel Update (EIA)

Form EIA-411 Database Form EIA-411 Database Form EIA-411 - “Coordinated Bulk Power Supply Program Report” Data Coverage and Data Quality Release Date: December 22, 2011 Next Release Date: November 2012 In 2008, the Form EIA-411 became a mandatory collection for all schedules except No. 7 (Transmission Outages) which will continue to be a voluntary filing. The Form EIA-411 collects information about regional electricity supply and demand projections for a five-year advance period and information on the transmission system and supporting facilities. Editing of the data is done by each of the various reliability regions. The data collected on this form are used by the U.S. Department of Energy to monitor the current status and trends of the electric power industry and to evaluate the future reliability of the industry. Each of the reliability regions of the North American Electric Reliability Corporation (NERC) is asked to submit Form EIA-411 after compiling data furnished by utilities and other electricity suppliers within their regions to NERC. NERC then compiles and coordinates these reports and provides the data to the Energy Information Administration.

182

DOE FILE NO.  

Office of Legacy Management (LM)

DOE FILE NO. _ ffi~15970 ADMIN RCD _ COMM REF _ pRwm BttO" SVR.l!s.j tJF PLE7l:JJER Rf) TECHNICAL SERVICES DIVISION (TSD) BACKFIT (Documents dated prior to 1 November 1988) FUSRAP COMMUNICATIONS DISTRIBUTION DOEiORO TECHNICAL SERVICES DIVISION (CE·53) BECHTEL NATIONAL INC. - JOB 14501 RESPONSE TRACKING INFORMATION PRIMARY, I lOWED BY: (ORG) I (ORG) TARGET DATE I I CLOSING CCN COMPL DATE ( ( CLOSING REF I I lOWED BY: (ORG) I I I I ( (ORG) TARGET DATE I CLOSING CCN COMPL DATE CLOSING REF AFFECTED DOCUMENT _ ~~~=.k'£...,JUrE.......,"'"A.'-"-- TO _ _....I!1)o<..;J:...!!S'--'L'--- 'COMM DATE tll,I.1t'l'l ADDR CODE I IPJuCLOSES CCN WBS ....Id. iCU DL.::2.."'-- ......... J""I .... 5

183

Reading File Bonneville Power Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Reading File Bonneville Power Administration P.O. Box 3621 Portland, Oregon 97208-3621 POWER SERVICES In reply refer to: PG-5 Ms. Renata Kurschner Director, Generation Resource...

184

HIMACS file management software and strategies  

SciTech Connect

This document discusses the various file management technologies available for potential use with microcomputers at Hanford.

Rohen, W.T.

1994-09-30T23:59:59.000Z

185

Nuclear Security | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

| National Nuclear Security Administration | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nuclear Security Home > About Us > Our Programs > Nuclear Security Nuclear Security The Office of Defense Nuclear Security (DNS) is responsible for the development and implementation of security programs for NNSA. In this capacity, DNS is the NNSA line management organization responsible for

186

Nuclear Security | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

| National Nuclear Security Administration | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nuclear Security Home > About Us > Our Programs > Nuclear Security Nuclear Security The Office of Defense Nuclear Security (DNS) is responsible for the development and implementation of security programs for NNSA. In this capacity, DNS is the NNSA line management organization responsible for

187

Nuclear Security Enterprise | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Enterprise | National Nuclear Security Administration Enterprise | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nuclear Security Enterprise Home > About Us > Our Programs > Defense Programs > Nuclear Security Enterprise Nuclear Security Enterprise The Nuclear Security Enterprise (NSE) mission is to ensure the Nation sustains a safe, secure, and effective nuclear deterrent through the

188

Better Security Through Discussion | Department of Energy  

Office of Environmental Management (EM)

Better Security Through Discussion Better Security Through Discussion Better Security Through Discussion More Documents & Publications Indiana Department of Homeland Security -...

189

Outline Inverted File Building Compression for Inverted Files Building and Compression Techniques for Inverted  

E-Print Network (OSTI)

Outline Inverted File Building Compression for Inverted Files Building and Compression Techniques for Inverted Files Roi Blanco Dpt. Computing Science, University of A Coruna December 13, 2005 Roi Blanco Building and Compression Techniques for Inverted Files #12;Outline Inverted File Building Compression

Barreiro, Alvaro

190

File:Hydrofracking.pdf | Open Energy Information  

Open Energy Info (EERE)

Hydrofracking.pdf Hydrofracking.pdf Jump to: navigation, search File File history File usage File:Hydrofracking.pdf Size of this preview: 463 × 599 pixels. Other resolution: 464 × 600 pixels. Go to page 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 Go! next page → next page → Full resolution ‎(1,275 × 1,650 pixels, file size: 704 KB, MIME type: application/pdf, 19 pages) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 15:47, 9 February 2012 Thumbnail for version as of 15:47, 9 February 2012 1,275 × 1,650, 19 pages (704 KB) Graham7781 (Talk | contribs) You cannot overwrite this file. Edit this file using an external application (See the setup instructions for more information) File usage

191

Personnel Security Program Manual  

Directives, Delegations, and Requirements

provides detailed requirements and procedures to supplement DOE O 472.1B, PERSONNEL SECURITY ACTIVITIES, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE), including the National Nuclear Security Administration (NNSA). Cancels DOE M 472.1-1

2000-11-16T23:59:59.000Z

192

Personnel Security Manual  

Directives, Delegations, and Requirements

This Manual provides detailed requirements and procedures to supplement DOE O 472.1B, Personnel Security Activities, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE). This Manual addresses only the Personnel Security Program.

1998-05-22T23:59:59.000Z

193

Office of Security Assistance  

Energy.gov (U.S. Department of Energy (DOE))

The Office of Security Assistance manages the Technology Deployment Program to improve the security posture of the Department of Energy and the protection of its assets and facilities through the deployment of new safeguards and security technologies and development of advanced technologies that reduce operating costs, save protective force lives, and improve security effectiveness.

194

NERSC Computer Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Security NERSC Computer Security NERSC computer security efforts are aimed at protecting NERSC systems and its users' intellectual property from unauthorized access or modification. Among NERSC's security goal are: 1. To protect NERSC systems from unauthorized access. 2. To prevent the interruption of services to its users. 3. To prevent misuse or abuse of NERSC resources. Security Incidents If you think there has been a computer security incident you should contact NERSC Security as soon as possible at security@nersc.gov. You may also call the NERSC consultants (or NERSC Operations during non-business hours) at 1-800-66-NERSC. Please save any evidence of the break-in and include as many details as possible in your communication with us. NERSC Computer Security Tutorial

195

Office of Security Assistance  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Security Home Sub Offices › Security Policy › Security Assistance › Departmental Personnel Security Mission & Functions › Security Policy › Security Assistance › Departmental Personnel Security Human Reliability Program (HRP) Guidance Documents Security Technology Information Archive (STIA) Related Links › DOE › DOE CIO › NNSA › DOE CFO › NTC › S&S PIR Contact Us HSS Logo Director's Perspective Welcome to the Office of Security Assistance Samuel N. Callahan, Director Mission and Functions The Office of Health, Safety, and Security (HSS) created the Office of Security Assistance Program to provide timely technical assistance and system support to field and Headquarters elements to enhance site security programs, upon request. The program is comprised of technologists and subject matter experts from all security disciplines including Program Management, Protection Program Operations, Information Security, Materials Control and Accountability, and Personnel Security. HSS is committed to building a security assistance program to serve the interests of the Department based upon the needs of our customers - with emphasis on customer-focus and meeting multi-disciplinary security needs. In Fiscal Year 2007, HSS performed extensive assistance activities at the request of DOE/NNSA program offices and field sites. The activities ranged from special and routine site survey assistance, physical and technical security inspections in support of the Office of Intelligence, Vulnerability Assessment and Design Basis Threat (DBT) implementation assistance, third-party, adversary support, and DBT implementation and planning validation activities associated with the Site Assistance Visits and Technology Assistance Visits. The security assistance provided to our customers included technical expertise tailored to augment site capabilities in critical fields.

196

Cyber Security & Smart Grid  

E-Print Network (OSTI)

Cyber Security & Smart Grid Jonathan Shapiro Texas Institute The Clean Air Through Energy Efficiency (CATEE) Conference Cyber Security & Smart Grid ESL-KT-11-11-23 CATEE 2011, Dallas, Texas, Nov. 7 ? 9, 2011 Cyber Security and The Smart... and communication protocols. ESL-KT-11-11-23 CATEE 2011, Dallas, Texas, Nov. 7 ? 9, 2011 Smart Grid Systems ?Current Cyber Security Issues ? Advanced Metering Infrastructure (AMI) Security ? The wireless devices are used in the smart meters located...

Shapiro, J.

2011-01-01T23:59:59.000Z

197

T-560: Cisco Security Advisory: Management Center for Cisco Security...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Advisory: Management Center for Cisco Security Agent Remote Code Execution Vulnerability T-560: Cisco Security Advisory: Management Center for Cisco Security Agent Remote Code...

198

Global Security | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Security Global Security We train nuclear industry professionals, emergency responders and security forces from around the world to safeguard vulnerable materials. Nuclear nonproliferation - stopping the spread of nuclear materials - is a critical part of creating a safer world. Y-12 has been working in nonproliferation since the early 1990s in more than 25 countries. As the nation reduces the size of its arsenal, Y-12 will play a central role in decommissioning weapons systems and providing weapons material for peacetime uses. We are a leader across the National Nuclear Security Administration in implementing technology and current training to ensure materials are protected with the highest degree of confidence. We provide the expertise to secure highly enriched uranium - domestically

199

Security Notice | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Notice Security Notice Security Notice Security Information This website is part of a federal computer system used to accomplish federal functions. Y-12 uses software programs to monitor this website for security purposes to ensure it remains available to all users and to protect information in the system. By accessing this website, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features; to use the system for other than intended purposes; to deny service to authorized users; to access, obtain, alter, damage, or destroy information; or otherwise to interfere with the system or its operation - all are prohibited. Evidence of such acts may be disclosed to law enforcement authorities and result in criminal prosecution under the Computer Fraud and

200

PSH-12-0014 - In the Matter of Personnel Security Hearing | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4 - In the Matter of Personnel Security Hearing 4 - In the Matter of Personnel Security Hearing PSH-12-0014 - In the Matter of Personnel Security Hearing The Individual, a 48-year-old employee of a DOE contractor, is an applicant for DOE access authorization. DOE Ex. 3. During the application process, the Individual completed a Questionnaire for National Security Positions (QNSP) in May 2011, and participated in an August 2011 Personnel Security Interview (PSI). DOE Exs. 8, 9. After the PSI, the local security office (LSO) referred the Individual to a DOE consultant-psychiatrist ("the DOE psychiatrist") for an evaluation. The DOE psychiatrist evaluated the Individual in September 2011 and issued a report. DOE Exs. 6, 7. After reviewing the Individual's personnel security file, the LSO informed the

Note: This page contains sample records for the topic "586-1076 secure file" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

PSH-12-0014 - In the Matter of Personnel Security Hearing | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

14 - In the Matter of Personnel Security Hearing 14 - In the Matter of Personnel Security Hearing PSH-12-0014 - In the Matter of Personnel Security Hearing The Individual, a 48-year-old employee of a DOE contractor, is an applicant for DOE access authorization. DOE Ex. 3. During the application process, the Individual completed a Questionnaire for National Security Positions (QNSP) in May 2011, and participated in an August 2011 Personnel Security Interview (PSI). DOE Exs. 8, 9. After the PSI, the local security office (LSO) referred the Individual to a DOE consultant-psychiatrist ("the DOE psychiatrist") for an evaluation. The DOE psychiatrist evaluated the Individual in September 2011 and issued a report. DOE Exs. 6, 7. After reviewing the Individual's personnel security file, the LSO informed the

202

TSO-1014 - In the Matter of Personnel Security | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

TSO-1014 - In the Matter of Personnel Security TSO-1014 - In the Matter of Personnel Security TSO-1014 - In the Matter of Personnel Security The individual is employed by a Department of Energy (DOE) contractor and has held a security clearance at the request of his employer since 1998. DOE terminated his clearance in 2005, and then reinstated it in 2007 after a favorable psychiatric evaluation. In July 2010, the individual's wife filed a restraining order against him. He reported the incident to the local security office (LSO) and the LSO conducted a personnel security interview (PSI) with the individual in August 2010. The PSI did not resolve the security concerns and the individual agreed to be evaluated by a DOE consultant-psychiatrist. In November 2010, a DOE consultant-psychiatrist (DOE psychiatrist) interviewed the individual and concluded that the

203

TSO-1116 - In the Matter of Personnel Security Hearing | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

TSO-1116 - In the Matter of Personnel Security Hearing TSO-1116 - In the Matter of Personnel Security Hearing TSO-1116 - In the Matter of Personnel Security Hearing The individual is an employee of a Department of Energy (DOE) contractor who has held a security clearance for several years. During a routine reinvestigation, the local security office (LSO) discovered that the individual had not filed federal taxes for the tax years 2008 and 2009. In July 2011, the LSO interviewed the individual during a Personnel Security Interview (PSI), but that interview did not resolve the security concerns. The LSO suspended his clearance and, in August 2011, the LSO informed the individual that it had received derogatory information that created a doubt regarding his continued eligibility for access authorization. See

204

TSO-1002 - In the Matter of Personnel Security Hearing | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

TSO-1002 - In the Matter of Personnel Security Hearing TSO-1002 - In the Matter of Personnel Security Hearing TSO-1002 - In the Matter of Personnel Security Hearing The individual held a security clearance from 1990 until 2002 while working for government contractors and the federal government. In 2010, his present employer, a DOE contractor, requested DOE access authorization for the individual. Based on issues contained in the individual's security file, the Local Security Office (LSO) conducted a Personnel Security Interview with the individual in September 2010 (the 2010 PSI, DOE Ex. 10). In November 2010, a DOE-consultant Psychiatrist evaluated the individual, and memorialized her findings in a Report of Psychiatric Evaluation (the 2010 Report, DOE Ex. 4). In December 2010, the LSO issued a Notification Letter

205

TSO-1106 - In the Matter of Personnel Security Hearing | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

TSO-1106 - In the Matter of Personnel Security Hearing TSO-1106 - In the Matter of Personnel Security Hearing TSO-1106 - In the Matter of Personnel Security Hearing The Individual is an applicant for a DOE access authorization in connection with his employment with a DOE contractor. DOE Ex. 3. During the application process, the Individual completed a Questionnaire for National Security Positions (QNSP) in June 2010, and participated in an October 2010 Personnel Security Interview (PSI). DOE Exs. 7, 8. After the PSI, the local security office (LSO) referred the Individual to a DOE consultant-psychologist ("the DOE psychologist") for an evaluation. The DOE psychologist evaluated the Individual in February 2011 and issued a report. DOE Ex. 10. After reviewing the Individual's personnel security file, the LSO informed the Individual in a June 2011 Notification Letter

206

TSO-1106 - In the Matter of Personnel Security Hearing | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

106 - In the Matter of Personnel Security Hearing 106 - In the Matter of Personnel Security Hearing TSO-1106 - In the Matter of Personnel Security Hearing The Individual is an applicant for a DOE access authorization in connection with his employment with a DOE contractor. DOE Ex. 3. During the application process, the Individual completed a Questionnaire for National Security Positions (QNSP) in June 2010, and participated in an October 2010 Personnel Security Interview (PSI). DOE Exs. 7, 8. After the PSI, the local security office (LSO) referred the Individual to a DOE consultant-psychologist ("the DOE psychologist") for an evaluation. The DOE psychologist evaluated the Individual in February 2011 and issued a report. DOE Ex. 10. After reviewing the Individual's personnel security file, the LSO informed the Individual in a June 2011 Notification Letter

207

PSH-12-0050 - In the Matter of Personnel Security Hearing | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2-0050 - In the Matter of Personnel Security Hearing 2-0050 - In the Matter of Personnel Security Hearing PSH-12-0050 - In the Matter of Personnel Security Hearing The individual's present employer, a DOE contractor, has requested a DOE access authorization for the individual. The individual completed and submitted an Electronic Questionnaire for Investigations Processing (QNSP) in November 2011. DOE Exhibit 8. Based on issues contained in the individual's security file, the Local Security Office (LSO) conducted a Personnel Security Interview (PSI) with the individual in January 2012. DOE Exhibit 9. In March 2012, a DOE-consultant Psychologist evaluated the individual, and memorialized his findings in a Psychological Assessment Report (the Report). PSH-12-0050.pdf More Documents & Publications PSH-11-0021 - In the Matter of Personnel Security Hearing

208

Safety, Security and Infrastructure (SSI) Homepage | U.S. DOE Office of  

NLE Websites -- All DOE Office Websites (Extended Search)

Laboratories » SSI Home Laboratories » SSI Home Safety, Security and Infrastructure (SSI) SSI Home Facilities and Infrastructure Safeguards & Security Environment, Safety and Health (ES&H) Organization Chart .pdf file (82KB) Phone Listing .pdf file (129KB) SC HQ Continuity of Operations (COOP) Implementation Plan .pdf file (307KB) Categorical Exclusion Determinations SLI & SS Budget Contact Information Safety, Security and Infrastructure U.S. Department of Energy SC-31/Germantown Building 1000 Independence Ave., SW Washington, DC 20585 P: (301) 903-4097 F: (301) 903-7047 BNL Chemistry Building 555 August 2012: Renovated lab space in the west wing of the BNL Chemistry Building 555 at Brookhaven National Laboratory. The New York Section of the American Chemistry Society recently designated

209

File:INL-geothermal-az.pdf | Open Energy Information  

Open Energy Info (EERE)

az.pdf Jump to: navigation, search File File history File usage Arizona Geothermal Resources Size of this preview: 484 599 pixels. Other resolution: 485 600 pixels. Full...

210

File:Cammetst 58.pdf | Open Energy Information  

Open Energy Info (EERE)

Cammetst 58.pdf Jump to: navigation, search File File history File usage Meteorology: map of Central America selected meteorological stations and elevation from NREL Size of this...

211

File:NREL-camgloann.pdf | Open Energy Information  

Open Energy Info (EERE)

camgloann.pdf Jump to: navigation, search File File history File usage Central America - Annual Global Horizontal Solar Radiation Size of this preview: 776 600 pixels. Full...

212

ELCAP Data Assembly and Conversion Project: Report on File Contents  

E-Print Network (OSTI)

............................................................................................................................................4 ELCAP Raw Hourly Load Data FilesELCAP Data Assembly and Conversion Project: Report on File Contents December 14, 2012 Regional ...............................................................................................2 ELCAP Data Files

213

File:PoliticsofFracking.pdf | Open Energy Information  

Open Energy Info (EERE)

instructions for more information) File usage The following page links to this file: Hydraulic Fracturing Retrieved from "http:en.openei.orgwindex.php?titleFile:Politicso...

214

File:NREL-africa-glo.pdf | Open Energy Information  

Open Energy Info (EERE)

africa-glo.pdf Jump to: navigation, search File File history File usage Africa - Annual Global Horizontal Solar Radiation (PDF) Size of this preview: 776 600 pixels. Full...

215

Homeland Security Programs | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Homeland Security Programs Homeland Security Programs SHARE Homeland Security Programs The Homeland Security Programs support the Department of Homeland Security (DHS), other federal and state agencies, and commercial partners. Through the integration of a number of key competencies, ORNL is able to provide critical operational, technical, and scientific support to these sponsors. A key focus of this area is to translate the critical research into operational capability for the security, protection, response, and recovery of the nation against natural and man-made events. Research Areas detecting, preventing, and reversing the proliferation of weapons of mass destruction deploying integrated systems for incident awareness, detection, and response providing technology for detecting explosives at the

216

National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

i. i. Message from the Administrator President Obama has reshaped our national security priorities making enterprise infrastructure modernization with integrated Information Technology (IT) capabilities a key strategic initiative. Our IT infrastructure must ensure that our workforce can access appropriate information in a secure, reliable, and cost-effective manner. Effective information sharing throughout the government enhances the national security of the United States (US). For the National Nuclear Security Administration (NNSA), effective information sharing helps strengthen our nuclear security mission; builds collaborative networks within NNSA as well as with the Department of Energy (DOE), Department of Defense (DoD), and other national security

217

Security Policy, Guidance & Reports  

Energy.gov (U.S. Department of Energy (DOE))

Preventing nuclear weapons materials and technologies from falling into the hands of adversaries seeking to develop weapons of mass destruction is the top priority of the Department of Energys corporate security programs. All Secretarial objectives are supported by a tailored level of security requirements for a wide range of Departmental scientific, research, and national security objectives based on the security significance of their national assets. DOE ensures that Departmental personnel security programs (including the National Nuclear Security Administration [NNSA]) are consistent and effectively implemented.

218

Applications for cyber security - System and application monitoring  

SciTech Connect

Standard network security measures are adequate for defense against external attacks. However, many experts agree that the greater threat is from internal sources. Insiders with malicious intentions can change controller instructions, change alarm thresholds, and issue commands to equipment which can damage equipment and compromise control system integrity. In addition to strict physical security the state of the system must be continually monitored. System and application monitoring goes beyond the capabilities of network security appliances. It will include active processes, operating system services, files, network adapters and IP addresses. The generation of alarms is a crucial feature of system and application monitoring. The alarms should be integrated to avoid the burden on operators of checking multiple locations for security violations. Tools for system and application monitoring include commercial software, free software, and ad-hoc tools that can be easily created. System and application monitoring is part of a 'defense-in-depth' approach to a control network security plan. Layered security measures prevent an individual security measure failure from being exploited into a successful security breach. Alarming of individual failures is essential for rapid isolation and correction of single failures. System and application monitoring is the innermost layer of this defense strategy. (authors)

Marron, J. E. [Invensys Process Systems, 33 Commercial Street, Foxboro, MA 02035 (United States)

2006-07-01T23:59:59.000Z

219

Information Security Policy Policy Title Information Security Policy  

E-Print Network (OSTI)

Information Security Policy Policy Title Information Security Policy Responsible Executive Vice President of Information Technology and CIO Jay Dominick Responsible Office Office of Information Technology, Operations and Planning Endorsed by Information Security Policy Committee Contact Chief Information Security

Rowley, Clarence W.

