Powered by Deep Web Technologies
Note: This page contains sample records for the topic "deutsche securities korea" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

Image, Incorporated : a study of securities buildings in Seoul, Korea  

E-Print Network (OSTI)

This study deals with the images of corporate high-rises in Seoul, Korea, the main city of a rapidly growing industrial nation. The questions explored concern mainly the images of office high-rises. Five multi-story ...

Chang, Ji-in

1992-01-01T23:59:59.000Z

2

The Division System in Crisis: Essays on Contemporary Korea  

E-Print Network (OSTI)

1996). Trans. ] 2. Paik, South Korea: Unification and the7 8. See Paik, South Korea, especially 7678. A similarder Vereinigung Deutsch lands fr Korea, in Deutschland und

Nak-chung, Paik

2011-01-01T23:59:59.000Z

3

Security  

Science Conference Proceedings (OSTI)

... Security. Organizations need standards, guidelines, and ... to support health IT implementations. HIPAA Security Rule Toolkit. ...

2011-12-05T23:59:59.000Z

4

EMAU Greifswald Studierende Kpfe (Deutsche