220

Improving audio files availability in file sharing networks  

Science Journals Connector (OSTI)

File sharing networks are one of the most popular Internet applications nowadays. Despite its success, these networks have two main issues: the ineffectiveness in downloading content that few users in the network have and the high incidence of getting ... Keywords: compartilhamento de audio, redes P2P

Mrcio Dahia; Geber Ramalho; Fernando Trinta; Giordano Cabral; Marcela Guerra

2009-10-01T23:59:59.000Z

Note: This page contains sample records for the topic "586-1076 secure file" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

Personal Security Assistance for Secure Internet Commerce  

E-Print Network (OSTI)

Jansson Swedish Institute of Computer Science Box 1263, S-164 28 Kista, Sweden ara@sics.se, sverker visiting your computer. Current agent security approaches are often based on trust in an ex- ternal assigned correct access-restrictions. We argue that a more rewarding security policy is to grant

Janson, Sverker

222

Cyber Security Evaluations - Reports  

NLE Websites -- All DOE Office Websites (Extended Search)

Cyber Security Reports Cyber Security Reports 2012 Review of the Classified Cyber Security Programs at the Lawrence Livermore National Laboratory, January 2012, (OUO) Independent Oversight Review of the Classified Cyber Security Programs at the Savannah River Site, March 2012, (OUO) Independent Oversight Review of the Unclassified and Classified Cyber Security Programs at the Office of Scientific and Technical Information, March 2012, (OUO) Independent Oversight 2011 Report on Security Vulnerabilities of National Laboratory Computers, April 13, 2012, (OUO) Technical Review of the Office of Health, Safety and Security Classified Local Area Network, May 2012, (OUO) 2011 (U) Unclassified Cyber Security Technical Review of the Bonneville Power Administration Transmission Services Control Center Network, (OUO), May 2011

223

Office of Security Policy  

Energy.gov (U.S. Department of Energy (DOE))

The Office of Security Policy is the central source within the Department of Energy for the development and analysis of safeguards and security policies and standards affecting facilities, nuclear materials, personnel, and classified information.

224

Office of Information Security  

Energy.gov (U.S. Department of Energy (DOE))

The Office of Information Security is responsible for implementation of the Classified Matter Protection and Control Program (CMPC), the Operations Security Program (OPSEC) and the Facility Clearance Program and the Survey Program for Headquarters

225

Data Security ROCKVILLE, MD  

E-Print Network (OSTI)

by respondent identification. Thus, data security plans must be tailored to the unique needs and concerns of each data set: a "one-security-plan-fits-all" approach is neither feasible nor desirable. Nevertheless

Rau, Don C.

226

Nuclear Security 101 | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

101 | National Nuclear Security Administration 101 | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > Media Room > Fact Sheets > Nuclear Security 101 Fact Sheet Nuclear Security 101 Mar 23, 2012 The goal of United States Government's nuclear security programs is to prevent the illegal possession, use or transfer of nuclear material,

227

Nuclear Security 101 | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

101 | National Nuclear Security Administration 101 | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > Media Room > Fact Sheets > Nuclear Security 101 Fact Sheet Nuclear Security 101 Mar 23, 2012 The goal of United States Government's nuclear security programs is to prevent the illegal possession, use or transfer of nuclear material,

228

Security Scheme in Wireless Grid  

Science Journals Connector (OSTI)

In this paper, we considered the two security services of authorization and data security in wireless Grid. The security issues is related to authorization and security, specific to Grid, the characteristics of t...

Yue Hong Zhang; Li Hao; Zhong Shan Yang

2011-01-01T23:59:59.000Z

229

Personnel Security Program Manual  

Directives, Delegations, and Requirements

This Manual provides detailed requirements and procedures to supplement DOE O 472.1B, Personnel Security Activities, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE), including the National Nuclear Security Administration (NNSA). Extended until 7-7-06 by DOE N 251.64, dated 7-7-05 Cancels: DOE M 472.1-1A.

2001-07-12T23:59:59.000Z

230

Global Scratch File System at NERSC  

NLE Websites -- All DOE Office Websites (Extended Search)

Scratch Scratch Global Scratch File System Overview The global scratch file system (or "global scratch") can be accessed by multiple NERSC systems. Its default quota is much larger than the Global Home quota, so it can be used to temporarily store large amounts of data. This file system is periodically purged. Platforms Using Global Scratch The global scratch file system is available on all NERSC systems except PDSF. Quotas Default global scratch quotas are 20 TB and 2,000,000 inodes. If you need more than that, fill out the Disk Quota Change Request Form. Purging Yes, files in global scratch file system are subject to purging. Backup No, Files in global scratch file system are not backed up. Environment Variable You can reference your personal scratch directory in global scratch as

231

PDF File Information (pbl/help)  

NLE Websites -- All DOE Office Websites (Extended Search)

Services Site Help > Help Power Services Site Map Searching for Text Other Navigation Aids PDF File Info Firstgov PDF File Information Many of the documents available on the Power...

232

File:Bureauofreclamationfactsheet.pdf | Open Energy Information  

Open Energy Info (EERE)

Bureauofreclamationfactsheet.pdf Bureauofreclamationfactsheet.pdf Jump to: navigation, search File File history File usage Metadata File:Bureauofreclamationfactsheet.pdf Size of this preview: 463 × 599 pixels. Other resolution: 464 × 600 pixels. Go to page 1 2 Go! next page → next page → Full resolution ‎(1,275 × 1,650 pixels, file size: 663 KB, MIME type: application/pdf, 2 pages) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 15:54, 10 July 2013 Thumbnail for version as of 15:54, 10 July 2013 1,275 × 1,650, 2 pages (663 KB) Graham7781 (Talk | contribs) 15:54, 10 July 2013 Thumbnail for version as of 15:54, 10 July 2013 1,275 × 1,650, 2 pages (663 KB) Graham7781 (Talk | contribs) You cannot overwrite this file.

233

Information Security Guide  

E-Print Network (OSTI)

Information Security Guide For Government Executives Pauline Bowen Elizabeth Chew Joan Hash #12; Table of Contents Introduction 1 Why do I need to invest in information security? 2 Where do I need to focus my attention in accomplishing critical information security goals? 4 What are the key activities

234

File:Proof2.pdf | Open Energy Information  

Open Energy Info (EERE)

Proof2.pdf Jump to: navigation, search File File history File usage File:Proof2.pdf Size of this preview: 463 599 pixels. Other resolution: 464 600 pixels. Go to page 1 2 Go...

235

File:UtilityPermitFranchiseApp.pdf | Open Energy Information  

Open Energy Info (EERE)

UtilityPermitFranchiseApp.pdf Jump to: navigation, search File File history File usage Metadata File:UtilityPermitFranchiseApp.pdf Size of this preview: 463 599 pixels. Other...

236

File:08COCStateTransmissionProcess.pdf | Open Energy Information  

Open Energy Info (EERE)

COCStateTransmissionProcess.pdf Jump to: navigation, search File File history File usage Metadata File:08COCStateTransmissionProcess.pdf Size of this preview: 463 599 pixels....

237

File:VallesLocationMap.pdf | Open Energy Information  

Open Energy Info (EERE)

VallesLocationMap.pdf Jump to: navigation, search File File history File usage Metadata File:VallesLocationMap.pdf Size of this preview: 800 479 pixels. Full resolution (934...

238

File:0383(2009).pdf | Open Energy Information  

Open Energy Info (EERE)

(2009).pdf Jump to: navigation, search File File history File usage File:0383(2009).pdf Size of this preview: 463 599 pixels. Other resolution: 464 600 pixels. Go to page 1 2...

239

File:VallesGeothermalAreasMap.pdf | Open Energy Information  

Open Energy Info (EERE)

VallesGeothermalAreasMap.pdf Jump to: navigation, search File File history File usage Metadata File:VallesGeothermalAreasMap.pdf Size of this preview: 593 599 pixels. Other...

240

File:UtilityROW.pdf | Open Energy Information  

Open Energy Info (EERE)

UtilityROW.pdf Jump to: navigation, search File File history File usage File:UtilityROW.pdf Size of this preview: 364 600 pixels. Go to page 1 2 3 Go next page next page...

Note: This page contains sample records for the topic "586-1076 secure file" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

File:Mmpa 2007.pdf | Open Energy Information  

Open Energy Info (EERE)

Mmpa 2007.pdf Jump to: navigation, search File File history File usage Metadata File:Mmpa 2007.pdf Size of this preview: 463 599 pixels. Other resolution: 464 600 pixels. Go...

242

File:EO 13186.pdf | Open Energy Information  

Open Energy Info (EERE)

EO 13186.pdf Jump to: navigation, search File File history File usage Metadata File:EO 13186.pdf Size of this preview: 463 599 pixels. Other resolution: 464 600 pixels. Go to...

243

File:OregonSHPOClearanceForm.pdf | Open Energy Information  

Open Energy Info (EERE)

OregonSHPOClearanceForm.pdf Jump to: navigation, search File File history File usage File:OregonSHPOClearanceForm.pdf Size of this preview: 463 599 pixels. Other resolution: 464...

244

File:INL-geothermal-ut.pdf | Open Energy Information  

Open Energy Info (EERE)

ut.pdf Jump to: navigation, search File File history File usage Utah Geothermal Resources Size of this preview: 432 600 pixels. Full resolution (3,725 5,170 pixels, file...

245

File:Regs-tribes2008.pdf | Open Energy Information  

Open Energy Info (EERE)

Regs-tribes2008.pdf Jump to: navigation, search File File history File usage File:Regs-tribes2008.pdf Size of this preview: 463 599 pixels. Other resolution: 464 600 pixels....

246

File:FormA1.pdf | Open Energy Information  

Open Energy Info (EERE)

.pdf Jump to: navigation, search File File history File usage File:FormA1.pdf Size of this preview: 463 599 pixels. Other resolution: 464 600 pixels. Full resolution...

247

File:LongValley Strat.pdf | Open Energy Information  

Open Energy Info (EERE)

LongValley Strat.pdf Jump to: navigation, search File File history File usage Metadata File:LongValley Strat.pdf Size of this preview: 800 515 pixels. Full resolution (830 ...

248

File:RAPID Single Slide.pdf | Open Energy Information  

Open Energy Info (EERE)

Single Slide.pdf Jump to: navigation, search File File history File usage Metadata File:RAPID Single Slide.pdf Size of this preview: 776 600 pixels. Go to page 1 2 Go next page...

249

File:01TXALandUsePlanning.pdf | Open Energy Information  

Open Energy Info (EERE)

file using an external application (See the setup instructions for more information) File usage The following page links to this file: RAPIDRoadmap1-TX-a Metadata This file...

250

File:Methane.pdf | Open Energy Information  

Open Energy Info (EERE)

Methane.pdf Methane.pdf Jump to: navigation, search File File history File usage File:Methane.pdf Size of this preview: 448 × 600 pixels. Go to page 1 2 3 4 5 Go! next page → next page → Full resolution ‎(1,218 × 1,630 pixels, file size: 929 KB, MIME type: application/pdf, 5 pages) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 15:51, 9 February 2012 Thumbnail for version as of 15:51, 9 February 2012 1,218 × 1,630, 5 pages (929 KB) Graham7781 (Talk | contribs) You cannot overwrite this file. Edit this file using an external application (See the setup instructions for more information) File usage The following page links to this file: Hydraulic Fracturing Retrieved from "http://en.openei.org/w/index.php?title=File:Methane.pdf&oldid=404017"

251

File:600.pdf | Open Energy Information  

Open Energy Info (EERE)

.pdf .pdf Jump to: navigation, search File File history File usage File:600.pdf Size of this preview: 463 × 599 pixels. Other resolution: 464 × 600 pixels. Go to page 1 2 3 4 5 6 7 Go! next page → next page → Full resolution ‎(1,275 × 1,650 pixels, file size: 497 KB, MIME type: application/pdf, 7 pages) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 11:53, 5 October 2012 Thumbnail for version as of 11:53, 5 October 2012 1,275 × 1,650, 7 pages (497 KB) Dklein2012 (Talk | contribs) You cannot overwrite this file. Edit this file using an external application (See the setup instructions for more information) File usage There are no pages that link to this file. Retrieved from "http://en.openei.org/w/index.php?title=File:600.pdf&oldid=52071

252

What is Security? A perspective on achieving security  

SciTech Connect

This presentation provides a perspective on achieving security in an organization. It touches upon security as a mindset, ability to adhere to rules, cultivating awareness of the reason for a security mindset, the quality of a security program, willingness to admit fault or acknowledge failure, peer review in security, science as a model that can be applied to the security profession, the security vision, security partnering, staleness in the security program, security responsibilities, and achievement of success over time despite the impossibility of perfection.

Atencio, Julian J.

2014-05-05T23:59:59.000Z

253

Lemnos Interoperable Security Program  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Lemnos Interoperable Security Program Lemnos Interoperable Security Program Creating common language and metrics for describing functions of network security tools and testing for interoperability As energy control systems employ more Internet-based features and routable communication methods, the need grows for enhanced security functions, such as firewalls, virtual private networks (VPNs), and intrusion detection systems. When purchasing network security products, today's control systems users cannot adequately compare products from different vendors because the industry lacks a widely accepted mechanism for evaluating functionality, performance,

254

Security | Argonne National Laboratory  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Security Nonproliferation and Nuclear Forensics Decision Science Sensors and Materials Security Enhancing national and homeland security requires technological advancements in everything from biosensors to risk assessments. Game-changing scientific discovery is required for the development of sensors, detectors and other technological advancements used to protect and defend our country. At Argonne, our highly collaborative community of scientists and engineers discover and develop critical security and defense technologies to prevent and mitigate events with the potential for mass disruption or destruction, thereby protecting our citizens and our national interests. Our goal is to make America a safer place through innovations in threat decision science, sensors and materials, infrastructure assurance,

255

T-674: Drupal Secure Password Hashes Module Security Bypass Vulnerability |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

74: Drupal Secure Password Hashes Module Security Bypass 74: Drupal Secure Password Hashes Module Security Bypass Vulnerability T-674: Drupal Secure Password Hashes Module Security Bypass Vulnerability July 22, 2011 - 3:00pm Addthis PROBLEM: Drupal Secure Password Hashes Module Security Bypass Vulnerability PLATFORM: Drupal Secure Password Hashes 6.X-1.0 Drupal Secure Password Hashes 5.X-1.4 ABSTRACT: The Secure Password Hashes module for Drupal is prone to a security-bypass vulnerability. reference LINKS: Drupal Homepage SA-CONTRIB-2011-026 - Secure Password Hashes (phpass) - Multiple Vulnerabilities IMPACT ASSESSMENT: Medium Discussion: This module uses the PHPass hashing library to try to store users hashed passwords securely. The module sets a fixed string for the 'pass' column in the {users} database column but does not replace the pass attribute of the account

256

T-569: Adobe Flash SWF File Processing Memory Corruption Remote Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Adobe Flash SWF File Processing Memory Corruption Remote 9: Adobe Flash SWF File Processing Memory Corruption Remote Code Execution Vulnerability T-569: Adobe Flash SWF File Processing Memory Corruption Remote Code Execution Vulnerability March 3, 2011 - 3:05pm Addthis PROBLEM: Adobe Flash Player contains a vulnerability that could allow an unauthenticated, remote attacker to execute arbitrary code on a targeted system. PLATFORM: Adobe Flash Player versions 10.1.102.64 and prior ABSTRACT: Critical vulnerabilities have been identified in Adobe Flash Player 10.1.102.64 and earlier versions for Windows, Macintosh, Linux, and Solaris. These vulnerabilities could cause the application to crash and could potentially allow an attacker to take control of the affected system. reference LINKS: Cisco IntelliShield ID:22576 Adobe Security Update: APSB11-02

257

T-569: Adobe Flash SWF File Processing Memory Corruption Remote Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Adobe Flash SWF File Processing Memory Corruption Remote 9: Adobe Flash SWF File Processing Memory Corruption Remote Code Execution Vulnerability T-569: Adobe Flash SWF File Processing Memory Corruption Remote Code Execution Vulnerability March 3, 2011 - 3:05pm Addthis PROBLEM: Adobe Flash Player contains a vulnerability that could allow an unauthenticated, remote attacker to execute arbitrary code on a targeted system. PLATFORM: Adobe Flash Player versions 10.1.102.64 and prior ABSTRACT: Critical vulnerabilities have been identified in Adobe Flash Player 10.1.102.64 and earlier versions for Windows, Macintosh, Linux, and Solaris. These vulnerabilities could cause the application to crash and could potentially allow an attacker to take control of the affected system. reference LINKS: Cisco IntelliShield ID:22576 Adobe Security Update: APSB11-02

258

PSH-11-0036 - In the Matter of Personnel Security Hearing | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1-0036 - In the Matter of Personnel Security Hearing 1-0036 - In the Matter of Personnel Security Hearing PSH-11-0036 - In the Matter of Personnel Security Hearing The Individual is employed by a DOE contractor and has held an access authorization for several years. DOE Exhibit (Ex.) 6 at 1. Pursuant to an investigation, it was discovered that the Individual, for a second period of time, had not filed state or federal tax returns. Ex. 4 at 1-2. This discovery prompted the Local Security Office (LSO) to conduct a Personnel Security Interview (PSI) with the Individual in October 2011. Ex. 5. After conducting the October 2011 PSI with the Individual, the LSO informed the Individual in a November 2011 notification letter (Notification Letter) that derogatory information existed that raised security concerns under 10

259

PSH-11-0039 - In the Matter of Personnel Security Hearing | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1-0039 - In the Matter of Personnel Security Hearing 1-0039 - In the Matter of Personnel Security Hearing PSH-11-0039 - In the Matter of Personnel Security Hearing The individual is an employee of a DOE contractor and holds a suspended access authorization. On September 8, 2011, the individual notified the DOE that the Internal Revenue Service (IRS) began garnishing his wages in August 2011, due to his failure to file a 2006 federal tax return. Exhibit 7. A Local Security Office (LSO) summoned the individual for an interview (PSI) with a personnel security specialist on September 28, 2011. Exhibit 7. After the PSI, the LSO determined that derogatory information existed that cast into doubt the individual's eligibility for access authorization. The LSO informed the individual of this determination in a letter that set forth the DOE's security concerns and the reasons for

260

PSH-11-0034 - In the Matter of Personnel Security Hearing | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

34 - In the Matter of Personnel Security Hearing 34 - In the Matter of Personnel Security Hearing PSH-11-0034 - In the Matter of Personnel Security Hearing The Individual is employed by a DOE contractor and has held a DOE access authorization for several years. DOE Ex. 3. In August 2011, the Individual timely reported to the Local Security Office (LSO) her arrest for Driving Under the Influence (DUI) of alcohol. DOE Ex. 10. The incident prompted a September 2011 Personnel Security Interview (PSI). DOE Ex. 11. After the PSI, the LSO referred the Individual to a DOE consultant-psychiatrist ("the DOE psychiatrist") for an evaluation. The DOE psychiatrist evaluated the Individual in October 2011 and issued a report. DOE Ex. 8. After reviewing the Individual's personnel security file, the LSO informed the Individual in a November 2011 Notification Letter that there

Note: This page contains sample records for the topic "586-1076 secure file" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

PSH-12-0044 - In the Matter of Personnel Security Hearing | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

44 - In the Matter of Personnel Security Hearing 44 - In the Matter of Personnel Security Hearing PSH-12-0044 - In the Matter of Personnel Security Hearing The Individual is a contractor employee at a DOE facility and has possessed a security clearance on various occasions since 1978. Exhibit (Ex.) 8 at 2. In December 2011, the Individual reported to the Local Security Office (LSO) that his wages were being garnished for back federal taxes. Ex. 13 at 1. Consequently, the LSO conducted a personnel security interview (PSI) with the Individual in January 2012. Ex. 15. Because the PSI and further investigation indicated that the Individual had not filed state and federal tax returns for several years and had a number of delinquent financial accounts, the LSO informed the Individual in a March 2012 notification

262

Instructions for using read_cips_file.sav to read CIPS data files Last updated 29 June 2011  

E-Print Network (OSTI)

Instructions for using read_cips_file.sav to read CIPS data files Last updated 29 June 2011 The file read_cips_file.sav is provided as a convenience for IDL users to read CIPS netcdf data files for levels 2 (orbit strips) and 3a (daily daisies). (1) Download the CIPS data files into a convenient

Mojzsis, Stephen J.

263

Safeguards and Security and Cyber Security RM  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Safeguards and Security and Safeguards and Security and Cyber Security Review Module March 2010 CD- -0 OFFICE O S CD-1 OF ENVIRO Standard Safeguar and Cy Rev Critical D CD-2 M ONMENTA Review Pla rds and S yber Secu view Modul Decision (CD CD March 2010 AL MANAG an (SRP) Security urity le D) Applicabili D-3 GEMENT ity CD-4 Post Ope eration Standard Review Plan, 2 nd Edition, March 2010 i FOREWORD The Standard Review Plan (SRP) 1 provides a consistent, predictable corporate review framework to ensure that issues and risks that could challenge the success of Office of Environmental Management (EM) projects are identified early and addressed proactively. The internal EM project review process encompasses key milestones established by DOE O 413.3A, Change 1, Program and Project Management for the Acquisition of Capital Assets, DOE-STD-

264

File:Susquehannariver.pdf | Open Energy Information  

Open Energy Info (EERE)

Susquehannariver.pdf Susquehannariver.pdf Jump to: navigation, search File File history File usage File:Susquehannariver.pdf Size of this preview: 776 × 600 pixels. Go to page 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 Go! next page → next page → Full resolution ‎(1,650 × 1,275 pixels, file size: 2.11 MB, MIME type: application/pdf, 24 pages) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 15:56, 9 February 2012 Thumbnail for version as of 15:56, 9 February 2012 1,650 × 1,275, 24 pages (2.11 MB) Graham7781 (Talk | contribs) You cannot overwrite this file. Edit this file using an external application (See the setup instructions for more information) File usage The following page links to this file:

265

Instructions to CBECS 1992 Microdata Files  

Gasoline and Diesel Fuel Update (EIA)

2 Public Data 2 Public Data 1992 CBECS Public Use Data The 18 Public Use Data files of the 1992 Commercial Buildings Energy Consumption Survey (CBECS) data are available in ASCII (i.e. CE92F01T.TXT) and dBASE (CE92F01D.DBF) formats. These files contain the 1992 CBECS basic data including building characteristics, energy consumption and expenditures, and temperature data. The files can be accessed below. The data have been compressed into zip files with an extension of zip. After downloading the files, they should be placed in a separate directory and expanded by using a pkunzip program (also available below). Readme.TXT Information on the 1992 CBECS Public Use Data C920105T.ZIP and C920105D.ZIP contain the following files: File 1: CE92F01T.TXT General Building Information

266

SEDS CSV File Documentation: Price and Expenditure  

Gasoline and Diesel Fuel Update (EIA)

Prices and Expenditures Prices and Expenditures The State Energy Data System (SEDS) comma-separated value (CSV) files contain the price and expenditure estimates shown in the tables located on the SEDS website. There are three files that contain estimates for all states and years. Prices contains the price estimates for all states and Expenditures contains the expenditure estimates for all states. The third file, Adjusted Consumption for Expenditure Calculations contains adjusted consumption estimates used in calculating expenditures (see Appendix E below). Zip files are also available for the large data files. In addition, there is a CSV file for each state, named with the two-letter U.S. Postal Code listed in Appendix A, as well as a file for the United States.

267

TO: FILE FROM: I SUBJECT:  

Office of Legacy Management (LM)

TO: FILE TO: FILE FROM: I .- SUBJECT: 9EEEW Pos$:&&~ rk/ErvlK& @orzb Current: Lov?r_ &%2J*l&o3?fi; Owner contacted 0 yes &no; if yes, date contacted . TYPE OF OPERATION ----------------- q Research & Development @ Facility Type 0 Production scale testing 0 Pilot Scale & rlanuf acturing 0 Bench Scale Process 0 University 0 Theoretical Studies 0 Research Organizatil 0 Sample SC Analysis 0 Government Sponsarec 0 Other -------------_ q Production 0 Disposal /Storage TYPE CIF CONTRACT ~------_~-~----_ q Prime 0 0 Subcontract& Other information (i.e. 0 Purchase Order + fixed fee, unit prier time 81 material, t+tc:)-- ------------w-----z-. Contract/Purchase Order #-&)A (c& YJ c -7 / -t 4,&>~c-~7~7------ --- -7

268

Splitting and Confirming Large File  

NLE Websites -- All DOE Office Websites (Extended Search)

Splitting and Confirming Large File Splitting and Confirming Large File Name: Bradley C. Status: Student Age: 16 Location: N/A Country: N/A Date: June 2003 Question: I just calculated one billion digits of pi on my PC, how do I confirm them? I cannot access them because the file size is 1.28 GB, my ram is only 512 MB, meaning none of my word processor's will touch it. Is it possible to split the document, somehow? Then how do I confirm the digits? Replies: Checking the correctness of large numbers -- transcendental numbers like 'pi', or a large prime -- is not easy because there are many sources of error that are difficult to detect, or track down. Some, but by no means all are: 1. How "good" (that is convergent) is the algorithm? If, for example the algorithm is some sort of infinite series, there is always a truncation error, because you cannot compute an infinite number of terms in a finite amount of time. The further out you go in the algorithm, the more significant these errors become.

269

Secure upgrade of hardware security modules in bank networks  

Science Journals Connector (OSTI)

We study the secure upgrade of critical components in wide networked systems, focussing on the case study of PIN processing Hardware Security Modules (HSMs). These tamper-resistant devices, used by banks to securely transmit and verify the PIN typed ... Keywords: PIN processing, hardware security modules, security APIs, upgrade strategies

Riccardo Focardi; Flaminia L. Luccio

2010-03-01T23:59:59.000Z

270

National Nuclear Security Administration | Department of Energy  

Office of Environmental Management (EM)

National Nuclear Security Administration National Nuclear Security Administration National Nuclear Security Administration More Documents & Publications Global Threat Reduction...

271

Waste Isolation Pilot Plant Transportation Security | Department...  

Office of Environmental Management (EM)

Waste Isolation Pilot Plant Transportation Security Waste Isolation Pilot Plant Transportation Security Waste Isolation Pilot Plant Transportation Security More Documents &...

272

SECURITY TERMINATION STATEMENT | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

SECURITY TERMINATION STATEMENT SECURITY TERMINATION STATEMENT Form provides an individual's statement in connection with the termination of access authorization (security...

273

Office of Security Operations  

NLE Websites -- All DOE Office Websites (Extended Search)

Office of Physical Protection Office of Physical Protection Bill Dwyer Director, 202-586-7887 Mission The mission of the Office of Physical Protection is to implement and oversee dedicated human resources, processes, and equipment designed to protect personnel and assets entrusted to our care at Department of Energy (DOE) Headquarters facilities. The Office is comprised of dedicated DOE Federal security professionals, Headquarters Protective Force personnel, and Alarms and Access Control Technicians. These security subject matter experts work together to ensure compliance with DOE Safeguards and Security regulations, Interagency Security Committee guidance, and federal laws. The result of this collaboration is a security program designed to ensure a safe and secure working environment for all Headquarters employees.

274

National Security Science Archive  

NLE Websites -- All DOE Office Websites (Extended Search)

National Security Science » National Security Science » NSS Archive National Security Science magazine Latest Issue:April 2013 All Issues » submit National Security Science Archive Using its broad and unique scientific and engineering capabilities, the Laboratory solves a diverse set of challenges to national and global security and the weapons programs. National Security Science magazine showcases the breadth and depth of the Laboratory's scientific and technical work to policy makers, the general public, academia, and scientific and technical experts. past issues cover Issue 2 2012 interactive | web | pdf past issues cover Issue 1 2012 interactive | web | pdf past issues cover Issue 3 2011 web | pdf past issues cover Issue 2 2011 web | pdf past issues cover Issue 1 2011 web | pdf past issues cover

275

PNNL: Security & Privacy  

NLE Websites -- All DOE Office Websites (Extended Search)

Security & Privacy Security & Privacy Thank you for visiting the Pacific Northwest National Laboratory (PNNL) website (pnnl.gov) and reviewing our security and privacy policies. The following policies apply to all pages and sites in the pnnl.gov domain, unless otherwise noted. Security Notice This website is part of a Federal computer system used to accomplish Federal functions. The Department of Energy monitors this website for security purposes to ensure it remains available to all users and to protect information in the system. By accessing this website, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features, to use the system for other than intended purposes, to deny service to authorized users, to access, obtain, alter, damage, or destroy information, or

276

Security Topic Group  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Group Group Security and TEC * Tension exists between open forum concept of TEC and the ability of STG members to discuss security topics. - DOE will maintain the open forum - it will not form a subgroup of cleared members NAS Study * Some members want STG to formally recommend a fully independent review of security issues - DOE is reviewing the NAS study and has not formulated a position Security Topic Group (Continued) Classification Guide & Information Sharing Protocol * Guide is finished and undergoing internal concurrence - Slated for late September release * Protocol will be completed once the guide is issued Security-Related Lessons Learned * Lessons learned document was distributed and comments requested by the end of March Security Topic Group (Continued) SRG/CVSA Survey

277

Operational Security (OPSEC) Reminder | Department of Energy  

Office of Environmental Management (EM)

Operational Security (OPSEC) Reminder Operational Security (OPSEC) Reminder June 3, 2014 - 1:24pm Addthis Operational Security (OPSEC) Reminder Operational Security (OPSEC)...

278

US, UK, Kazakhstan Secure Radiological Transportation Vehicles...  

National Nuclear Security Administration (NNSA)

place them in secure storage, and improve radiological transportation security and site security. The United Kingdom-funded projects provide an immediate security and safety...

279

College of Safety & Security | Department of Energy  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Safety & Security College of Safety & Security College of Safety & Security Mission Through the National Training Center (NTC), the Office of Health, Safety and Security (HSS)...

280

Office of Security | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security Office of Security Mission The Office of Security maintains the Department of Energy's security integrity through the development and promulgation of safeguards and...

Note: This page contains sample records for the topic "586-1076 secure file" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

Safeguards and Security Program - DOE Directives, Delegations...  

NLE Websites -- All DOE Office Websites (Extended Search)

70.1A, Safeguards and Security Program by jcowden Functional areas: Safeguards, Security, and Emergency Management, Safety and Security The Safeguards and Security Program ensures...

282

Office of Security Enforcement | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Enforcement Office of Security Enforcement MISSION The Office of Security Enforcement implements the Department's classified information security enforcement program in...

283

Industrial Security Specialst  

Energy.gov (U.S. Department of Energy (DOE))

A successful candidate in this position will serve in a developmental capacity assisting senior specialists in carrying out a variety of industrial security and oversight functions.

284

Energy Security Initiatives Update  

Energy.gov (U.S. Department of Energy (DOE))

Presentationgiven at the Spring 2009 Federal Utility Partnership Working Group (FUPWG) meetinglists Federal government energy security initiatives.

285

Industrial and Grid Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Industrial and Grid Security Establishing resilient infrastructures that operate when sensors and physical assets are perturbed is an important national objective. Two related LDRD...

286

National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

University of California Extend Management Contracts For Defense Labs The Department of Energy (DOE), the National Nuclear Security Administration (NNSA) and the University of...

287

Securing Cloud Storage Service.  

E-Print Network (OSTI)

?? Cloud computing brought flexibility, scalability, and capital cost savings to the IT industry. As more companies turn to cloud solutions, securing cloud based services (more)

Zapolskas, Vytautas

2012-01-01T23:59:59.000Z

288

Cyber Security Architecture Guidelines  

Directives, Delegations, and Requirements

This Guide provides supplemental information on the implementation of cyber security architectures throughout the Department of Energy. Canceled by DOE N 205.18

2001-03-08T23:59:59.000Z

289

TEC Information Security  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

External Coordination Working Group Information Security E. Ralph Smith, Manager Institutional Programs April 22, 2004 Albuquerque, NM WIPP * Open communications * Notifications *...

290

National Security Initiatives | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Our Primary Thrusts A science-based approach to cyber security Develop breakthrough nuclear forensic science Expand bioinformatics program to address critical biosurveillance gaps...

291

2014 Headquarters Facilities Master Security Plan- Chapter 1, Physical Security  

Energy.gov (U.S. Department of Energy (DOE))

2014 Headquarters Facilities Master Security Plan - Chapter 1, Physical Security Describes DOE Headquarters Physical Security procedures related to badges, inspections, access controls, visitor controls, and removal of government property.

292

Tag: Global Security | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Global Security Global Security Tag: Global Security Displaying 1 - 10 of 61... Category: Global Security Ultrasonic cleaner cuts costs, enhances safety The process of upgrading an old cleaning unit revealed how things were once done and the advances that have followed. More... Category: Global Security Well Logging Security Initiatives GTRI demonstrates the threat to the security of (oil) well logging systems and outlines the initiatives that are enhancing the security of these sources worldwide. More... Category: Global Security Y-12 Receives Two R&D 100 Awards Engineers at the National Nuclear Security Administration's Y-12 National Security Complex have won two R&D 100 Awards. More... Category: Global Security Y-12 researchers garner R&D 100 awards A research chemist and his revolutionary cloth invented to clean surfaces

293

The Office of Nuclear Safeguards and Security | National Nuclear Security  

National Nuclear Security Administration (NNSA)

Safeguards and Security | National Nuclear Security Safeguards and Security | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The Office of Nuclear Safeguards and Security Home > About Us > Our Programs > Nonproliferation > Nonproliferation & International Security > The Office of Nuclear Safeguards and Security The Office of Nuclear Safeguards and Security

294

Security Assistance | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security Assistance Security Assistance Security Assistance Welcome to Security Assistance Samuel N. Callahan, Director Mission and Functions The Office of Health, Safety, and Security (HSS) created the Office of Security Assistance Program to provide timely technical assistance and system support to field and Headquarters elements to enhance site security programs, upon request. The program is comprised of technologists and subject matter experts from all security disciplines including Program Management, Protection Program Operations, Information Security, Materials Control and Accountability, and Personnel Security. HSS is committed to building a security assistance program to serve the interests of the Department based upon the needs of our customers - with emphasis on customer-focus and meeting multi-disciplinary security needs. In Fiscal

295

Departmental Cyber Security Management Policy  

Directives, Delegations, and Requirements

The Departmental Cyber Security Management (DCSM) Policy was developed to further clarify and support the elements of the Integrated Safeguards and Security Management (ISSM) Policy regarding cyber security. Certified 9-23-10. No cancellation.

2001-05-08T23:59:59.000Z

296

File  

U.S. Energy Information Administration (EIA) Indexed Site

2,"Alabama","Alabama","Electric Power Sector","Railroad",495478 2,"Alabama","Alabama","Electric Power Sector","Railroad",495478 2013,2,"Alabama","Alabama","Coke Plant","Railroad",116028 2013,2,"Alabama","Alabama","Industrial Plants Excluding Coke","Railroad",26409 2013,2,"Alabama","Alabama","Electric Power Sector","River",511695 2013,2,"Alabama","Alabama","Industrial Plants Excluding Coke","River",1588 2013,2,"Alabama","Alabama","Electric Power Sector","Truck",58856 2013,2,"Alabama","Alabama","Coke Plant","Truck",94157 2013,2,"Alabama","Alabama","Industrial Plants Excluding Coke","Truck",272760

297

File  

U.S. Energy Information Administration (EIA) Indexed Site

1,"Alabama","Alabama","Electric Power Sector","Railroad",448583 1,"Alabama","Alabama","Electric Power Sector","Railroad",448583 2013,1,"Alabama","Alabama","Coke Plant","Railroad",71299 2013,1,"Alabama","Alabama","Industrial Plants Excluding Coke","Railroad",14493 2013,1,"Alabama","Alabama","Electric Power Sector","River",358269 2013,1,"Alabama","Alabama","Coke Plant","Truck",87126 2013,1,"Alabama","Alabama","Industrial Plants Excluding Coke","Truck",267108 2013,1,"Alabama","Indiana","Coke Plant","Railroad",164223 2013,1,"Alabama","Kentucky","Industrial Plants Excluding Coke","River",6042

298

File  

U.S. Energy Information Administration (EIA) Indexed Site

4,"Alabama","Alabama","Electric Power Sector","Railroad",802677 4,"Alabama","Alabama","Electric Power Sector","Railroad",802677 2012,4,"Alabama","Alabama","Coke Plant","Railroad",17349 2012,4,"Alabama","Alabama","Industrial Plants Excluding Coke","Railroad",22271 2012,4,"Alabama","Alabama","Electric Power Sector","River",384071 2012,4,"Alabama","Alabama","Electric Power Sector","Truck",39426 2012,4,"Alabama","Alabama","Coke Plant","Truck",144411 2012,4,"Alabama","Alabama","Industrial Plants Excluding Coke","Truck",252085 2012,4,"Alabama","Georgia","Electric Power Sector","Truck",6

299

File  

U.S. Energy Information Administration (EIA) Indexed Site

1,"Alabama","Alabama","Coke Plant","Railroad",71299 1,"Alabama","Alabama","Coke Plant","Railroad",71299 2013,1,"Alabama","Alabama","Coke Plant","Truck",87126 2013,1,"Alabama","Alabama","Electric Power Sector","Railroad",448583 2013,1,"Alabama","Alabama","Electric Power Sector","River",358269 2013,1,"Alabama","Alabama","Industrial Plants Excluding Coke","Railroad",14493 2013,1,"Alabama","Alabama","Industrial Plants Excluding Coke","Truck",267108 2013,1,"Alabama","Colorado","Electric Power Sector","Railroad",203781 2013,1,"Alabama","Illinois","Electric Power Sector","River",129358

300

File  

U.S. Energy Information Administration (EIA) Indexed Site

1,"Alabama","Alabama","Electric Power Sector","Railroad",800913 1,"Alabama","Alabama","Electric Power Sector","Railroad",800913 2012,1,"Alabama","Alabama","Coke Plant","Railroad",8914 2012,1,"Alabama","Alabama","Industrial Plants Excluding Coke","Railroad",35029 2012,1,"Alabama","Alabama","Electric Power Sector","River",519184 2012,1,"Alabama","Alabama","Electric Power Sector","Truck",50499 2012,1,"Alabama","Alabama","Coke Plant","Truck",174999 2012,1,"Alabama","Alabama","Industrial Plants Excluding Coke","Truck",240989 2012,1,"Alabama","Georgia","Industrial Plants Excluding Coke","Truck",419

Note: This page contains sample records for the topic "586-1076 secure file" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

File  

U.S. Energy Information Administration (EIA) Indexed Site

2013,3,"Alabama","Alabama","Coke Plant","Truck",125381 2013,3,"Alabama","Alabama","Electric Power Sector","Railroad",796189 2013,3,"Alabama","Alabama","Electric Power...

302

File  

U.S. Energy Information Administration (EIA) Indexed Site

9810 2013,1,"Alabama","Colorado","Electric Power Sector","Railroad",203781 2013,1,"Alabama","Illinois","Electric Power Sector","Railroad",44329 2013,1,"Alabama","Illinois","Electri...

303

File  

U.S. Energy Information Administration (EIA) Indexed Site

2012,4,"Alabama","Alabama","Coke Plant","Truck",144411 2012,4,"Alabama","Alabama","Electric Power Sector","Railroad",802677 2012,4,"Alabama","Alabama","Electric Power...

304

File  

U.S. Energy Information Administration (EIA) Indexed Site

2014,2,"Alabama","Alabama","Coke Plant","Truck",97501 2014,2,"Alabama","Alabama","Electric Power Sector","Railroad",95016 2014,2,"Alabama","Alabama","Electric Power...

305

File  

U.S. Energy Information Administration (EIA) Indexed Site

","Alaska","Industrial Plants Excluding Coke","Truck",261 2013,1,"Arizona","Arizona","Electric Power Sector","Railroad",1749204 2013,1,"Arkansas","Oklahoma","Electric Power...

306

File  

U.S. Energy Information Administration (EIA) Indexed Site

2013,2,"Alabama","Alabama","Coke Plant","Truck",94157 2013,2,"Alabama","Alabama","Electric Power Sector","Railroad",495478 2013,2,"Alabama","Alabama","Electric Power...

307

File  

U.S. Energy Information Administration (EIA) Indexed Site

4,2,"Alabama","Alabama","Electric Power Sector","Railroad",95016 2014,2,"Alabama","Alabama","Coke Plant","Railroad",87406 2014,2,"Alabama","Alabama","Electric Power...

308

File  

U.S. Energy Information Administration (EIA) Indexed Site

1,"Alabama","Alabama","Coke Plant","Railroad",8914 1,"Alabama","Alabama","Coke Plant","Railroad",8914 2012,1,"Alabama","Alabama","Coke Plant","Truck",174999 2012,1,"Alabama","Alabama","Electric Power Sector","Railroad",800913 2012,1,"Alabama","Alabama","Electric Power Sector","River",519184 2012,1,"Alabama","Alabama","Electric Power Sector","Truck",50499 2012,1,"Alabama","Alabama","Industrial Plants Excluding Coke","Railroad",35029 2012,1,"Alabama","Alabama","Industrial Plants Excluding Coke","Truck",240989 2012,1,"Alabama","Colorado","Electric Power Sector","Railroad",82497

309

MEMORANDUM I TO: FILE DATE  

Office of Legacy Management (LM)

MEMORANDUM MEMORANDUM I TO: FILE DATE -----_-_- FaOM: ~~,~hkcid!,~- ' ALTERNATE CITY: I\ptw)a.yk --~---_--___-~--~---______ STATE: I current: ------------_------_-~~~~~ if yes, date contacted ____ TYPE OF OPERATION -_---_---------__ 0 Research & Development 6 Facility Type 0 Production scale testing 0 Pilat Scale 0 Bench Scale Process 0 Theoretical Studies Sample $ rraductian & Analysis a Manufacturing I 0 University I (1 Research Organization 0 Government Sponao&ed Facility 0 Cither I ----e------y-------- 0 Disposal/Storage TYPE OF CONTRACT --~_----~__~~~-- ' 0 Prime q Subcontract& q Purchase Order cl Other informatian (i.e., cost + fixed fee, unit pri'ce, time & material, qtc) ------- --------------------~------ Contract/Purchase Order #

310

Environmental Baseline File: National Transportation  

SciTech Connect

This Environmental Baseline File summarizes and consolidates information related to the national-level transportation of commercial spent nuclear fuel. Topics address include: shipmnents of commercial spent nuclear fuel based on mostly truck and mostly rail shipping scenarios; transportation routing for commercial spent nuclear fuel sites and DOE sites; radionuclide inventories for various shipping container capacities; transportation routing; populations along transportation routes; urbanized area population densities; the impacts of historical, reasonably foreseeable, and general transportation; state-level food transfer factors; Federal Guidance Report No. 11 and 12 radionuclide dose conversion factors; and national average atmospheric conditions.

NONE

1999-05-22T23:59:59.000Z

311

Colorado - Access Permit Application File Review Checklist |...  

Open Energy Info (EERE)

Checklist Jump to: navigation, search OpenEI Reference LibraryAdd to library General: Colorado - Access Permit Application File Review Checklist Author Colorado Department of...

312

WEATHERIZATION ANNUAL FILE WORKSHEET | Department of Energy  

Energy Savers (EERE)

is designed to gather specific detail related to the expenditures of the Weatherization grant. WEATHERIZATION ANNUAL FILE WORKSHEET More Documents & Publications DOE F 540.3 DOE F...

313

Small file aggregation in a parallel computing system  

DOE Patents (OSTI)

Techniques are provided for small file aggregation in a parallel computing system. An exemplary method for storing a plurality of files generated by a plurality of processes in a parallel computing system comprises aggregating the plurality of files into a single aggregated file; and generating metadata for the single aggregated file. The metadata comprises an offset and a length of each of the plurality of files in the single aggregated file. The metadata can be used to unpack one or more of the files from the single aggregated file.

Faibish, Sorin; Bent, John M.; Tzelnic, Percy; Grider, Gary; Zhang, Jingwang

2014-09-02T23:59:59.000Z

314

Safeguards and Security Program  

Directives, Delegations, and Requirements

The Safeguards and Security Program ensures that the Department of Energy efficiently and effectively meets all its obligations to protect Special Nuclear Material, other nuclear materials, classified matter, sensitive information, government property, and the safety and security of employees, contractors, and the general public. Cancels DOE P 470.1.

2010-12-29T23:59:59.000Z

315

Secure video communications system  

DOE Patents (OSTI)

A secure video communications system having at least one command network formed by a combination of subsystems. The combination of subsystems to include a video subsystem, an audio subsystem, a communications subsystem, and a control subsystem. The video communications system to be window driven and mouse operated, and having the ability to allow for secure point-to-point real-time teleconferencing.

Smith, Robert L. (Idaho Falls, ID)

1991-01-01T23:59:59.000Z

316

Information Security Program  

Directives, Delegations, and Requirements

Establishes an Information Security Program for the protection and control of classified and sensitive information. Extended until 5-11-06 by DOE N 251.63, dated 5-11-05. DOE O 471.2A, Information Security Program, dated 3/27/1997, extended by DOE N 251.57, dated 4/28/2004. Cancels: DOE O 471.2

1997-03-27T23:59:59.000Z

317

Incidents of Security Concern  

SciTech Connect

This presentation addresses incidents of security concern and an incident program for addressing them. It addresses the phases of an inquiry, and it divides incidents into categories based on severity and interest types based on whether security, management, or procedural interests are involved. A few scenarios are then analyzed according to these breakdowns.

Atencio, Julian J.

2014-05-01T23:59:59.000Z

318

Information Security Program  

Directives, Delegations, and Requirements

To establish the Department of Energy (DOE) Information Security Program and set forth policies, procedures and responsibilities for the protection and control of classified and sensitive information. The Information Security Program is a system of elements which serve to deter collection activities, This directive does not cancel another directive. Canceled by DOE O 471.2 of 9-28-1995.

1992-10-19T23:59:59.000Z

319

PRIVACY/SECURITY NOTICE  

NLE Websites -- All DOE Office Websites (Extended Search)

PRIVACY/SECURITY NOTICE PRIVACY/SECURITY NOTICE By continuing to use this system you indicate your awareness of and consent to the following terms and conditions of use. LOG OFF IMMEDIATELY if you do not agree to the conditions stated in this warning. SECURITY NOTICE This Web site is part of a Federal computer system used to accomplish Federal functions. The Department of Energy monitors this Web site for security purposes to ensure it remains available to all users and to protect information in the system. The system employs software programs to monitor network traffic to identify unauthorized activities. By accessing this Web site, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features; to use the system for other than intended purposes; to deny service to authorized

320

Securing Control Systems Modems  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Recommended Practice for Securing Recommended Practice for Securing Control System Modems January 2008 iii ABSTRACT This paper addresses an often overlooked "backdoor" into critical infrastructure control systems created by modem connections. A modem's connection to the public telephone system is similar to a corporate network connection to the Internet. By tracing typical attack paths into the system, this paper provides the reader with an analysis of the problem and then guides the reader through methods to evaluate existing modem security. Following the analysis, a series of methods for securing modems is provided. These methods are correlated to well-known networking security methods. iv ACKNOWLEDGEMENT This document was developed for the U.S. Department of Homeland

Note: This page contains sample records for the topic "586-1076 secure file" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

International Nuclear Security  

SciTech Connect

This presentation discusses: (1) Definitions of international nuclear security; (2) What degree of security do we have now; (3) Limitations of a nuclear security strategy focused on national lock-downs of fissile materials and weapons; (4) What do current trends say about the future; and (5) How can nuclear security be strengthened? Nuclear security can be strengthened by: (1) More accurate baseline inventories; (2) Better physical protection, control and accounting; (3) Effective personnel reliability programs; (4) Minimize weapons-usable materials and consolidate to fewer locations; (5) Consider local threat environment when siting facilities; (6) Implement pledges made in the NSS process; and (7) More robust interdiction, emergency response and special operations capabilities. International cooperation is desirable, but not always possible.

Doyle, James E. [Los Alamos National Laboratory

2012-08-14T23:59:59.000Z

322

Office of Security Operations: Headquarters Security Officers (HSO) Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Headquarters Security Officers (HSO) Program Headquarters Security Officers (HSO) Program Responsible Individual/Contact: Wayne Berkebile - (301) 903-1163 - D-320 Scope: The Headquarters Security Officer (HSO) Program was established in 1990 by the Under Secretary of Energy in order to improve communications between the Office of Headquarters Security Operations and component organizations within DOE Headquarters. It is governed by DOE Headquarters Order 472.1, Headquarters Security Officer Program, dated 3-19-2010. Each Headquarters element is required to appoint at least one HSO and an Alternate HSO. HSOs perform a wide variety of security-related functions within their element such as obtaining security badges and clearances, maintaining Security Areas, acquiring security equipment, implementing procedures for protecting classified and sensitive information, conducting security inquiries, and arranging for required security services.

323

Detecting and Mitigating Security Risks  

E-Print Network (OSTI)

______________________________________________________________________________________________________ 2 Introduction IT security threats are multiplying quickly. One reason is that sophisticated hacking. Second, while hacking once largely constituted an intellectual exercise for security enthusiasts, hacking

Fisher, Kathleen

324

ANNUAL SECURITY FIRE SAFETY REPORT  

E-Print Network (OSTI)

ANNUAL SECURITY AND FIRE SAFETY REPORT OCTOBER 1, 2013 DARTMOUTH COLLEGE http................................................................................................................................................................... 7 ANNUAL SECURITY REPORT........................................................................................................................9 PREPARATION OF THE REPORT AND DISCLOSURE OF CRIME STATISTICS

325

Energy Security | ornl.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

Energy Security SHARE Energy Security ORNL has supported the DOE Cybersecurity for Energy Delivery Systems (CEDS) program in making advances in cybersecurity capabilities for...

326

January 2007 SECURITY CONTROLS FOR  

E-Print Network (OSTI)

for their information systems. Security controls are the management, operational, and technical safeguards for their information systems. Security controls are the management, operational, and technical safeguards

327

Headquarters Facilities Master Security Plan  

Office of Environmental Management (EM)

Chapter 10-1 Chapter 10 Security Awareness Program This chapter describes the DOE HQ Security Awareness Program. It implements the requirements of: Title 32, CFR, Part 2001,...

328

Security and Privacy Notices | NREL  

NLE Websites -- All DOE Office Websites (Extended Search)

Security and Privacy Notices Security Notice This Web site is part of a Federal computer system used to accomplish Federal functions. The National Renewable Energy Laboratory...

329

Security Suites | ornl.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Suites Available by Internet Service Providers Comcast Comcast offers the Norton Security Suite with antivirus and firewall software for your protection, for no additional...

330

Facility Security Officer Contractor Toolcart  

NLE Websites -- All DOE Office Websites (Extended Search)

SNL SECURITY CONTACTS SNLNM Contacts SNLCA Contacts Function Contact Email Telephone Badge Office 505-284-3626 - Escorting security@sandia.gov 505-845-1321 Classification...

331

Chapter_14_Cyber_Security  

Office of Environmental Management (EM)

4 Cyber Security The DOE Cyber Security Program aims to protect the Department's diverse missions in a cost- effective manner; identify threats, risks, and mitigations; and remain...

332

T-577: Security Advisory for Adobe Flash Player, Adobe Reader and Acrobat |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Security Advisory for Adobe Flash Player, Adobe Reader and 7: Security Advisory for Adobe Flash Player, Adobe Reader and Acrobat T-577: Security Advisory for Adobe Flash Player, Adobe Reader and Acrobat March 14, 2011 - 4:05pm Addthis PROBLEM: There are reports that this vulnerability is being exploited in the wild in targeted attacks via a Flash (.swf) file embedded in a Microsoft Excel (.xls) file delivered as an email attachment. PLATFORM: Windows, Macintosh, Linux and Solaris ABSTRACT: A critical vulnerability exists in Adobe Flash Player 10.2.152.33 and earlier versions (Adobe Flash Player 10.2.154.13 and earlier for Chrome users) for Windows, Macintosh, Linux and Solaris operating systems, Adobe Flash Player 10.1.106.16 and earlier versions for Android, and the Authplay.dll component that ships with Adobe Reader and Acrobat X (10.0.1)

333

TSO-1108 - In the Matter of Personnel Security Hearing | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

TSO-1108 - In the Matter of Personnel Security Hearing TSO-1108 - In the Matter of Personnel Security Hearing TSO-1108 - In the Matter of Personnel Security Hearing The individual is an employee of a DOE contractor and held an access authorization until it was recently suspended. During a routine reinvestigation of the individual, he informed an Office of Personnel Management (OPM) investigator on February 16, 2011, that he had not filed federal or state income tax returns for several years. Exhibit 6 at 13. A Local Security Office (LSO) summoned the individual for an interview (PSI) with a personnel security specialist on June 23, 2011. Exhibit 9. The LSO ultimately determined that derogatory information existed that cast into doubt the individual's eligibility for access authorization. The LSO informed the individual of this determination in a letter that set forth

334

PSH-12-0123 - In the Matter of Personnel Security Hearing | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

23 - In the Matter of Personnel Security Hearing 23 - In the Matter of Personnel Security Hearing PSH-12-0123 - In the Matter of Personnel Security Hearing On February 15, 2013, an OHA Hearing Officer issued a decision in which he determined that the DOE should not restore an individual's access authorization. As security concerns under 10 CFR Part 710, a Local Security Office cited the individual's filing of a Chapter 7 bankruptcy petition in 2002, and the individual's more recent financial difficulties, including a number of delinquent debts, the largest of which was a $132,489 mortgage balance, payments on which were over 150 days past due. The Hearing Officer found that, while the individual had made some progress toward paying off his prior debts, significant debts remained unpaid, including his mortgage, and the individual had, in addition,

335

T-531: The WebVPN implementation on Cisco Adaptive Security Appliances  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

T-531: The WebVPN implementation on Cisco Adaptive Security T-531: The WebVPN implementation on Cisco Adaptive Security Appliances (ASA) 5500 T-531: The WebVPN implementation on Cisco Adaptive Security Appliances (ASA) 5500 January 10, 2011 - 8:33pm Addthis PROBLEM: The WebVPN implementation on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software before 8.2(3) PLATFORM: Listed Vunerable Platform Details ABSTRACT: The WebVPN implementation on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software before 8.2(3) permits the viewing of CIFS shares even when CIFS file browsing has been disabled, which allows remote authenticated users to bypass intended access restrictions via CIFS requests, aka Bug ID CSCsz80777. reference LINKS: CVE Vulnerability Details: CVE-2010-4680 NIST Vulnerability Summary for CVE-2010-4680

336

T-712: Red Hat Enterprise MRG Grid 2.0 security, bug fix and enhancement  

NLE Websites -- All DOE Office Websites (Extended Search)

712: Red Hat Enterprise MRG Grid 2.0 security, bug fix and 712: Red Hat Enterprise MRG Grid 2.0 security, bug fix and enhancement update T-712: Red Hat Enterprise MRG Grid 2.0 security, bug fix and enhancement update September 8, 2011 - 10:30am Addthis PROBLEM: A flaw was discovered in Cumin where it would log broker authentication credentials to the Cumin log file. A vulnerability was reported in Red Hat Enterprise MRG Grid. A local user can access the broker password. PLATFORM: Red Hat Enterprise MRG v2 for Red Hat Enterprise Linux (version 5) ABSTRACT: Red Hat Enterprise MRG Grid 2.0 security, bug fix and enhancement update. reference LINKS: RHSA-2011:1249-1 SecurityTracker Alert ID: 1026021 CVE-2011-2925 IMPACT ASSESSMENT: Medium Discussion: A local user exploiting this flaw could connect to the broker outside of Cumin's control and perform certain operations such as scheduling jobs,

337

PSH-12-0103 - In the Matter of Personnel Security Hearing | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

PSH-12-0103 - In the Matter of Personnel Security Hearing PSH-12-0103 - In the Matter of Personnel Security Hearing PSH-12-0103 - In the Matter of Personnel Security Hearing On November 5, 2012, an OHA Hearing Officer issued a decision in which he concluded that access authorization should not be granted to an individual. A Local Security Office denied access authorization to the individual because she demonstrated financial irresponsibility through (1) failing to file federal and state income taxes for seven years, Tax Year (TY) 2004 through TY 2010; (2) accruing unpaid federal tax liability of $37,619.37 and unpaid state tax liability of $6,885.00; and (3) claiming nine tax withholding allowances when she knew she should only claim one. Her behavior raised security concerns under Criterion L. After conducting a hearing and evaluating the

338

Privacy/Security Policy  

NLE Websites -- All DOE Office Websites (Extended Search)

Privacy/Security Privacy/Security Privacy/Security Policy This web site is part of a federal computer system used to accomplish federal functions. Read the following important privacy and security information carefully. Security Notice October 31, 2000 This web site is part of a federal computer system used to accomplish federal functions. The Department of Energy monitors this web site for security purposes to ensure that it remains available to all users and to protect information in the system. By accessing this web site, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features, to use the system for other than intended purposes, to deny service to authorized users, to access, obtain, alter, damage, or destroy information, or otherwise to interfere with the system or its operation are prohibited. Evidence of such acts may be disclosed to law enforcement authorities and result in criminal prosecution under the Computer Fraud and Abuse Act of 1986 (Pub. L. 99-474) and the National Information Infrastructure Protection Act of 1996 (Pub. L. 104-294), (18 U.S.C. 1030), or other applicable criminal laws.

339

File:TCEQ-10202.pdf | Open Energy Information  

Open Energy Info (EERE)

02.pdf 02.pdf Jump to: navigation, search File File history File usage Metadata File:TCEQ-10202.pdf Size of this preview: 463 × 599 pixels. Other resolution: 464 × 600 pixels. Full resolution ‎(1,275 × 1,650 pixels, file size: 29 KB, MIME type: application/pdf) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 09:15, 10 July 2013 Thumbnail for version as of 09:15, 10 July 2013 1,275 × 1,650 (29 KB) Abergfel (Talk | contribs) You cannot overwrite this file. Edit this file using an external application (See the setup instructions for more information) File usage There are no pages that link to this file. Metadata This file contains additional information, probably added from the digital

340

File:ExpeditedReview.pdf | Open Energy Information  

Open Energy Info (EERE)

ExpeditedReview.pdf ExpeditedReview.pdf Jump to: navigation, search File File history File usage File:ExpeditedReview.pdf Size of this preview: 463 × 599 pixels. Other resolution: 464 × 600 pixels. Full resolution ‎(1,275 × 1,650 pixels, file size: 64 KB, MIME type: application/pdf) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 18:20, 19 November 2012 Thumbnail for version as of 18:20, 19 November 2012 1,275 × 1,650 (64 KB) Dklein2012 (Talk | contribs) You cannot overwrite this file. Edit this file using an external application (See the setup instructions for more information) File usage There are no pages that link to this file. Retrieved from "http://en.openei.org/w/index.php?title=File:ExpeditedReview.pdf&oldid=538274

Note: This page contains sample records for the topic "586-1076 secure file" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

File:Ger geothermal form 1.pdf | Open Energy Information  

Open Energy Info (EERE)

File File Edit History Facebook icon Twitter icon » File:Ger geothermal form 1.pdf Jump to: navigation, search File File history File usage Metadata File:Ger geothermal form 1.pdf Size of this preview: 463 × 599 pixels. Other resolution: 464 × 600 pixels. Go to page 1 2 3 Go! next page → next page → Full resolution ‎(1,275 × 1,650 pixels, file size: 67 KB, MIME type: application/pdf, 3 pages) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 10:26, 25 October 2013 Thumbnail for version as of 10:26, 25 October 2013 1,275 × 1,650, 3 pages (67 KB) Abergfel (Talk | contribs) You cannot overwrite this file. Edit this file using an external application (See the setup instructions for more information)

342

File:TCEQ-10204.pdf | Open Energy Information  

Open Energy Info (EERE)

TCEQ-10204.pdf TCEQ-10204.pdf Jump to: navigation, search File File history File usage Metadata File:TCEQ-10204.pdf Size of this preview: 463 × 599 pixels. Other resolution: 464 × 600 pixels. Full resolution ‎(1,275 × 1,650 pixels, file size: 79 KB, MIME type: application/pdf) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 12:07, 2 July 2013 Thumbnail for version as of 12:07, 2 July 2013 1,275 × 1,650 (79 KB) Abergfel (Talk | contribs) You cannot overwrite this file. Edit this file using an external application (See the setup instructions for more information) File usage There are no pages that link to this file. Metadata This file contains additional information, probably added from the digital

343

File:03ORCEncroachment.pdf | Open Energy Information  

Open Energy Info (EERE)

ORCEncroachment.pdf ORCEncroachment.pdf Jump to: navigation, search File File history File usage File:03ORCEncroachment.pdf Size of this preview: 463 × 599 pixels. Other resolution: 464 × 600 pixels. Full resolution ‎(1,275 × 1,650 pixels, file size: 11 KB, MIME type: application/pdf) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 12:59, 28 September 2012 Thumbnail for version as of 12:59, 28 September 2012 1,275 × 1,650 (11 KB) Dklein2012 (Talk | contribs) You cannot overwrite this file. Edit this file using an external application (See the setup instructions for more information) File usage The following page links to this file: GRR/Flowcharts Retrieved from "http://en.openei.org/w/index.php?title=File:03ORCEncroachment.pdf&oldid=51882

344

File:StandardProcess.pdf | Open Energy Information  

Open Energy Info (EERE)

StandardProcess.pdf StandardProcess.pdf Jump to: navigation, search File File history File usage File:StandardProcess.pdf Size of this preview: 463 × 599 pixels. Other resolution: 464 × 600 pixels. Full resolution ‎(1,275 × 1,650 pixels, file size: 62 KB, MIME type: application/pdf) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 17:15, 19 November 2012 Thumbnail for version as of 17:15, 19 November 2012 1,275 × 1,650 (62 KB) Dklein2012 (Talk | contribs) You cannot overwrite this file. Edit this file using an external application (See the setup instructions for more information) File usage There are no pages that link to this file. Retrieved from "http://en.openei.org/w/index.php?title=File:StandardProcess.pdf&oldid=538266

345

File:08AKATransmission.pdf | Open Energy Information  

Open Energy Info (EERE)

AKATransmission.pdf AKATransmission.pdf Jump to: navigation, search File File history File usage File:08AKATransmission.pdf Size of this preview: 463 × 599 pixels. Other resolution: 464 × 600 pixels. Full resolution ‎(1,275 × 1,650 pixels, file size: 24 KB, MIME type: application/pdf) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 15:01, 11 January 2013 Thumbnail for version as of 15:01, 11 January 2013 1,275 × 1,650 (24 KB) Dfitzger (Talk | contribs) You cannot overwrite this file. Edit this file using an external application (See the setup instructions for more information) File usage The following page links to this file: GRR/Section 8-AK-a - Transmission Retrieved from "http://en.openei.org/w/index.php?title=File:08AKATransmission.pdf&oldid=57856

346

File:Denver Basin.pdf | Open Energy Information  

Open Energy Info (EERE)

Basin.pdf Basin.pdf Jump to: navigation, search File File history File usage File:Denver Basin.pdf Size of this preview: 463 × 599 pixels. Other resolution: 464 × 600 pixels. Full resolution ‎(1,275 × 1,650 pixels, file size: 625 KB, MIME type: application/pdf) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 11:00, 4 March 2013 Thumbnail for version as of 11:00, 4 March 2013 1,275 × 1,650 (625 KB) Alevine (Talk | contribs) You cannot overwrite this file. Edit this file using an external application (See the setup instructions for more information) File usage There are no pages that link to this file. Retrieved from "http://en.openei.org/w/index.php?title=File:Denver_Basin.pdf&oldid=5897

347

File:PublicNoticeApplicabilitytbl.pdf | Open Energy Information  

Open Energy Info (EERE)

PublicNoticeApplicabilitytbl.pdf PublicNoticeApplicabilitytbl.pdf Jump to: navigation, search File File history File usage Metadata File:PublicNoticeApplicabilitytbl.pdf Size of this preview: 463 × 599 pixels. Other resolution: 464 × 600 pixels. Full resolution ‎(1,275 × 1,650 pixels, file size: 50 KB, MIME type: application/pdf) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 15:40, 14 June 2013 Thumbnail for version as of 15:40, 14 June 2013 1,275 × 1,650 (50 KB) Apalazzo (Talk | contribs) You cannot overwrite this file. Edit this file using an external application (See the setup instructions for more information) File usage There are no pages that link to this file. Metadata This file contains additional information, probably added from the digital

348

File:06UTATransportation.pdf | Open Energy Information  

Open Energy Info (EERE)

UTATransportation.pdf UTATransportation.pdf Jump to: navigation, search File File history File usage File:06UTATransportation.pdf Size of this preview: 463 × 599 pixels. Other resolution: 464 × 600 pixels. Full resolution ‎(1,275 × 1,650 pixels, file size: 29 KB, MIME type: application/pdf) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 12:16, 30 August 2012 Thumbnail for version as of 12:16, 30 August 2012 1,275 × 1,650 (29 KB) Jnorris (Talk | contribs) You cannot overwrite this file. Edit this file using an external application (See the setup instructions for more information) File usage The following page links to this file: GRR/Section 6-UT-a - Transportation Retrieved from "http://en.openei.org/w/index.php?title=File:06UTATransportation.pdf&oldid=509115

349

File:INL-geothermal-wy.pdf | Open Energy Information  

Open Energy Info (EERE)

wy.pdf Jump to: navigation, search File File history File usage Wyoming Geothermal Resources Size of this preview: 751 600 pixels. Full resolution (4,566 3,647 pixels,...

350

File:TCEQ-20425.pdf | Open Energy Information  

Open Energy Info (EERE)

20425.pdf 20425.pdf Jump to: navigation, search File File history File usage Metadata File:TCEQ-20425.pdf Size of this preview: 463 × 599 pixels. Other resolution: 464 × 600 pixels. Full resolution ‎(1,275 × 1,650 pixels, file size: 19 KB, MIME type: application/pdf) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 09:13, 10 July 2013 Thumbnail for version as of 09:13, 10 July 2013 1,275 × 1,650 (19 KB) Abergfel (Talk | contribs) You cannot overwrite this file. Edit this file using an external application (See the setup instructions for more information) File usage There are no pages that link to this file. Metadata This file contains additional information, probably added from the digital

351

File:GWS-31.pdf | Open Energy Information  

Open Energy Info (EERE)

pdf pdf Jump to: navigation, search File File history File usage Metadata File:GWS-31.pdf Size of this preview: 463 × 599 pixels. Other resolution: 464 × 600 pixels. Go to page 1 2 Go! next page → next page → Full resolution ‎(1,275 × 1,650 pixels, file size: 126 KB, MIME type: application/pdf, 2 pages) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 11:48, 15 March 2013 Thumbnail for version as of 11:48, 15 March 2013 1,275 × 1,650, 2 pages (126 KB) Alevine (Talk | contribs) You cannot overwrite this file. Edit this file using an external application (See the setup instructions for more information) File usage There are no pages that link to this file. Metadata This file contains additional information, probably added from the digital

352

File:03IDDIndustrialLease.pdf | Open Energy Information  

Open Energy Info (EERE)

IDDIndustrialLease.pdf IDDIndustrialLease.pdf Jump to: navigation, search File File history File usage File:03IDDIndustrialLease.pdf Size of this preview: 463 × 599 pixels. Other resolution: 464 × 600 pixels. Full resolution ‎(1,275 × 1,650 pixels, file size: 24 KB, MIME type: application/pdf) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 18:37, 25 October 2012 Thumbnail for version as of 18:37, 25 October 2012 1,275 × 1,650 (24 KB) Dklein2012 (Talk | contribs) You cannot overwrite this file. Edit this file using an external application (See the setup instructions for more information) File usage The following page links to this file: GRR/Flowcharts Retrieved from "http://en.openei.org/w/index.php?title=File:03IDDIndustrialLease.pdf&oldid=530956"

353

File:Fut oilp 03.pdf | Open Energy Information  

Open Energy Info (EERE)

oilp 03.pdf Jump to: navigation, search File File history File usage Future Oil Resources and Country Oil Consumption (September 2005) Size of this preview: 800 585 pixels. Full...

354

File:USFWSList.pdf | Open Energy Information  

Open Energy Info (EERE)

USFWSList.pdf USFWSList.pdf Jump to: navigation, search File File history File usage Metadata File:USFWSList.pdf Size of this preview: 463 × 599 pixels. Other resolution: 464 × 600 pixels. Go to page 1 2 3 4 5 Go! next page → next page → Full resolution ‎(1,275 × 1,650 pixels, file size: 79 KB, MIME type: application/pdf, 5 pages) Summary US Fish and Wildlife Service Species List - Salt Wells Geothermal Drilling Project EA Licensing PD This file has been released into the public domain by the copyright holder, its copyright has expired, or it is ineligible for copyright. This applies worldwide. File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 12:43, 17 July 2013 Thumbnail for version as of 12:43, 17 July 2013 1,275 × 1,650, 5 pages (79 KB) Agentile (Talk | contribs) US Fish and Wildlife Service Species List - Salt Wells Geothermal Drilling Project EA

355

File:AEOearlyrelease.pdf | Open Energy Information  

Open Energy Info (EERE)

AEOearlyrelease.pdf AEOearlyrelease.pdf Jump to: navigation, search File File history File usage File:AEOearlyrelease.pdf Size of this preview: 463 × 599 pixels. Other resolution: 464 × 600 pixels. Go to page 1 2 3 4 5 6 7 8 9 10 11 12 Go! next page → next page → Full resolution ‎(1,275 × 1,650 pixels, file size: 254 KB, MIME type: application/pdf, 12 pages) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 13:37, 27 April 2011 Thumbnail for version as of 13:37, 27 April 2011 1,275 × 1,650, 12 pages (254 KB) Graham7781 (Talk | contribs) 15:18, 20 April 2011 Thumbnail for version as of 15:18, 20 April 2011 1,275 × 1,650, 12 pages (254 KB) Graham7781 (Talk | contribs) You cannot overwrite this file.

356

STANDARD DATA FILES FOR COMPUTER THERMAL SIMULATION  

E-Print Network (OSTI)

STANDARD DATA FILES FOR COMPUTER THERMAL SIMULATION OF SOLAR LOW ENERGY NON-RESIDENTIAL BUILDINGS has been collated into descriptions of standard buildings to provide starting points for designers); Weather File Analyses (6) Standard Model Building Descriptions 6 Testing of Model Buildings 7 Summary 7

Amor, Robert

357

GEOLOGICAL SURVEY OF CANADA OPEN FILE 7462  

E-Print Network (OSTI)

and the McArthur River uranium deposit, Athabasca Basin; Geological Survey of Canada, Open File 7462, 35 pGEOLOGICAL SURVEY OF CANADA OPEN FILE 7462 Alteration within the basement rocks associated with the P2 fault and the McArthur River uranium deposit, Athabasca Basin E.E. Adlakha, K. Hattori, G

358

National Security Information Systems (NSIS) -National Security Systems &  

NLE Websites -- All DOE Office Websites (Extended Search)

NSSA: National Security Information Systems NSSA: National Security Information Systems Nonproliferation & National Security (NPNS) Overview Technical Nonproliferation Policy Support Strategic Trade Control Review of export license applications Multilateral Export Control Arrangements Interdiction Engagement & Training INECP INSEP GIPP Safeguards Concepts and Approaches Human Capital Development Additional Protocol Technical Assistance National Security Systems & Assessments National Security Information Systems Vulnerability Assessment Team (VAT) Radiation Detection & Response (RDR) Contact NPNS Other Major Programs Work with Argonne Contact us For Employees Site Map Help Join us on Facebook Follow us on Twitter NE Division on Flickr Nonproliferation and National Security Program National Security Systems & Assessments

359

Core File Settings | Argonne Leadership Computing Facility  

NLE Websites -- All DOE Office Websites (Extended Search)

Core File Settings Core File Settings The following environment variables control core file creation and contents. Specify regular (non-script) jobs using the qsub argument --env (Note: two dashes). Specify script jobs (--mode script) using the --envs (Note: two dashes) or --exp_env (Note: two dashes) options of runjob. For additional information about setting environment variables in your job, visit http://www.alcf.anl.gov/user-guides/running-jobs#environment-variables. Generation The following environment variables control conditions of core file generation and naming: BG_COREDUMPONEXIT=1 Creates a core file when the application exits. This is useful when the application performed an exit() operation and the cause and location of the exit() is not known. BG_COREDUMPONERROR=1

360

2014 Headquarters Facilities Master Security Plan- Chapter 10, Security Awareness Program  

Energy.gov (U.S. Department of Energy (DOE))

2014 Headquarters Facilities Master Security Plan - Chapter 10, Security Awareness Program Describes the DOE Headquarters Security Awareness Program

Note: This page contains sample records for the topic "586-1076 secure file" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

2014 Headquarters Facilities Master Security Plan- Chapter 8, Operations Security Program  

Energy.gov (U.S. Department of Energy (DOE))

2014 Headquarters Facilities Master Security Plan - Chapter 8, Operations Security Program Describes the DOE Headquarters Operations Security (OPSEC) Program.

362

Information Security: Coordination of Federal Cyber Security Research and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security: Coordination of Federal Cyber Security Security: Coordination of Federal Cyber Security Research and Development Information Security: Coordination of Federal Cyber Security Research and Development GAO recommends that the Office of Science and Technology Policy establish timelines for developing a federal agenda for cyber security research. GAO also recommends that the Office of Management and Budget (OMB) issue guidance to agencies for providing cyber security research data to repositories. In commenting on a draft of this report, OMB stated that it would review the need for such guidance. Information Security: Coordination of Federal Cyber Security Research and Development More Documents & Publications Networking and Information Technology Research and Development Supplement to the President's Budget (February 2010)

363

Office of Headquarters Security Operations | Department of Energy  

Office of Environmental Management (EM)

Headquarters Security Operations Office of Headquarters Security Operations Mission The Office of Headquarters Security Operations strengthens national security by protecting...

364

MEMORANDU TO: FILE FHOM: SUBJECT:  

Office of Legacy Management (LM)

' .- _. I _ ' ' .- _. I _ ' 1.3 7 -3 , MEMORANDU TO: FILE FHOM: SUBJECT: Curre"t: Ll&k&&d ________ l- ; if yes, date contacted ___ 0 Production scale testing Cl Pilot Scale 0 Bench Scale Process 0 Theoretical Studies 0 Sample & Analysis 0 Production 0 Disposal /Storage TYPE OF CONTRACT --------------_- 0 Prime 13 Subcontract& 0 Purchase Order 0 Cl Facility Type 0 Manufacturing 0 University 0 Research Organization *i Government Sponsored Facility 0 Other --------------_-----_ Other information (i.e., cost + fixed fee, unit price, time & material, qtc) --------------------~~------ OWNERSHIP: AEC/UED AEWUED GOUT GOUT CONTRACTOR CONTRACTOR OWN!3 LEAS!32 @!NE_D LEEsE_n OWNED --_----___ --LEEEI) LANDS D 0 BUILDINGS EQUIPMENT : : cl 0

365

MEtlORANDUM TO: FILE  

Office of Legacy Management (LM)

\ \ MEtlORANDUM / TO: FILE "ATE--$ SUBJECT: ___ NfiME: ALTERNATE w-------- CITY:J!M ------------------ST~~=-i-!-~~- P Pest:-___----_____--______,__ Current: -----_-~~----~~~~~-------- Owner contacted 0 yes q no3 if yes, date contacted TYPE OF OPERATION ----------------- 0 Research & Development q Facility Type 0 Production scale testing 0 Pilot Scale q rlanuf ecturing 0 Bench Scale Process q University 0 Theor&i&l Studies 0 Research Organization 0 Sample & 'Anal*sis 0 Government Sponsored Facility M Other / -LLp&-+ ------- --- 0 Production ==~-++@L _ Cl Disposal/Storage d&&u IY!?~AELE!I~n_CI . - ~. .; 0 Prime 0 Subcontract& 0 Purchase Order 0 Other information (i.e., cost + fixed fee, unit price, time 84 material, etc)

366

MEPleRANDUM TO: FILE  

Office of Legacy Management (LM)

MEPleRANDUM MEPleRANDUM ( TO: FILE , , ------ --------iS"I;=~:ta,,,-;onFa;tedl/~~-r*z .-+a~* & 0 no; TYV= OF CP==ATION ---=-------aY----- 0 8:esearch & Develoyent B Facility Type Q Other information

367

BEM~RANDu~~ TO: FILE  

Office of Legacy Management (LM)

BEM~RANDu~~ BEM~RANDu~~ TO: FILE FROM: a. Rq- -__-----_- -_--- SUBJECT: cl;-; nAC; a-.. & ~3 -+.e-&&& SITE NAHE: CITY: M; /L-)-J L ce --_--__---__-~_~~~_-~~~~~~ STATE: WE -----_ OWNER(S) ------_- Past: ------------------------ Current: --_----_--_--------------- Owner ctx-atacted 0 yes 0 no) if ye8, date contacted ---__-------- TYPE OF OPERATION -_-__--_--_--_--_ 0 Research & Development w Facility Type 0 Production scale testing 0 Pilot Scale 0 Manufacturing (3 Bench Scale Process 0 University i Theoretical Studies 0 Research Organization 0 Governments Spans red Facility Sample 84 Analysir W Other --L%%z!k------~~-~ A.- 0 Production & Jrccj- dx& 0 Disposal/Storage 0 Prime 0 Subcontract& 0 Purchase Order cl Other information (i.e., cost

368

T-656: Microsoft Office Visio DXF File Handling Arbitrary Code...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Microsoft Office Visio DXF File Handling Arbitrary Code Execution Vulnerability T-656: Microsoft Office Visio DXF File Handling Arbitrary Code Execution Vulnerability June 28,...

369

T-569: Adobe Flash SWF File Processing Memory Corruption Remote...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

69: Adobe Flash SWF File Processing Memory Corruption Remote Code Execution Vulnerability T-569: Adobe Flash SWF File Processing Memory Corruption Remote Code Execution...

370

DOE Releases Filing Instructions for Federal Risk Insurance for...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Filing Instructions for Federal Risk Insurance for New Nuclear Power Plants DOE Releases Filing Instructions for Federal Risk Insurance for New Nuclear Power Plants December 21,...

371

OHA Product Efficiency Cases Archive File | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

file of our Product Efficiency decisions, Please download this file to your local computer and use the build in adobe search feature. Individual cases are listed in the...

372

OHA Whistleblower Cases Archive File | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

archive file of our Whistleblower decisions, Please download this file to your local computer and use the build in adobe search feature. Individual cases are listed in the...

373

Headquarters Security Quick Reference Book  

Energy.gov (U.S. Department of Energy (DOE))

This quick reference book provides an overview of Department of Energy (DOE) Headquarters (HQ) security programs.

374

November 2003 NETWORK SECURITY TESTING  

E-Print Network (OSTI)

November 2003 NETWORK SECURITY TESTING Shirley M. Radack, Editor, Computer Security Division be tempted to neglect or insufficiently develop a comprehensive and systematic opera tional security testing program. This guide stresses the need for an effective security testing program within federal agencies

375

ANNUAL SECURITY & FIRE SAFETY REPORT  

E-Print Network (OSTI)

ANNUAL SECURITY & FIRE SAFETY REPORT 2014 A guide to policies, procedures, practices, and programs implemented to keep students, faculty, and staff safe and facilities secure. www.montana.edu/reports/security.pdf #12;Inside this Report 2014 Annual Security and Fire Safety Report for Reporting Year 2013

Maxwell, Bruce D.

376

National Security, Weapons Science  

NLE Websites -- All DOE Office Websites (Extended Search)

National Security, Weapons Science National Security, Weapons Science /science-innovation/_assets/images/icon-science.jpg National Security, Weapons Science National security depends on science and technology. The United States relies on Los Alamos National Laboratory for the best of both. No place on Earth pursues a broader array of world-class scientific endeavors. Dual-Axis Radiographic Hydrodynamic Test Facility (DARHT) The Dual-Axis Radiographic Hydrodynamic Test Facility at LANL is part of the DOE's stockpile stewardship program. It uses two large X-ray machines to record three-dimensional interior images of materials. In most experiments, materials (including plutonium) undergo hydrodynamic shock to simulate the implosion process in nuclear bombs and/or the effects of severe hydrodynamic stress. The tests are described as "full-scale mockups

377

Requirements for security signalling  

SciTech Connect

There has been some interest lately in the need for ``authenticated signalling``, and the development of signalling specifications by the ATM Forum that support this need. The purpose of this contribution is to show that if authenticated signalling is required, then supporting signalling facilities for directory services (i.e. key management) are also required. Furthermore, this contribution identifies other security related mechanisms that may also benefit from ATM-level signalling accommodations. For each of these mechanisms outlined here, an overview of the signalling issues and a rough cut at the required fields for supporting Information Elements are provided. Finally, since each of these security mechanisms are specified by a number of different standards, issues pertaining to the selection of a particular security mechanism at connection setup time (i.e. specification of a required ``Security Quality of Service``) are also discussed.

Pierson, L.G.; Tarman, T.D.

1995-02-05T23:59:59.000Z

378

Safeguards and Security Program  

Directives, Delegations, and Requirements

The order establishes responsibilities and program planning and management requirements for the Safeguards and Security Program. Admin Chg 1, dated 2-15-13, cancels DOE O 470.4B.

2011-07-21T23:59:59.000Z

379

Safeguards and Security Program  

Directives, Delegations, and Requirements

The Order establishes roles and responsibilities for the Department of Energy Safeguards and Security Program. Cancels DOE O 470.4. Canceled by DOE O 470.4B

2007-05-25T23:59:59.000Z

380

Operations Security Program  

Directives, Delegations, and Requirements

To establish policies, responsibilities and authorities for implementing and sustaining the Department of Energy (DOE) Operations Security (OPSEC) Program. Cancels DOE O 5632.3B. Canceled by DOE O 471.2 of 9-28-1995.

1992-04-30T23:59:59.000Z

Note: This page contains sample records for the topic "586-1076 secure file" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

Energy Security Through Hydrogen  

Science Journals Connector (OSTI)

Energy and environmental security are major problems facing our global economy. Fossil fuels, particularly crude oil, are ... energy sources. In the long term, a hydrogen-based economy will have an impact on all ...

Professor John W. Sheffield

2007-01-01T23:59:59.000Z

382

GRID Security Review  

Science Journals Connector (OSTI)

A Computational GRID is a collection of heterogeneous computing resources ... computational power of current micro-processors, Computational GRIDs or meta-systems have gradually become more ... a secure environme...

Lazaros Gymnopoulos; Stelios Dritsas; Stefanos Gritzalis

2003-01-01T23:59:59.000Z

383

Safeguards and Security Program  

Directives, Delegations, and Requirements

To establish the policy and responsibilities for the Department of Energy safeguards and security program. Does not cancel another directive. Canceled by DOE O 5630.11A dated 12-7-92.

1988-01-22T23:59:59.000Z

384

Safety, Security & Fire Report  

E-Print Network (OSTI)

2013 Safety, Security & Fire Report Stanford University #12;Table of Contents Public Safety About the Stanford University Department of Public Safety Community Outreach & Education Programs Emergency Access Transportation Safety Bicycle Safety The Jeanne Clery and Higher Education Act Timely Warning

Straight, Aaron

385

defense nuclear security  

National Nuclear Security Administration (NNSA)

3%2A en Defense Nuclear Security http:nnsa.energy.govaboutusourprogramsnuclearsecurity

Page...

386

Nuclear Energy & Energy Security  

Science Journals Connector (OSTI)

Safety issues related to use of nuclear energy and secure operation of nuclear installations are mail stones of great importance. Although none of technologies producing energy are absolutely safe it is obvious t...

Jumber Mamasakhlisi

2010-01-01T23:59:59.000Z

387

National Nuclear Security Administration  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

AI~W~~l AI~W~~l 11Vl'~~4 National Nuclear Security Administration Department of Energy National Nuclear Security Administration Nevada Site Office P.O. Box 98518 Las Vegas, NV 89193-8518 JAN! 8 2013 Gregory H. Woods, General Counsel, DOE/HQ (GC-1) FORS NATIONAL NUCLEAR SECURITY ADMINISTRATION NEVADA SITE OFFICE (NNSA/NSO) NATIONAL ENVIRONMENTAL POLICY ACT (NEPA) ANNUAL SUMMARY In accordance with DOE Order 451.1B, National Environmental Policy Act Compliance Program, NNSA/NSO is submitting the enclosed Annual NEP A Planning Summary. The document provides a brief description of ongoing and planned NEP A actions for calendar year 2013. This summary provides information for completion of the Site- Wide Environmental Impact Statement for the Nevada National Security Site and Off-Site Locations in the State of Nevada.

388

Principal Associate Director - Global Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Principal Associate Director - Global Security Principal Associate Director - Global Security As Principal Associate Director for Global Security, Wallace leads Laboratory programs with special focus on developing and applying the scientific and engineering capabilities to address complex national and global security threats. Contact Operator Los Alamos National Laboratory (505 667-5061 Wallace's expertise is forensic seismology, a highly specialized discipline focusing on detection and quantification of nuclear tests. Terry C. Wallace, Jr. Principal Associate Director for Global Security Terry C. Wallace, Jr., Principal Associate Director for Global Security As Principal Associate Director for Global Security, Wallace leads Laboratory programs with a focus on applying scientific and engineering capabilities

389

Nevada National Security Site - Reports  

NLE Websites -- All DOE Office Websites (Extended Search)

Reports Reports Nevada National Security Site Review Reports 2013 Independent Oversight Targeted Review of the Safety Significant Blast Door and Special Door Interlock Systems and Review of Federal Assurance Capability at the Nevada National Security Site, December 2013 Review of the Nevada National Security Site Criticality Safety Program Corrective Action Plan Closure, May 2013 Review Reports 2012 Review of the Nevada National Security Site Implementation Verification Review Processes, March 2012 Activity Reports 2012 Nevada National Security Site Operational Awareness Visit, December 2012 Operational Awareness Oversight of the Nevada National Security Site, August 2012 Review Reports 2011 Review of Nevada Site Office and National Security Technologies, LLC, Line Oversight and Contractor Assurance Systems

390

National Security | ornl.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

Program Areas Program Areas Initiatives Facilities Events and Conferences Supporting Organizations A scientific approach to global security Initiatives | Programs Home | Science & Discovery | National Security National Security | National Security SHARE ORNL plays an important role in national and global security by virtue of its expertise in advanced materials, nuclear science, supercomputing and other scientific specialties. Discovery and innovation in these areas are essential for protecting US citizens and advancing national and global security priorities. ORNL supports these missions by using its signature strengths to meet complex national security challenges in a number of areas. Nuclear Nonproliferation - The laboratory's expertise and experience covers the spectrum of nuclear nonproliferation work, from basic R&D to

391

Framework for SCADA Security Policy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Framework for SCADA Security Policy Framework for SCADA Security Policy Dominique Kilman Jason Stamp dkilman@sandia.gov jestamp@sandia.gov Sandia National Laboratories Albuquerque, NM 87185-0785 Abstract - Modern automation systems used in infrastruc- ture (including Supervisory Control and Data Acquisition, or SCADA) have myriad security vulnerabilities. Many of these relate directly to inadequate security administration, which precludes truly effective and sustainable security. Adequate security management mandates a clear administrative struc- ture and enforcement hierarchy. The security policy is the root document, with sections covering purpose, scope, posi- tions, responsibilities, references, revision history, enforce- ment, and exceptions for various subjects relevant for system

392

Incidents of Security Concern  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

NOT MEASUREMENT NOT MEASUREMENT SENSITIVE DOE-STD-1210-2012 September 2012 DOE STANDARD Incidents of Security Concern U.S. Department of Energy AREA SANS Washington, D.C. 20585 DISTRIBUTION STATEMENT A. Approved for public release; distribution is unlimited. DOE-STD-1210-2012 INTENTIONALLY BLANK DOE-STD-1210-2012 TABLE OF CONTENTS PARAGRAPH PAGE FOREWORD ................................................................................................................................ IV INCIDENTS OF SECURITY CONCERN......................................................................................1 1. SCOPE ....................................................................................................................................1 2. PURPOSE...............................................................................................................................1

393

Incidents of Security Concern  

Directives, Delegations, and Requirements

Sets forth requirements for the DOE Incidents of Security Concern Program, including timely identification and notification of, response to, inquiry into, reporting of, and closure actions for incidents of security concern. Cancels Chapter VII of DOE O 470.1; DOE N 471.3; and Chapter IV of DOE M 471.2-1B (Note: Paragraphs 1 and 2 of Chapter III remain in effect.) Canceled by DOE O 470.4.

2004-03-17T23:59:59.000Z

394

Security systems engineering overview  

SciTech Connect

Crime prevention is on the minds of most people today. The concern for public safety and the theft of valuable assets are being discussed at all levels of government and throughout the public sector. There is a growing demand for security systems that can adequately safeguard people and valuable assets against the sophistication of those criminals or adversaries who pose a threat. The crime in this country has been estimated at $70 billion in direct costs and up to $300 billion in indirect costs. Health insurance fraud alone is estimated to cost American businesses $100 billion. Theft, warranty fraud, and counterfeiting of computer hardware totaled $3 billion in 1994. A threat analysis is a prerequisite to any security system design to assess the vulnerabilities with respect to the anticipated threat. Having established a comprehensive definition of the threat, crime prevention, detection, and threat assessment technologies can be used to address these criminal activities. This talk will outline the process used to design a security system regardless of the level of security. This methodology has been applied to many applications including: government high security facilities; residential and commercial intrusion detection and assessment; anti-counterfeiting/fraud detection technologies (counterfeit currency, cellular phone billing, credit card fraud, health care fraud, passport, green cards, and questionable documents); industrial espionage detection and prevention (intellectual property, computer chips, etc.); and security barrier technology (creation of delay such as gates, vaults, etc.).

Steele, B.J.

1996-12-31T23:59:59.000Z

395

Argonne Team Challenges Physical Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Engineering & Systems Analysis Engineering & Systems Analysis Success Stories For further information, contact Roger Johnston, rogerj@anl.gov "Real security is thinking like the bad guys," maintains Roger Johnston, head of Argonne's VAT. Argonne Team Challenges Physical Security Physical security-the art of protecting tangible assets-is the counterpart to cyber security. Physical security can take the form of locks, tamper-indicating seals, guards who stand watch

396

Lemnos Interoperable Security Program  

SciTech Connect

The manner in which the control systems are being designed and operated in the energy sector is undergoing some of the most significant changes in history due to the evolution of technology and the increasing number of interconnections to other system. With these changes however come two significant challenges that the energy sector must face; 1) Cyber security is more important than ever before, and 2) Cyber security is more complicated than ever before. A key requirement in helping utilities and vendors alike in meeting these challenges is interoperability. While interoperability has been present in much of the discussions relating to technology utilized within the energy sector and especially the Smart Grid, it has been absent in the context of cyber security. The Lemnos project addresses these challenges by focusing on the interoperability of devices utilized within utility control systems which support critical cyber security functions. In theory, interoperability is possible with many of the cyber security solutions available to utilities today. The reality is that the effort required to achieve cyber security interoperability is often a barrier for utilities. For example, consider IPSec, a widely-used Internet Protocol to define Virtual Private Networks, or ?? tunnels?, to communicate securely through untrusted public and private networks. The IPSec protocol suite has a significant number of configuration options and encryption parameters to choose from, which must be agreed upon and adopted by both parties establishing the tunnel. The exercise in getting software or devices from different vendors to interoperate is labor intensive and requires a significant amount of security expertise by the end user. Scale this effort to a significant number of devices operating over a large geographical area and the challenge becomes so overwhelming that it often leads utilities to pursue solutions from a single vendor. These single vendor solutions may inadvertently lock utilities into proprietary and closed systems Lemnos is built on the successes of Open PCS Security Architecture for Interoperable Design (OPSAID), a previous DOE National SCADA Test Bed (NSTB) project. It enhances security interoperability by identifying basic cyber security functions based on utility requirements and then selecting open source solutions, namely Internet Engineering Task Force (IETF) RFCs, to support these functions. Once identified, specific configuration parameters for each RFC suitable for the electric utility control system environment are identified and documented. These configuration parameters are referred to as Interoperable Configuration Profiles (ICP) and their effectiveness within the utility control systems environment is verified with comprehensive testing as the final step in the process. The project focused on development of ICPs for four security protocols (IPsec, SSH, LDAP, and Syslog) which represent fundamental building blocks which can be utilized for securing utility control systems. These ICPs are product agnostic and can be applied modularly to any device (router, substation gateway, intelligent electronic device, etc.) within the utility control system as the end user deems necessary for their unique system architecture. The Lemnos Interoperable Security Program is a public-private partnership under the U.S. Department of Energy (DOE) Office of Electricity Delivery and Energy Reliability's Cybersecurity for Energy Delivery Systems (CEDS) program and supports The Roadmap to Secure Energy Delivery Systems. In addition to EnerNex, the core team supporting the effort includes Tennessee Valley Authority, Sandia National Laboratories, and Schweitzer Engineering Laboratories. Adding to the core team effort is collaboration from additional industry participants in the project including the Electric Power Research Institute (EPRI), Alien Vault, Cisco, Encore Networks, GarrettCom, Industrial Defender, N-Dimension Solutions, Phoenix Contact, RuggedCom, and Siemens.

John Stewart; Ron Halbgewachs; Adrian Chavez; Rhett Smith; David Teumim

2012-01-31T23:59:59.000Z

397

File:Handbook.pdf | Open Energy Information  

Open Energy Info (EERE)

Handbook.pdf Handbook.pdf Jump to: navigation, search File File history File usage File:Handbook.pdf Size of this preview: 463 × 599 pixels. Other resolution: 464 × 600 pixels. Go to page 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 Go! next page → next page → Full resolution ‎(1,275 × 1,650 pixels, file size: 4.49 MB, MIME type: application/pdf, 93 pages) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 12:57, 14 November 2012 Thumbnail for version as of 12:57, 14 November 2012 1,275 × 1,650, 93 pages (4.49 MB) Dklein2012 (Talk | contribs)

398

Transportation and Energy Use Data Files  

U.S. Energy Information Administration (EIA) Indexed Site

Data Files Data Files Transportation and Energy Use Data Files Data from the last two Residential Transportation Energy Consumption Surveys are available on-line. These data include fuel consumption and expenditures, vehicle-miles traveled, vehicle characteristics, and household characteristics from national samples of over 3,000 households. To protect respondent confidentiality, these data files do not contain any information which could be used to identify individual households. The lowest level of geographic detail provided is the Census Division (a grouping of 3 to 5 States.) 1994 RTECS Public Use Data 1991 RTECS Public Use Data 1994 RTECS Public Use Data The data from the 1994 RTECS is distributed in dBase and ASCII formats. The data in each set has been compressed using PKZIP. After downloading either the ASCII or dBase set, place the downloaded file in a separate directory and expand it using pkunzip. If you don't have pkunzip.exe, you can download that package here. PKUNZIP.EXE is in PKZ204g.exe. PKUNZIP.EXE is the only file you need, but the developers of the product have asked that the entire package be distributed and not the individual files. You can however find pkunzip.exe on several other Internet sites. If you download PKZ204g.exe to a separate directory, type PKZ204g and press ENTER.

399

File:Consultants.pdf | Open Energy Information  

Open Energy Info (EERE)

Consultants.pdf Consultants.pdf Jump to: navigation, search File File history File usage File:Consultants.pdf Size of this preview: 463 × 599 pixels. Other resolution: 464 × 600 pixels. Go to page 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 Go! next page → next page → Full resolution ‎(1,275 × 1,650 pixels, file size: 454 KB, MIME type: application/pdf, 108 pages) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 11:39, 20 November 2012 Thumbnail for version as of 11:39, 20 November 2012 1,275 × 1,650, 108 pages (454 KB) Dklein2012 (Talk | contribs)

400

File:Primer.pdf | Open Energy Information  

Open Energy Info (EERE)

Primer.pdf Primer.pdf Jump to: navigation, search File File history File usage File:Primer.pdf Size of this preview: 463 × 599 pixels. Other resolution: 464 × 600 pixels. Go to page 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 Go! next page → next page → Full resolution ‎(1,275 × 1,650 pixels, file size: 5.11 MB, MIME type: application/pdf, 116 pages) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment

Note: This page contains sample records for the topic "586-1076 secure file" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

File:Windyclassroom.pdf | Open Energy Information  

Open Energy Info (EERE)

source source History View New Pages Recent Changes All Special Pages Semantic Search/Querying Get Involved Help Apps Datasets Community Login | Sign Up Search File Edit History Facebook icon Twitter icon » File:Windyclassroom.pdf Jump to: navigation, search File File history File usage Metadata File:Windyclassroom.pdf Size of this preview: 463 × 599 pixels. Other resolution: 464 × 600 pixels. Go to page 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 Go! next page → next page → Full resolution ‎(1,275 × 1,650 pixels, file size: 21.47 MB, MIME type:

402

File:Marcelluswatermgmt.pdf | Open Energy Information  

Open Energy Info (EERE)

Marcelluswatermgmt.pdf Marcelluswatermgmt.pdf Jump to: navigation, search File File history File usage File:Marcelluswatermgmt.pdf Size of this preview: 463 × 599 pixels. Other resolution: 464 × 600 pixels. Go to page 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 Go! next page → next page → Full resolution ‎(1,275 × 1,650 pixels, file size: 1.91 MB, MIME type: application/pdf, 59 pages) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 15:52, 9 February 2012 Thumbnail for version as of 15:52, 9 February 2012 1,275 × 1,650, 59 pages (1.91 MB) Graham7781 (Talk | contribs)

403

File:Mmpa.pdf | Open Energy Information  

Open Energy Info (EERE)

Mmpa.pdf Mmpa.pdf Jump to: navigation, search File File history File usage File:Mmpa.pdf Size of this preview: 463 × 599 pixels. Other resolution: 464 × 600 pixels. Go to page 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 Go! next page → next page → Full resolution ‎(1,275 × 1,650 pixels, file size: 581 KB, MIME type: application/pdf, 113 pages) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment

404

File:Proof1.pdf | Open Energy Information  

Open Energy Info (EERE)

Proof1.pdf Proof1.pdf Jump to: navigation, search File File history File usage File:Proof1.pdf Size of this preview: 463 × 599 pixels. Other resolution: 464 × 600 pixels. Go to page 1 2 3 4 Go! next page → next page → Full resolution ‎(1,275 × 1,650 pixels, file size: 79 KB, MIME type: application/pdf, 4 pages) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 12:16, 14 November 2012 Thumbnail for version as of 12:16, 14 November 2012 1,275 × 1,650, 4 pages (79 KB) Dklein2012 (Talk | contribs) You cannot overwrite this file. Edit this file using an external application (See the setup instructions for more information) File usage There are no pages that link to this file. Retrieved from

405

File:40 CFR 143.pdf | Open Energy Information  

Open Energy Info (EERE)

pdf pdf Jump to: navigation, search File File history File usage File:40 CFR 143.pdf Size of this preview: 463 × 599 pixels. Other resolution: 464 × 600 pixels. Go to page 1 2 3 4 5 Go! next page → next page → Full resolution ‎(1,275 × 1,650 pixels, file size: 166 KB, MIME type: application/pdf, 5 pages) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 18:05, 29 October 2012 Thumbnail for version as of 18:05, 29 October 2012 1,275 × 1,650, 5 pages (166 KB) Dklein2012 (Talk | contribs) You cannot overwrite this file. Edit this file using an external application (See the setup instructions for more information) File usage There are no pages that link to this file. Retrieved from

406

File:09IDAStateEnvironmentalProcess.pdf | Open Energy Information  

Open Energy Info (EERE)

09IDAStateEnvironmentalProcess.pdf 09IDAStateEnvironmentalProcess.pdf Jump to: navigation, search File File history File usage File:09IDAStateEnvironmentalProcess.pdf Size of this preview: 463 × 599 pixels. Other resolution: 464 × 600 pixels. Full resolution ‎(1,275 × 1,650 pixels, file size: 13 KB, MIME type: application/pdf) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 14:19, 16 August 2012 Thumbnail for version as of 14:19, 16 August 2012 1,275 × 1,650 (13 KB) Dklein2012 (Talk | contribs) You cannot overwrite this file. Edit this file using an external application (See the setup instructions for more information) File usage The following page links to this file: GRR/Section 9-ID-a - State Environmental Process

407

File:Mitigation report.pdf | Open Energy Information  

Open Energy Info (EERE)

report.pdf report.pdf Jump to: navigation, search File File history File usage File:Mitigation report.pdf Size of this preview: 463 × 599 pixels. Other resolution: 464 × 600 pixels. Go to page 1 2 Go! next page → next page → Full resolution ‎(1,275 × 1,650 pixels, file size: 29 KB, MIME type: application/pdf, 2 pages) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 15:25, 20 November 2012 Thumbnail for version as of 15:25, 20 November 2012 1,275 × 1,650, 2 pages (29 KB) Dklein2012 (Talk | contribs) You cannot overwrite this file. Edit this file using an external application (See the setup instructions for more information) File usage There are no pages that link to this file. Retrieved from

408

File:Application procedures.pdf | Open Energy Information  

Open Energy Info (EERE)

procedures.pdf procedures.pdf Jump to: navigation, search File File history File usage File:Application procedures.pdf Size of this preview: 463 × 599 pixels. Other resolution: 464 × 600 pixels. Go to page 1 2 Go! next page → next page → Full resolution ‎(1,275 × 1,650 pixels, file size: 27 KB, MIME type: application/pdf, 2 pages) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 14:06, 15 November 2012 Thumbnail for version as of 14:06, 15 November 2012 1,275 × 1,650, 2 pages (27 KB) Dklein2012 (Talk | contribs) You cannot overwrite this file. Edit this file using an external application (See the setup instructions for more information) File usage There are no pages that link to this file.

409

File:03CACEncroachmentPermit.pdf | Open Energy Information  

Open Energy Info (EERE)

CACEncroachmentPermit.pdf CACEncroachmentPermit.pdf Jump to: navigation, search File File history File usage File:03CACEncroachmentPermit.pdf Size of this preview: 463 × 599 pixels. Other resolution: 464 × 600 pixels. Full resolution ‎(1,275 × 1,650 pixels, file size: 34 KB, MIME type: application/pdf) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 12:45, 19 November 2012 Thumbnail for version as of 12:45, 19 November 2012 1,275 × 1,650 (34 KB) Alevine (Talk | contribs) You cannot overwrite this file. Edit this file using an external application (See the setup instructions for more information) File usage The following 2 pages link to this file: GRR/Flowcharts GRR/Section 3-CA-c - Encroachment Permit

410

File:01AKALandUseConsiderations.pdf | Open Energy Information  

Open Energy Info (EERE)

01AKALandUseConsiderations.pdf 01AKALandUseConsiderations.pdf Jump to: navigation, search File File history File usage File:01AKALandUseConsiderations.pdf Size of this preview: 463 × 599 pixels. Other resolution: 464 × 600 pixels. Full resolution ‎(1,275 × 1,650 pixels, file size: 10 KB, MIME type: application/pdf) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 09:46, 18 October 2012 Thumbnail for version as of 09:46, 18 October 2012 1,275 × 1,650 (10 KB) Jnorris (Talk | contribs) You cannot overwrite this file. Edit this file using an external application (See the setup instructions for more information) File usage The following 2 pages link to this file: GRR/Flowcharts GRR/Section 1-AK-a - Land Use Considerations

411

File:03UTFEncroachmentPermit.pdf | Open Energy Information  

Open Energy Info (EERE)

UTFEncroachmentPermit.pdf UTFEncroachmentPermit.pdf Jump to: navigation, search File File history File usage File:03UTFEncroachmentPermit.pdf Size of this preview: 463 × 599 pixels. Other resolution: 464 × 600 pixels. Full resolution ‎(1,275 × 1,650 pixels, file size: 40 KB, MIME type: application/pdf) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 12:15, 30 August 2012 Thumbnail for version as of 12:15, 30 August 2012 1,275 × 1,650 (40 KB) Jnorris (Talk | contribs) You cannot overwrite this file. Edit this file using an external application (See the setup instructions for more information) File usage The following 2 pages link to this file: GRR/Flowcharts GRR/Section 3-UT-f - Encroachment Permit

412

File:(131112) Presentacion LAC LEDs.pdf | Open Energy Information  

Open Energy Info (EERE)

131112) Presentacion LAC LEDs.pdf 131112) Presentacion LAC LEDs.pdf Jump to: navigation, search File File history File usage File:(131112) Presentacion LAC LEDs.pdf Size of this preview: 800 × 600 pixels. Go to page 1 2 3 4 5 6 7 8 9 10 Go! next page → next page → Full resolution ‎(1,500 × 1,125 pixels, file size: 775 KB, MIME type: application/pdf, 10 pages) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 14:15, 12 December 2012 Thumbnail for version as of 14:15, 12 December 2012 1,500 × 1,125, 10 pages (775 KB) Gjones (Talk | contribs) You cannot overwrite this file. Edit this file using an external application (See the setup instructions for more information) File usage The following page links to this file:

413

File:01HIALandUseConsiderations.pdf | Open Energy Information  

Open Energy Info (EERE)

HIALandUseConsiderations.pdf HIALandUseConsiderations.pdf Jump to: navigation, search File File history File usage File:01HIALandUseConsiderations.pdf Size of this preview: 463 × 599 pixels. Other resolution: 464 × 600 pixels. Full resolution ‎(1,275 × 1,650 pixels, file size: 20 KB, MIME type: application/pdf) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 13:05, 23 October 2012 Thumbnail for version as of 13:05, 23 October 2012 1,275 × 1,650 (20 KB) Dklein2012 (Talk | contribs) You cannot overwrite this file. Edit this file using an external application (See the setup instructions for more information) File usage The following 2 pages link to this file: GRR/Flowcharts GRR/Section 1-HI-a - Land Use Considerations

414

File:04AKBGeophysicalExplorationPermit.pdf | Open Energy Information  

Open Energy Info (EERE)

AKBGeophysicalExplorationPermit.pdf AKBGeophysicalExplorationPermit.pdf Jump to: navigation, search File File history File usage File:04AKBGeophysicalExplorationPermit.pdf Size of this preview: 463 × 599 pixels. Other resolution: 464 × 600 pixels. Full resolution ‎(1,275 × 1,650 pixels, file size: 62 KB, MIME type: application/pdf) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 11:38, 6 August 2012 Thumbnail for version as of 11:38, 6 August 2012 1,275 × 1,650 (62 KB) Jnorris (Talk | contribs) You cannot overwrite this file. Edit this file using an external application (See the setup instructions for more information) File usage The following 2 pages link to this file: GRR/Flowcharts GRR/Section 4-AK-b - Geophysical Exploration Permit

415

File:1200CappFS.pdf | Open Energy Information  

Open Energy Info (EERE)

CappFS.pdf CappFS.pdf Jump to: navigation, search File File history File usage File:1200CappFS.pdf Size of this preview: 463 × 599 pixels. Other resolution: 464 × 600 pixels. Go to page 1 2 Go! next page → next page → Full resolution ‎(1,275 × 1,650 pixels, file size: 173 KB, MIME type: application/pdf, 2 pages) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 17:00, 19 November 2012 Thumbnail for version as of 17:00, 19 November 2012 1,275 × 1,650, 2 pages (173 KB) Dklein2012 (Talk | contribs) You cannot overwrite this file. Edit this file using an external application (See the setup instructions for more information) File usage There are no pages that link to this file. Retrieved from

416

File:FrackingFacts.pdf | Open Energy Information  

Open Energy Info (EERE)

FrackingFacts.pdf FrackingFacts.pdf Jump to: navigation, search File File history File usage File:FrackingFacts.pdf Size of this preview: 463 × 599 pixels. Other resolution: 464 × 600 pixels. Go to page 1 2 3 4 5 6 7 Go! next page → next page → Full resolution ‎(1,275 × 1,650 pixels, file size: 582 KB, MIME type: application/pdf, 7 pages) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 16:06, 6 February 2012 Thumbnail for version as of 16:06, 6 February 2012 1,275 × 1,650, 7 pages (582 KB) Graham7781 (Talk | contribs) You cannot overwrite this file. Edit this file using an external application (See the setup instructions for more information) File usage The following page links to this file:

417

File:1200Capplicationf.pdf | Open Energy Information  

Open Energy Info (EERE)

1200Capplicationf.pdf 1200Capplicationf.pdf Jump to: navigation, search File File history File usage File:1200Capplicationf.pdf Size of this preview: 463 × 599 pixels. Other resolution: 464 × 600 pixels. Go to page 1 2 3 4 Go! next page → next page → Full resolution ‎(1,275 × 1,650 pixels, file size: 233 KB, MIME type: application/pdf, 4 pages) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 15:32, 19 November 2012 Thumbnail for version as of 15:32, 19 November 2012 1,275 × 1,650, 4 pages (233 KB) Dklein2012 (Talk | contribs) You cannot overwrite this file. Edit this file using an external application (See the setup instructions for more information) File usage There are no pages that link to this file.

418

File:08CADCAISOQueueClusterProcess.pdf | Open Energy Information  

Open Energy Info (EERE)

CADCAISOQueueClusterProcess.pdf CADCAISOQueueClusterProcess.pdf Jump to: navigation, search File File history File usage File:08CADCAISOQueueClusterProcess.pdf Size of this preview: 463 × 599 pixels. Other resolution: 464 × 600 pixels. Full resolution ‎(1,275 × 1,650 pixels, file size: 46 KB, MIME type: application/pdf) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 10:37, 11 January 2013 Thumbnail for version as of 10:37, 11 January 2013 1,275 × 1,650 (46 KB) Alevine (Talk | contribs) You cannot overwrite this file. Edit this file using an external application (See the setup instructions for more information) File usage The following page links to this file: GRR/Section 8-CA-d - CAISO Queue Cluster Process

419

File:Div20.pdf | Open Energy Information  

Open Energy Info (EERE)

Div20.pdf Div20.pdf Jump to: navigation, search File File history File usage File:Div20.pdf Size of this preview: 463 × 599 pixels. Other resolution: 464 × 600 pixels. Go to page 1 2 3 4 5 6 7 Go! next page → next page → Full resolution ‎(1,275 × 1,650 pixels, file size: 38 KB, MIME type: application/pdf, 7 pages) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 17:45, 19 November 2012 Thumbnail for version as of 17:45, 19 November 2012 1,275 × 1,650, 7 pages (38 KB) Dklein2012 (Talk | contribs) You cannot overwrite this file. Edit this file using an external application (See the setup instructions for more information) File usage There are no pages that link to this file. Retrieved from

420

File:Stormwater faq.pdf | Open Energy Information  

Open Energy Info (EERE)

Stormwater faq.pdf Stormwater faq.pdf Jump to: navigation, search File File history File usage File:Stormwater faq.pdf Size of this preview: 463 × 599 pixels. Other resolution: 464 × 600 pixels. Go to page 1 2 Go! next page → next page → Full resolution ‎(1,275 × 1,650 pixels, file size: 23 KB, MIME type: application/pdf, 2 pages) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 10:49, 13 November 2012 Thumbnail for version as of 10:49, 13 November 2012 1,275 × 1,650, 2 pages (23 KB) Dklein2012 (Talk | contribs) You cannot overwrite this file. Edit this file using an external application (See the setup instructions for more information) File usage There are no pages that link to this file.

Note: This page contains sample records for the topic "586-1076 secure file" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

File:LulApplicationForm.pdf | Open Energy Information  

Open Energy Info (EERE)

source source History View New Pages Recent Changes All Special Pages Semantic Search/Querying Get Involved Help Apps Datasets Community Login | Sign Up Search File Edit History Facebook icon Twitter icon » File:LulApplicationForm.pdf Jump to: navigation, search File File history File usage File:LulApplicationForm.pdf Size of this preview: 463 × 599 pixels. Other resolution: 464 × 600 pixels. Full resolution ‎(1,275 × 1,650 pixels, file size: 57 KB, MIME type: application/pdf) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 17:20, 26 November 2012 Thumbnail for version as of 17:20, 26 November 2012 1,275 × 1,650 (57 KB) Dklein2012 (Talk | contribs) You cannot overwrite this file. Edit this file using an external application (See the setup

422

File:Breakout Session Guidance.pdf | Open Energy Information  

Open Energy Info (EERE)

Breakout Session Guidance.pdf Breakout Session Guidance.pdf Jump to: navigation, search File File history File usage File:Breakout Session Guidance.pdf Size of this preview: 800 × 600 pixels. Go to page 1 2 3 4 5 Go! next page → next page → Full resolution ‎(1,500 × 1,125 pixels, file size: 69 KB, MIME type: application/pdf, 5 pages) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 10:01, 10 July 2012 Thumbnail for version as of 10:01, 10 July 2012 1,500 × 1,125, 5 pages (69 KB) Graham7781 (Talk | contribs) You cannot overwrite this file. Edit this file using an external application (See the setup instructions for more information) File usage The following page links to this file: Energy Data Initiative/Resources

423

File:06IDCDrinkingWaterPermit.pdf | Open Energy Information  

Open Energy Info (EERE)

IDCDrinkingWaterPermit.pdf IDCDrinkingWaterPermit.pdf Jump to: navigation, search File File history File usage File:06IDCDrinkingWaterPermit.pdf Size of this preview: 463 × 599 pixels. Other resolution: 464 × 600 pixels. Full resolution ‎(1,275 × 1,650 pixels, file size: 24 KB, MIME type: application/pdf) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 08:14, 29 October 2012 Thumbnail for version as of 08:14, 29 October 2012 1,275 × 1,650 (24 KB) Dklein2012 (Talk | contribs) You cannot overwrite this file. Edit this file using an external application (See the setup instructions for more information) File usage The following page links to this file: GRR/Section 6-ID-c - Drinking Water Permit Retrieved from

424

File:Leasing Easement Guidelines.pdf | Open Energy Information  

Open Energy Info (EERE)

Leasing Easement Guidelines.pdf Leasing Easement Guidelines.pdf Jump to: navigation, search File File history File usage Metadata File:Leasing Easement Guidelines.pdf Size of this preview: 463 × 599 pixels. Other resolution: 464 × 600 pixels. Go to page 1 2 Go! next page → next page → Full resolution ‎(1,275 × 1,650 pixels, file size: 26 KB, MIME type: application/pdf, 2 pages) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 11:01, 20 June 2013 Thumbnail for version as of 11:01, 20 June 2013 1,275 × 1,650, 2 pages (26 KB) Apalazzo (Talk | contribs) You cannot overwrite this file. Edit this file using an external application (See the setup instructions for more information) File usage There are no pages that link to this file.

425

File:App Geothermal.pdf | Open Energy Information  

Open Energy Info (EERE)

Geothermal.pdf Geothermal.pdf Jump to: navigation, search File File history File usage File:App Geothermal.pdf Size of this preview: 463 × 599 pixels. Other resolution: 464 × 600 pixels. Go to page 1 2 Go! next page → next page → Full resolution ‎(1,275 × 1,650 pixels, file size: 112 KB, MIME type: application/pdf, 2 pages) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 20:07, 16 November 2012 Thumbnail for version as of 20:07, 16 November 2012 1,275 × 1,650, 2 pages (112 KB) Dklein2012 (Talk | contribs) You cannot overwrite this file. Edit this file using an external application (See the setup instructions for more information) File usage There are no pages that link to this file.

426

File:06MTCDrinkingWaterPermit.pdf | Open Energy Information  

Open Energy Info (EERE)

MTCDrinkingWaterPermit.pdf MTCDrinkingWaterPermit.pdf Jump to: navigation, search File File history File usage File:06MTCDrinkingWaterPermit.pdf Size of this preview: 463 × 599 pixels. Other resolution: 464 × 600 pixels. Full resolution ‎(1,275 × 1,650 pixels, file size: 11 KB, MIME type: application/pdf) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 11:11, 1 October 2012 Thumbnail for version as of 11:11, 1 October 2012 1,275 × 1,650 (11 KB) Dklein2012 (Talk | contribs) You cannot overwrite this file. Edit this file using an external application (See the setup instructions for more information) File usage The following page links to this file: GRR/Section 6-MT-c - Drinking Water Permit Retrieved from

427

File:ApplicationtoAppropriate.pdf | Open Energy Information  

Open Energy Info (EERE)

ApplicationtoAppropriate.pdf ApplicationtoAppropriate.pdf Jump to: navigation, search File File history File usage File:ApplicationtoAppropriate.pdf Size of this preview: 463 × 599 pixels. Other resolution: 464 × 600 pixels. Go to page 1 2 3 Go! next page → next page → Full resolution ‎(1,275 × 1,650 pixels, file size: 75 KB, MIME type: application/pdf, 3 pages) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 18:12, 13 November 2012 Thumbnail for version as of 18:12, 13 November 2012 1,275 × 1,650, 3 pages (75 KB) Dklein2012 (Talk | contribs) You cannot overwrite this file. Edit this file using an external application (See the setup instructions for more information) File usage There are no pages that link to this file.

428

File:Invitation-English (2).pdf | Open Energy Information  

Open Energy Info (EERE)

Invitation-English (2).pdf Invitation-English (2).pdf Jump to: navigation, search File File history File usage File:Invitation-English (2).pdf Size of this preview: 321 × 598 pixels. Other resolution: 322 × 600 pixels. Go to page 1 2 Go! next page → next page → Full resolution ‎(1,650 × 3,075 pixels, file size: 785 KB, MIME type: application/pdf, 2 pages) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 09:46, 26 July 2011 Thumbnail for version as of 09:46, 26 July 2011 1,650 × 3,075, 2 pages (785 KB) STobin (Talk | contribs) You cannot overwrite this file. Edit this file using an external application (See the setup instructions for more information) File usage The following 5 pages link to this file:

429

File:ErosivityWaiverForm.pdf | Open Energy Information  

Open Energy Info (EERE)

ErosivityWaiverForm.pdf ErosivityWaiverForm.pdf Jump to: navigation, search File File history File usage File:ErosivityWaiverForm.pdf Size of this preview: 463 × 599 pixels. Other resolution: 464 × 600 pixels. Go to page 1 2 Go! next page → next page → Full resolution ‎(1,275 × 1,650 pixels, file size: 11 KB, MIME type: application/pdf, 2 pages) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 10:48, 13 November 2012 Thumbnail for version as of 10:48, 13 November 2012 1,275 × 1,650, 2 pages (11 KB) Dklein2012 (Talk | contribs) You cannot overwrite this file. Edit this file using an external application (See the setup instructions for more information) File usage There are no pages that link to this file.

430

File:06AKATransportationOversizeOverweight.pdf | Open Energy Information  

Open Energy Info (EERE)

AKATransportationOversizeOverweight.pdf AKATransportationOversizeOverweight.pdf Jump to: navigation, search File File history File usage File:06AKATransportationOversizeOverweight.pdf Size of this preview: 463 × 599 pixels. Other resolution: 464 × 600 pixels. Full resolution ‎(1,275 × 1,650 pixels, file size: 30 KB, MIME type: application/pdf) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 15:44, 6 August 2012 Thumbnail for version as of 15:44, 6 August 2012 1,275 × 1,650 (30 KB) Dfitzger (Talk | contribs) You cannot overwrite this file. Edit this file using an external application (See the setup instructions for more information) File usage The following page links to this file: GRR/Section 6-AK-a - Transportation

431

File:Permit factsheet.pdf | Open Energy Information  

Open Energy Info (EERE)

Permit factsheet.pdf Permit factsheet.pdf Jump to: navigation, search File File history File usage Metadata File:Permit factsheet.pdf Size of this preview: 463 × 599 pixels. Other resolution: 464 × 600 pixels. Go to page 1 2 3 Go! next page → next page → Full resolution ‎(1,275 × 1,650 pixels, file size: 31 KB, MIME type: application/pdf, 3 pages) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 10:50, 12 June 2013 Thumbnail for version as of 10:50, 12 June 2013 1,275 × 1,650, 3 pages (31 KB) Apalazzo (Talk | contribs) You cannot overwrite this file. Edit this file using an external application (See the setup instructions for more information) File usage There are no pages that link to this file.

432

File:03UTCStateEncroachmentOverview.pdf | Open Energy Information  

Open Energy Info (EERE)

UTCStateEncroachmentOverview.pdf UTCStateEncroachmentOverview.pdf Jump to: navigation, search File File history File usage File:03UTCStateEncroachmentOverview.pdf Size of this preview: 463 × 599 pixels. Other resolution: 464 × 600 pixels. Full resolution ‎(1,275 × 1,650 pixels, file size: 25 KB, MIME type: application/pdf) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 11:13, 30 August 2012 Thumbnail for version as of 11:13, 30 August 2012 1,275 × 1,650 (25 KB) Jnorris (Talk | contribs) You cannot overwrite this file. Edit this file using an external application (See the setup instructions for more information) File usage The following 2 pages link to this file: GRR/Flowcharts GRR/Section 3-UT-c - State Encroachment Overview

433

File:Notify98.pdf | Open Energy Information  

Open Energy Info (EERE)

Notify98.pdf Notify98.pdf Jump to: navigation, search File File history File usage File:Notify98.pdf Size of this preview: 463 × 599 pixels. Other resolution: 464 × 600 pixels. Go to page 1 2 3 4 5 Go! next page → next page → Full resolution ‎(1,275 × 1,650 pixels, file size: 95 KB, MIME type: application/pdf, 5 pages) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 17:18, 13 November 2012 Thumbnail for version as of 17:18, 13 November 2012 1,275 × 1,650, 5 pages (95 KB) Dklein2012 (Talk | contribs) You cannot overwrite this file. Edit this file using an external application (See the setup instructions for more information) File usage There are no pages that link to this file. Retrieved from

434

File:3-200-71.pdf | Open Energy Information  

Open Energy Info (EERE)

71.pdf 71.pdf Jump to: navigation, search File File history File usage File:3-200-71.pdf Size of this preview: 463 × 599 pixels. Other resolution: 464 × 600 pixels. Go to page 1 2 3 4 5 6 7 8 Go! next page → next page → Full resolution ‎(1,275 × 1,650 pixels, file size: 737 KB, MIME type: application/pdf, 8 pages) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 17:18, 16 October 2012 Thumbnail for version as of 17:18, 16 October 2012 1,275 × 1,650, 8 pages (737 KB) Dklein2012 (Talk | contribs) You cannot overwrite this file. Edit this file using an external application (See the setup instructions for more information) File usage There are no pages that link to this file. Retrieved from

435

File:06NVCDrinkingWaterPermit.pdf | Open Energy Information  

Open Energy Info (EERE)

6NVCDrinkingWaterPermit.pdf 6NVCDrinkingWaterPermit.pdf Jump to: navigation, search File File history File usage File:06NVCDrinkingWaterPermit.pdf Size of this preview: 463 × 599 pixels. Other resolution: 464 × 600 pixels. Full resolution ‎(1,275 × 1,650 pixels, file size: 45 KB, MIME type: application/pdf) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 15:59, 15 October 2012 Thumbnail for version as of 15:59, 15 October 2012 1,275 × 1,650 (45 KB) Dklein2012 (Talk | contribs) You cannot overwrite this file. Edit this file using an external application (See the setup instructions for more information) File usage The following page links to this file: GRR/Section 6-NV-c - Drinking Water Permit Retrieved from

436

File:06ORCDrinkingWaterPermit.pdf | Open Energy Information  

Open Energy Info (EERE)

6ORCDrinkingWaterPermit.pdf 6ORCDrinkingWaterPermit.pdf Jump to: navigation, search File File history File usage File:06ORCDrinkingWaterPermit.pdf Size of this preview: 463 × 599 pixels. Other resolution: 464 × 600 pixels. Full resolution ‎(1,275 × 1,650 pixels, file size: 11 KB, MIME type: application/pdf) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 12:09, 28 September 2012 Thumbnail for version as of 12:09, 28 September 2012 1,275 × 1,650 (11 KB) Dklein2012 (Talk | contribs) You cannot overwrite this file. Edit this file using an external application (See the setup instructions for more information) File usage The following page links to this file: GRR/Section 6-OR-c - Drinking Water Permit Retrieved from

437

File:AlaskaTitleVApplicationSubmittalInstructions.pdf | Open Energy  

Open Energy Info (EERE)

AlaskaTitleVApplicationSubmittalInstructions.pdf AlaskaTitleVApplicationSubmittalInstructions.pdf Jump to: navigation, search File File history File usage File:AlaskaTitleVApplicationSubmittalInstructions.pdf Size of this preview: 463 × 599 pixels. Other resolution: 464 × 600 pixels. Full resolution ‎(1,275 × 1,650 pixels, file size: 20 KB, MIME type: application/pdf) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 11:34, 1 November 2012 Thumbnail for version as of 11:34, 1 November 2012 1,275 × 1,650 (20 KB) Dklein2012 (Talk | contribs) You cannot overwrite this file. Edit this file using an external application (See the setup instructions for more information) File usage There are no pages that link to this file. Retrieved from

438

File:01MTALandUseConsiderations.pdf | Open Energy Information  

Open Energy Info (EERE)

MTALandUseConsiderations.pdf MTALandUseConsiderations.pdf Jump to: navigation, search File File history File usage File:01MTALandUseConsiderations.pdf Size of this preview: 463 × 599 pixels. Other resolution: 464 × 600 pixels. Full resolution ‎(1,275 × 1,650 pixels, file size: 10 KB, MIME type: application/pdf) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 11:01, 1 October 2012 Thumbnail for version as of 11:01, 1 October 2012 1,275 × 1,650 (10 KB) Dklein2012 (Talk | contribs) You cannot overwrite this file. Edit this file using an external application (See the setup instructions for more information) File usage The following 2 pages link to this file: GRR/Flowcharts GRR/Section 1-MT-a - Land Use Considerations

439

File:03UTBStateEasementProcess.pdf | Open Energy Information  

Open Energy Info (EERE)

UTBStateEasementProcess.pdf UTBStateEasementProcess.pdf Jump to: navigation, search File File history File usage File:03UTBStateEasementProcess.pdf Size of this preview: 463 × 599 pixels. Other resolution: 464 × 600 pixels. Full resolution ‎(1,275 × 1,650 pixels, file size: 27 KB, MIME type: application/pdf) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 12:13, 30 August 2012 Thumbnail for version as of 12:13, 30 August 2012 1,275 × 1,650 (27 KB) Jnorris (Talk | contribs) You cannot overwrite this file. Edit this file using an external application (See the setup instructions for more information) File usage The following 2 pages link to this file: GRR/Flowcharts GRR/Section 3-UT-b - State Easement Process

440

File:01ORALandUseConsiderations.pdf | Open Energy Information  

Open Energy Info (EERE)

1ORALandUseConsiderations.pdf 1ORALandUseConsiderations.pdf Jump to: navigation, search File File history File usage File:01ORALandUseConsiderations.pdf Size of this preview: 463 × 599 pixels. Other resolution: 464 × 600 pixels. Full resolution ‎(1,275 × 1,650 pixels, file size: 11 KB, MIME type: application/pdf) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 11:52, 28 September 2012 Thumbnail for version as of 11:52, 28 September 2012 1,275 × 1,650 (11 KB) Dklein2012 (Talk | contribs) You cannot overwrite this file. Edit this file using an external application (See the setup instructions for more information) File usage The following 2 pages link to this file: GRR/Flowcharts GRR/Section 1-OR-a - Land Use Considerations

Note: This page contains sample records for the topic "586-1076 secure file" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

File:01IDALandUseConsiderations.pdf | Open Energy Information  

Open Energy Info (EERE)

IDALandUseConsiderations.pdf IDALandUseConsiderations.pdf Jump to: navigation, search File File history File usage File:01IDALandUseConsiderations.pdf Size of this preview: 463 × 599 pixels. Other resolution: 464 × 600 pixels. Full resolution ‎(1,275 × 1,650 pixels, file size: 25 KB, MIME type: application/pdf) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 17:23, 25 October 2012 Thumbnail for version as of 17:23, 25 October 2012 1,275 × 1,650 (25 KB) Dklein2012 (Talk | contribs) You cannot overwrite this file. Edit this file using an external application (See the setup instructions for more information) File usage The following 2 pages link to this file: GRR/Flowcharts GRR/Section 1-ID-a - Land Use Considerations

442

File:Ors 358653 factsheet.pdf | Open Energy Information  

Open Energy Info (EERE)

Ors 358653 factsheet.pdf Ors 358653 factsheet.pdf Jump to: navigation, search File File history File usage File:Ors 358653 factsheet.pdf Size of this preview: 463 × 599 pixels. Other resolution: 464 × 600 pixels. Go to page 1 2 Go! next page → next page → Full resolution ‎(1,275 × 1,650 pixels, file size: 25 KB, MIME type: application/pdf, 2 pages) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 11:32, 20 November 2012 Thumbnail for version as of 11:32, 20 November 2012 1,275 × 1,650, 2 pages (25 KB) Dklein2012 (Talk | contribs) You cannot overwrite this file. Edit this file using an external application (See the setup instructions for more information) File usage There are no pages that link to this file.

443

File:Utah Trans Siting.pdf | Open Energy Information  

Open Energy Info (EERE)

Trans Siting.pdf Trans Siting.pdf Jump to: navigation, search File File history File usage File:Utah Trans Siting.pdf Size of this preview: 463 × 599 pixels. Other resolution: 464 × 600 pixels. Go to page 1 2 Go! next page → next page → Full resolution ‎(1,275 × 1,650 pixels, file size: 21 KB, MIME type: application/pdf, 2 pages) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 15:20, 13 November 2012 Thumbnail for version as of 15:20, 13 November 2012 1,275 × 1,650, 2 pages (21 KB) Dklein2012 (Talk | contribs) You cannot overwrite this file. Edit this file using an external application (See the setup instructions for more information) File usage There are no pages that link to this file.

444

File:Hrow-application-checklist.pdf | Open Energy Information  

Open Energy Info (EERE)

Hrow-application-checklist.pdf Hrow-application-checklist.pdf Jump to: navigation, search File File history File usage Metadata File:Hrow-application-checklist.pdf Size of this preview: 463 × 599 pixels. Other resolution: 464 × 600 pixels. Go to page 1 2 Go! next page → next page → Full resolution ‎(1,275 × 1,650 pixels, file size: 106 KB, MIME type: application/pdf, 2 pages) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 13:44, 13 June 2013 Thumbnail for version as of 13:44, 13 June 2013 1,275 × 1,650, 2 pages (106 KB) Apalazzo (Talk | contribs) You cannot overwrite this file. Edit this file using an external application (See the setup instructions for more information) File usage There are no pages that link to this file.

445

File:03MTEEncroachmentPermit.pdf | Open Energy Information  

Open Energy Info (EERE)

MTEEncroachmentPermit.pdf MTEEncroachmentPermit.pdf Jump to: navigation, search File File history File usage File:03MTEEncroachmentPermit.pdf Size of this preview: 463 × 599 pixels. Other resolution: 464 × 600 pixels. Full resolution ‎(1,275 × 1,650 pixels, file size: 19 KB, MIME type: application/pdf) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 12:06, 1 October 2012 Thumbnail for version as of 12:06, 1 October 2012 1,275 × 1,650 (19 KB) Dklein2012 (Talk | contribs) You cannot overwrite this file. Edit this file using an external application (See the setup instructions for more information) File usage The following 2 pages link to this file: GRR/Flowcharts GRR/Section 3-MT-e - Encroachment Permit

446

File:03NVBStateLandAccess.pdf | Open Energy Information  

Open Energy Info (EERE)

3NVBStateLandAccess.pdf 3NVBStateLandAccess.pdf Jump to: navigation, search File File history File usage File:03NVBStateLandAccess.pdf Size of this preview: 463 × 599 pixels. Other resolution: 464 × 600 pixels. Full resolution ‎(1,275 × 1,650 pixels, file size: 11 KB, MIME type: application/pdf) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 12:11, 15 October 2012 Thumbnail for version as of 12:11, 15 October 2012 1,275 × 1,650 (11 KB) Dklein2012 (Talk | contribs) You cannot overwrite this file. Edit this file using an external application (See the setup instructions for more information) File usage The following 2 pages link to this file: GRR/Flowcharts GRR/Section 3-NV-b - State Land Access Retrieved from

447

File:TCEQ-CoreDataForm.pdf | Open Energy Information  

Open Energy Info (EERE)

CoreDataForm.pdf CoreDataForm.pdf Jump to: navigation, search File File history File usage Metadata File:TCEQ-CoreDataForm.pdf Size of this preview: 463 × 599 pixels. Other resolution: 464 × 600 pixels. Go to page 1 2 Go! next page → next page → Full resolution ‎(1,275 × 1,650 pixels, file size: 213 KB, MIME type: application/pdf, 2 pages) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 10:12, 14 June 2013 Thumbnail for version as of 10:12, 14 June 2013 1,275 × 1,650, 2 pages (213 KB) Apalazzo (Talk | contribs) You cannot overwrite this file. Edit this file using an external application (See the setup instructions for more information) File usage There are no pages that link to this file.

448

File:App Geothermal PROSPECT.pdf | Open Energy Information  

Open Energy Info (EERE)

App Geothermal PROSPECT.pdf App Geothermal PROSPECT.pdf Jump to: navigation, search File File history File usage File:App Geothermal PROSPECT.pdf Size of this preview: 463 × 599 pixels. Other resolution: 464 × 600 pixels. Go to page 1 2 3 Go! next page → next page → Full resolution ‎(1,275 × 1,650 pixels, file size: 124 KB, MIME type: application/pdf, 3 pages) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 19:08, 16 November 2012 Thumbnail for version as of 19:08, 16 November 2012 1,275 × 1,650, 3 pages (124 KB) Dklein2012 (Talk | contribs) You cannot overwrite this file. Edit this file using an external application (See the setup instructions for more information) File usage There are no pages that link to this file.

449

Maps/Directions | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Visiting Us / Maps/Directions Visiting Us / Maps/Directions Maps/Directions Area Maps Oak Ridge-Knoxville Area - PDF file (199 KB) or web image (167 KB) City of Oak Ridge - PDF file (95 KB) or web image (110 KB) Directions to the Y-12 Visitor Center All visitors to the Y-12 National Security Complex must first check in at the Y-12 Visitor Center, which is open from 6:00 a.m. to 4:30 p.m. Eastern Time Monday through Thursday. The Visitor Center is located in New Hope Center, 602 Scarboro Road, at the corner of Scarboro and East Portal roads. The Visitor Center office is on the first floor of New Hope Center and accessible through the main lobby in the center of the building. Entry into the parking area is off East Portal Road. From McGhee Tyson Airport (29 miles) - From the airport, drive

450

File:07-CA-e - BLM-CEC Joint Siting Process.pdf | Open Energy...  

Open Energy Info (EERE)

Community Login | Sign Up Search File Edit History Facebook icon Twitter icon File:07-CA-e - BLM-CEC Joint Siting Process.pdf Jump to: navigation, search File File history File...

451

A systematic review of security requirements engineering  

Science Journals Connector (OSTI)

One of the most important aspects in the achievement of secure software systems in the software development process is what is known as Security Requirements Engineering. However, very few reviews focus on this theme in a systematic, thorough and unbiased ... Keywords: Requirements engineering, Secure development, Security, Security engineering, Security requirements, Security requirements engineering, Systematic review

Daniel Mellado; Carlos Blanco; Luis E. Snchez; Eduardo Fernndez-Medina

2010-06-01T23:59:59.000Z

452

Environment/Health/Safety/Security (EHSS): Security and Emergency Services  

NLE Websites -- All DOE Office Websites (Extended Search)

Security and Emergency Services Security and Emergency Services SEO Home page collage Documents Organization Chart Related Sites Fire Department Security Services EMERGENCY SERVICES The purpose of Berkeley Lab's Emergency Services is to ensure emergency resources are in maximum readiness, before, during, and after any emergency. ISSM: Integrated Safeguards and Security Management Security Updates MISSION STATEMENT: Provide integrated and efficient life safety, emergency and security services to all employees, guests, and users at the main Berkeley site and off-site facilities. Also, promote continuous improvement of the Lab's scientific and supportive activities. The core competencies of the group are: Emergency response to include fire suppression, emergency medical and hazmat response services

453

Instructions to CBECS 1995 Microdata Files  

Gasoline and Diesel Fuel Update (EIA)

5 Files 5 Files WHAT IS CBECS? Please Note: These microdata files, which contain building characteristics, energy consumption and expenditures, and energy end-use estimates replace the 1995 CBECS buildings characteristics files that were at this site. As a result of editing the consumption and expenditures data, some of the original estimates of number of buildings and square footage by energy sources and energy end uses have changed. CBECS is a national sample survey that collects statistical information on the consumption of and expenditures for energy in U.S. commercial buildings along with data on energy-related characteristics of the buildings. CBECS is conducted by the Energy Information Administration of the U.S. Department of Energy. The first CBECS was conducted in 1979 and then

454

Property:File/Author | Open Energy Information  

Open Energy Info (EERE)

Author Author Jump to: navigation, search Property Name File/Author Property Type String Description Individual that created the original file. Note that this will often not be the same as the individual that uploads the file to OpenEI. Pages using the property "File/Author" Showing 25 pages using this property. (previous 25) (next 25) B Banglmetst 221.pdf + Donna Heimiller + BrazilTMYst 238.pdf + Donna Heimiller + C Cammetst 58.pdf + Donna Heimiller + China Chifeng 50m Wind Power.pdf + Donna Heimiller + China Enshi 50m Wind Power.pdf + Donna Heimiller + China Fuzhou 50m Wind Power.pdf + Donna Heimiller + China Guangzhou 50m Wind Power.pdf + Donna Heimiller + China Haikou 50m Wind Power.pdf + Donna Heimiller + China Hangzhou 50m Wind Power.pdf + Donna Heimiller +

455

Parallel File Systems at HPC Centers: Usage,  

NLE Websites -- All DOE Office Websites (Extended Search)

File Systems at HPC Centers: Usage, Experiences, and Recommendations William ( Bill) E . A llcock ALCF D irector o f O pera:ons Production Systems: ALCF-2 2 Mira - B GQ s ystem -...

456

Tag: GTRI | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Global Security Well Logging Security Initiatives GTRI demonstrates the threat to the security of (oil) well logging systems and outlines the initiatives that are enhancing the...

457

Oak Ridge National Laboratory - Global Security Directorate  

NLE Websites -- All DOE Office Websites (Extended Search)

External Links Department of Homeland Security DHS Centers of Excellence Home Centers & Programs Department of Homeland Security Programs The Homeland Security Programs Office...

458

April 2014 | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Y-12 Press Release Apr 6, 2014 Security Improvements Project Completed Ahead of Schedule, 20 Million Under Budget The National Nuclear Security Administration's (NNSA) Security...

459

Sandia National Laboratories: Water Security Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Program Water Security Program Water Security CustomersPartners Awards Key Publications Staff Biographies Water Security In many areas of the United States and multiple regions of...

460

Integrated safeguards and security management plan  

E-Print Network (OSTI)

LBNL/PUB-3151 INTEGRATED SAFEGUARDS AND SECURITY MANAGEMENT76SF00098 iv Integrated Safeguards and Security Managementprovided. Appendix A. Safeguards and Security Plan http://

Bowen editor, Sue

2001-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "586-1076 secure file" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

Sandia National Laboratories: National Security Missions: Internationa...  

NLE Websites -- All DOE Office Websites (Extended Search)

Global Security casks We reduce proliferation and terrorism threats to U.S. national security through global technical engagement. Enhance security of vulnerable nuclear weapons...

462

INFORMATION SECURITY GUIDELINES TABLE OF CONTENTS  

E-Print Network (OSTI)

INFORMATION SECURITY GUIDELINES #12;CONSISTENT, EFFECTIVE INFORMATION SECURITY To respond to societal-to-date information security standards. Should we fail to do so, in the event

Prodiæ, Aleksandar

463

SECURITY ANALYSIS OF PROPOSEDTRAVELTO SENSITIVE COUNTRIES | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

SECURITY ANALYSIS OF PROPOSEDTRAVELTO SENSITIVE COUNTRIES SECURITY ANALYSIS OF PROPOSEDTRAVELTO SENSITIVE COUNTRIES Form is used to document travel to sensitive countries. SECURITY...

464

Security, Emergency Planning & Safety Records | Department of...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security, Emergency Planning & Safety Records Security, Emergency Planning & Safety Records ADM 180.pdf More Documents & Publications ADMINISTRATIVE RECORDS SCHEDULE 18: SECURITY,...

465

Personnel Security - DOE Directives, Delegations, and Requirements  

NLE Websites -- All DOE Office Websites (Extended Search)

472.2 Chg 1, Personnel Security by Mark Pekrul Functional areas: Personnel Security, Security, Human Capital The order establishes requirements that will enable DOE to operate a...

466

Personnel Security - DOE Directives, Delegations, and Requirements  

NLE Websites -- All DOE Office Websites (Extended Search)

2.2 Admin Chg 1, Personnel Security by Mark Pekrul Functional areas: Administrative Change, Personnel Security, Safety and Security The order establishes requirements that will...

467

File:Mou-34.pdf | Open Energy Information  

Open Energy Info (EERE)

Mou-34.pdf Jump to: navigation, search File File history File usage Metadata File:Mou-34.pdf Size of this preview: 464 600 pixels. Go to page 1 2 3 4 5 6 7 8 9 10 11 12 Go next...

468

TAX FILING INFORMATION FOR NONRESIDENT ALIENS  

E-Print Network (OSTI)

TAX FILING INFORMATION FOR NONRESIDENT ALIENS The tax filing information supplied here is being://www.irs.gov/pub/irspdf/p513.pdf o Pub 519 US Tax Guide for Aliens § http://www.irs.gov/pub/irspdf/p519.pdf o Pub 901 US;· IRS FEDERAL FORMS AND INSTRUCTIONS o Form 1040NREZ US Nonresident Alien Tax Return for Certain Non

Saldin, Dilano

469

Nuclear Safeguards and Security Challenge:  

National Nuclear Security Administration (NNSA)

Nuclear Safeguards and Security Nuclear Safeguards and Security Challenge: The international safeguards and security system is being challenged by evolving proliferation and terrorism threats, expanding International Atomic Energy Agency (IAEA) responsibilities, a retiring safeguards workforce, and the need for better technologies to detect and deter proliferation, theft, and sabotage. Response: Revitalize, strengthen, and sustain U.S. and international safeguards and security capabilities through the Next Generation Safeguards Initiative (NGSI) and International Nuclear Security programs that: * Support the development of safeguards and security policies, concepts and approaches * Develop human capital through training and education * Develop and implement new safeguards systems,

470

Cyber Security Issues and Requirements  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Program Program (SGIG) Cyber Security Issues and Requirements Jeff Dagle November 19, 2009 Communication and Information Technology will be Central to Smart Grid Deployment Final Interim Smart Grid Roadmap, prepared by the Electric Power Research Institute (EPRI) for the National Institute of Standards and Technology (NIST) Cyber Security Requirements Associated with ARRA Projects Proposals were required to include:  Discussion of how cyber security risks will be mitigated  What criteria will be used for vendor and technology selection  Relevant cyber security standards that will be followed (or industry best practices)  How emerging smart grid cyber security standards that are currently being developed will be adopted Cyber Security Objectives for Smart

471

National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites

National Nuclear Security Administration National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog US, UK, France Discuss Stockpile Stewardship, Arms Control and Nonproliferation and Visit the Nevada National Security Site Learn More NNSA DOE removes all remaining HEU from Hungary Learn More DOE removes all remaining HEU from Hungary Tiffany A. Blanchard-Case receives 2013 Linton Brooks Medal

472

Energy Security Initiatives Update  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Make Energy A Consideration in All We DoTM Make Energy A Consideration in All We DoTM ENERGY SECURITY INITIATIVES UPDATE Ms Karen White AFFEC On behalf of Mr Mike Aimone 1 Make Energy A Consideration in All We DoTM 2 Energy Security Initiatives AFCESA ETL 09-10 -- Aurora Electrical System Vulnerability Assessment and Mitigation Actions FUPWG-EEI CA Net Zero Energy Initiative (Vandenberg AFB, CA) Energy Security Tiger Team Visit (Ft Bliss, TX) National Renewable Energy Lab (NREL) Net Zero Pilot at Marine Corps Air Station Miramar and Naval Base Ventura County (San Nicolas Island) Smart Grid Initiatives: Maxwell AFB AL, Army BAAs (3 each); Naval Base Ventura County (San Nicholas Island) National Defense University sponsored Electric Grid War Game (Jul) Task Force on Grid Vulnerability (Gaps/Seams in S&T ) initiative (Joint

473

Security Clearances; Limitations  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

SEC. 1072. SECURITY CLEARANCES; LIMITATIONS. SEC. 1072. SECURITY CLEARANCES; LIMITATIONS. (a) In General.-Title III of the Intelligence Reform and Terrorism Prevention Act of 2004 (50 U.S.C. 435b) is amended by adding at the end the following new section: "SEC. 3002. SECURITY CLEARANCES; LIMITATIONS. "(a) Definitions.-In this section: "(1) Controlled substance.-The term `controlled substance' has the meaning given that term in section 102 of the Controlled Substances Act (21 U.S.C. 802). "(2) Covered person.-The term `covered person' means- "(A) an officer or employee of a Federal agency; "(B) a member of the Army, Navy, Air Force, or Marine Corps who is on active duty or is in an active status; and "(C) an officer or employee of a contractor of a Federal agency.

474

File:Federal Hydropower - Southwestern Power Administration.pdf | Open  

Open Energy Info (EERE)

Administration.pdf Administration.pdf Jump to: navigation, search File File history File usage Metadata File:Federal Hydropower - Southwestern Power Administration.pdf Size of this preview: 463 × 599 pixels. Other resolution: 464 × 600 pixels. Go to page 1 2 Go! next page → next page → Full resolution ‎(1,275 × 1,650 pixels, file size: 715 KB, MIME type: application/pdf, 2 pages) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 15:35, 22 May 2013 Thumbnail for version as of 15:35, 22 May 2013 1,275 × 1,650, 2 pages (715 KB) Graham7781 (Talk | contribs) You cannot overwrite this file. Edit this file using an external application (See the setup instructions for more information) File usage

475

File:CV TidePotential.pdf | Open Energy Information  

Open Energy Info (EERE)

TidePotential.pdf TidePotential.pdf Jump to: navigation, search File File history File usage Cape Verde-Map Summarizing Tide Potential Size of this preview: 776 × 600 pixels. Full resolution ‎(1,650 × 1,275 pixels, file size: 189 KB, MIME type: application/pdf) Description Cape Verde-Map Summarizing Tide Potential Creation Date 2011/11/15 Coordinates 16.002082°, -24.013197° File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 13:16, 16 November 2011 Thumbnail for version as of 13:16, 16 November 2011 1,650 × 1,275 (189 KB) STobin (Talk | contribs) You cannot overwrite this file. Edit this file using an external application (See the setup instructions for more information) File usage The following page links to this file:

476

File:Archaeology excavation permit.pdf | Open Energy Information  

Open Energy Info (EERE)

Archaeology excavation permit.pdf Archaeology excavation permit.pdf Jump to: navigation, search File File history File usage File:Archaeology excavation permit.pdf Size of this preview: 463 × 599 pixels. Other resolution: 464 × 600 pixels. Go to page 1 2 3 4 5 6 7 Go! next page → next page → Full resolution ‎(1,275 × 1,650 pixels, file size: 201 KB, MIME type: application/pdf, 7 pages) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 13:58, 20 November 2012 Thumbnail for version as of 13:58, 20 November 2012 1,275 × 1,650, 7 pages (201 KB) Dklein2012 (Talk | contribs) You cannot overwrite this file. Edit this file using an external application (See the setup instructions for more information) File usage

477

Category:Map Files | Open Energy Information  

Open Energy Info (EERE)

image files, and where available, links to KMZ image files, and where available, links to KMZ sources used to generate the image files. Add.png Add a new Map File Subcategories This category has the following 4 subcategories, out of 4 total. M [×] Map Image Files‎ [×] Map PDF Files‎ N [×] NREL Map Files‎ 1 pages S [×] SWERA Map Files‎ Media in category "Map Files" The following 200 files are in this category, out of 1,687 total. (previous 200) (next 200) Australia-Solar-Map.png Australia-Solar-Map.png 55 KB Banglmetst 221.pdf Banglmetst 221.pdf 5.42 MB Black.Warrior.Basin usgs.map.pdf Black.Warrior.Basin us... 148 KB BOEMRE atlantic.OCS.multiple.use.map.2003.pdf BOEMRE atlantic.OCS.mu... 3.06 MB BOEMRE lease.platforms.santa.barb.map.5.2010.pdf BOEMRE lease.platforms... 1.41 MB BOEMRE OCS.oil.gas.2007-12.map.pdf

478

New Security Challenges in the Global Era: Environmental Security  

NLE Websites -- All DOE Office Websites (Extended Search)

New Security Challenges in the Global Era: Environmental Security New Security Challenges in the Global Era: Environmental Security Speaker(s): Beth Chalecki Date: October 4, 2001 - 12:00pm Location: Bldg. 90 Seminar Host/Point of Contact: Mithra Moezzi The environment is the planetary support system on which all other human enterprises depend. If political, social, cultural, religious, and most importantly economic systems are to remain secure and viable, the environment must also remain secure and viable. This makes global environmental conditions a legitimate U.S. national security concern. The security of individuals, communities, nations, and the entire global community is increasingly jeopardized by unpremeditated, non-military environmental threats. These threats are self-generated: we perpetrate them on ourselves, by fouling our air and water, and over-harvesting our land.

479

The security fallacy: Seven myths about physical security | Argonne  

NLE Websites -- All DOE Office Websites (Extended Search)

Watch Roger Johnston speak on voting machine security in the Illinois area. Watch Roger Johnston speak on voting machine security in the Illinois area. Watch Roger Johnston speak on voting machine security in the Illinois area. Because orbiting satellites send GPS signals from space, they are faint and easily overriden by stronger signals. Image credit: NASA. Because orbiting satellites send GPS signals from space, they are faint and easily overriden by stronger signals. Image credit: NASA. Security cameras aren't all they're cracked up to be. Image credit: Jaymis Loveday. Security cameras aren't all they're cracked up to be. Image credit: Jaymis Loveday. The security fallacy: Seven myths about physical security By Louise Lerner * October 26, 2010 Tweet EmailPrint The high-tech access control device was secure, sophisticated, and complex;

480

Security Science: The Theory and Practice of Security  

Science Journals Connector (OSTI)

Security Science integrates the multi-disciplined practice areas of security into a single structured body of knowledge, where each chapter takes an evidence-based approach to one of the core knowledge categories. The authors give practitioners ...

Clifton Smith; David J Brooks

2012-12-01T23:59:59.000Z

Note: This page contains sample records for the topic "586-1076 secure file" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

T-592: Cisco Security Advisory: Cisco Secure Access Control System...  

Office of Environmental Management (EM)

can change the passwords of arbitrary users. PLATFORM: Cisco Secure ACS versions 5.1 patch 3, 4, and 5; 5.2; 5.2 patch 1 and 2 ABSTRACT: Cisco Secure ACS operates as a...

482

Environment/Health/Safety/Security (EHSS): Security & Emergency Services:  

NLE Websites -- All DOE Office Websites (Extended Search)

Security & Emergency Services Security & Emergency Services Security Update ID Cards Gate Procedures Visitor/Guest Access Bus/Shuttle Reporting Foreign Contacts Mail Handling Contacts Cyber Protection Website ISSM Website ISSM: Counterintelligence and Counterterrorism Emergency Services Website Security and Emergency Operations Website Security Update THREAT ASSESSMENT: January 9, 2004-- The Department of Energy has directed all DOE sites to lower their security status to Secon Level 3, to coincide with the Department of Homeland Security advisory system. Security measures as listed below are in place. If you have any questions, call Dan Lunsford at x6016. ID Cards: Every employee must have a valid LBNL proximity badge and either wear it or produce it upon request. Badges and clips are available in the Site Access

483

National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

U.S. Department of Energy National Nuclear Security Administration Federal Equal Opportunity Recruitment Program Plan Certification - Fiscal Year 2011 Please type or print clearly and return this sheet with original signature to: Ms. Carmen Andujar, Manager Recruiting, Examining and Assessment Group Center for Talent and Capacity Policy Strategic Human Resources Policy Attn: FY 2011 FEORP Report U.S. Office of Personnel Management 1900 E Street, NW, Room 6547 Washington, D.C. 20415-9800 A. Name and Address of Agency National Nuclear Security Administration 1000 Independence Avenue, SW Washington, DC 20585 B. Name and Title of Designated FEORP Official (include address, if different from above,

484

National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

U.S. Department of Energy National Nuclear Security Administration Federal Equal Opportunity Recruitment Program Plan Certification - Fiscal Year 2009 Please type or print clearly and return this sheet with original signature to: Ms. Carmen Andujar, Manager Recruiting, Examining and Assessment Group Center for Talent and Capacity Policy Strategic Human Resources Policy Attn: FY 2009 FEORP Report U.S. Office of Personnel Management 1900 E Street, NW, Room 6547 Washington, D.C. 20415-9800 A. Name and Address of Agency National Nuclear Security Administration Office of Diversity and Outreach 1000 Independence Avenue, SW Washington, DC 20585 B. Name and Title of Designated FEORP Official (include address, if different from above,

485

Engineering secure software  

E-Print Network (OSTI)

Irratitnte Incidents Reported to CFRT/CC 2D ODD 15000 10000 5DOO 1988 1989 1990 1991 1992 1993 1994 1995 1996 1997 1998 1999 2000 o = wi cor rwe toter tarte" tr Fig. 1: CERT security incident growth from 1988-2000 IZ] This thesis follows the style... Irratitnte Incidents Reported to CFRT/CC 2D ODD 15000 10000 5DOO 1988 1989 1990 1991 1992 1993 1994 1995 1996 1997 1998 1999 2000 o = wi cor rwe toter tarte" tr Fig. 1: CERT security incident growth from 1988-2000 IZ] This thesis follows the style...

Jetly, Prateek

2012-06-07T23:59:59.000Z

486

Quantum-secured imaging  

E-Print Network (OSTI)

We have built an imaging system that uses a photon's position or time-of-flight information to image an object, while using the photon's polarization for security. This ability allows us to obtain an image which is secure against an attack in which the object being imaged intercepts and resends the imaging photons with modified information. Popularly known as "jamming," this type of attack is commonly directed at active imaging systems such as radar. In order to jam our imaging system, the object must disturb the delicate quantum state of the imaging photons, thus introducing statistical errors that reveal its activity.

Mehul Malik; Omar S. Magaa-Loaiza; Robert W. Boyd

2012-12-11T23:59:59.000Z

487

Smart Grid Embedded Cyber Security: Ensuring Security While Promoting Interoperability  

E-Print Network (OSTI)

of Smart Grid devices ? Describe progress made in Smart Grid security ? Propose a more robust approach to SG security ? Describe needs for further research and development ESL-HH-10-08-09 Proceedings of the 17th Symposium for Improving Building Systems...? ? Advanced security methods ? Power analysis for key discovery ? Hardware attacks such as ?decapping? chips ? Developing vulnerability exploits ? Security analysis of smart grid systems & communications ? Reverse engineering ? Penetration testing ? Threat...

Ragsdale, G.

488

FIA-12-0037 - In the Matter of National Security Archive | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

37 - In the Matter of National Security Archive 37 - In the Matter of National Security Archive FIA-12-0037 - In the Matter of National Security Archive the Department of Energy's (DOE) Office of Hearings and Appeals (OHA) Director denied a Freedom of Information Act (FOIA) Appeal filed by the National Security Archive (Appellant). The DOE's Office of Information Resources (OIR) did not locate any documents responsive to the Appellant's request. The Appellant requested documents related to the Tianjin Climate Change Talks held October 4 to 9, 2010. The Appellant listed three DOE official who it alleged participated in the conference, Casey Delhotal, Richard Duke, and Elmer Holt. Dr. Delhotal and Mr. Duke indicated that although they were in Tianjin during the conference, they were there to talk to the National Development Reform Commission, who

489

Securing Internet Freedom Security, Privacy and Global Governance  

E-Print Network (OSTI)

once again. People use the Internet responsibly and don't abuse each other. The dream involves nothing1 Securing Internet Freedom Security, Privacy and Global Governance Milton Mueller #12;2 #12;3 #12 Internet Freedom Security, Privacy and Global Governance #12;6 #12;7 1. TheDream I want to begin by killing

Mueller, Milton

490

GAANN -Computer Systems Security GAANN Computer Systems Security  

E-Print Network (OSTI)

GAANN - Computer Systems Security GAANN ­ Computer Systems Security · What is computer systems security? ­ The protection of all aspects of a computer system from unauthorized use · Why is it important? ­ Computing devices have a large impact on our daily life ­ Guaranteeing that the devices perform as desired

Alpay, S. Pamir

491

Safety and Security What do Safety/Security work with?  

E-Print Network (OSTI)

Safety and Security on campus #12;Agenda · What do Safety/Security work with? · If something happens · Opening hours · Remember · Website · How to find us #12;The Section for Safety and Security work with Police reports · Education in "First medical aid" · Education in laboratory safety #12;If something

492

file://S:\SP\McLaughlin\May 2007 OR CIC Report\2006_OR_CIC_Repo  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Inspection of Inspection of Classification and Information Control Programs at the Oak Ridge Office, Oak Ridge National Laboratory, East Tennessee Technology Park, and the United States Enrichment Corporation American Centrifuge Technology Program May 2007 Prepared by Office of Security Evaluations Office of Independent Oversight Office of Health, Safety and Security Office of the Secretary of Energy Table of Contents Abbreviations Used in This Report 1.0 Introduction Page 1 of 9 2006 ORO CIC Report 7/12/2007 file://S:\SP\McLaughlin\May 2007 OR CIC Report\2006_OR_CIC_Report.htm 2.0 Status and Results 2.1 Program Administration 2.2 Authorities 2.3 Guidance 2.4 Training 2.5 Document Reviews 2.6 Program Evaluation

493

Security Cases | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

31, 2012 31, 2012 PSH-11-0029 - In the Matter of Personnel Security Hearing The individual is employed by a Department of Energy (DOE) contractor, and was granted a security clearance in connection with that employment. A routine reinvestigation of the individual revealed information concerning his finances that raised security concerns, and the local security office (LSO)summoned the individual for an interview with a personnel security specialist in August 2011. March 30, 2012 PSH-12-0002 - In the Matter of Personnel Security Hearing The individual has been employed by a Department of Energy (DOE) contractor since 1997, and has held a DOE access authorization for over 10 years. In October 2011, the individual tested positive for marijuana on a random drug test. The local security office (LSO) conducted a personnel security

494

Security Cases | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security Cases Security Cases Security Cases RSS December 23, 2013 PSH-13-0103 - In the Matter of Personnel Security On January 29, 2013, the Individual completed and submitted a Questionnaire for National Security Positions (QNSP) to a Local Security Office (LSO). In this QNSP, the Individual admitted that he had used a neighbor's internet connection without permission on several occasions in 2010 and 2011, and had downloaded copyrighted software and media to his computer without permission from the copyright holders from 2000 through 2006. Exhibit 7 at 18-19. December 20, 2013 PSH-13-0102 - In the Matter of Personnel Security On December 20, 2013, a Hearing Officer determined that an individual's security clearance should be restored. In reaching this determination, the

495

Departmental Personnel Security- Clearance Automation  

Energy.gov (U.S. Department of Energy (DOE))

The primary objective of the DOE Integrated Security System (eDISS+) Initiative is to support the integration of multiple DOE security systems and databases. This integrated environment provides...

496

Automated analysis of security APIs  

E-Print Network (OSTI)

Attacks on security systems within the past decade have revealed that security Application Programming Interfaces (APIs) expose a large and real attack surface but remain to be a relatively unexplored problem. In 2000, ...

Lin, Amerson H

2005-01-01T23:59:59.000Z

497

INFORMATION SECURITY University Policy No: IM7800  

E-Print Network (OSTI)

Page 1 INFORMATION SECURITY POLICY University Policy No: IM7800 Classification: Information to an Information Security Incident Procedures for Addressing Security Vulnerabilities of University Information Resources and Information Systems University Information Security Classification Procedures Procedures

Herwig, Falk

498

Architectural support for enhancing security in clusters  

E-Print Network (OSTI)

to security, numerous security loopholes in cluster servers come to the forefront. Clusters usually rely on rewalls for their security, but the rewalls cannot prevent all security attacks; therefore, cluster systems should be designed to be robust...

Lee, Man Hee

2009-05-15T23:59:59.000Z

499

East Asian Security in 2025  

E-Print Network (OSTI)

East Asian Security in 2025 Who We Are Reagan Heavin Energy Adam Hudson State Capacity Brandon Krueger Military Sean ONeil Demographics Griffin Rozell Balance of Power Matt Suma Economy East Asian Security in 2025 China...: Competition, Cooperation, Plateau? Reagan Heavin Adam Hudson Brandon Krueger Sean ONeil Griffin Rozell Matt Suma 24 April 2008 East Asian Security in 2025 Agenda Conclusions Projections Drivers Four Outcomes Questions East Asian Security in 2025...

Heavin, Reagan; Hudson, Adam; Krueger, Brandon; O'Neil, Sean; Rozell, Griffin; Suma, Matt

2008-01-01T23:59:59.000Z

500

About SRNL - Directorates - National Security  

NLE Websites -- All DOE Office Websites (Extended Search)

National Security Environmental Stewardship Science and Technology Clean Energy Nuclear Materials Program Integration Strategic Development and Technical Partnerships Global...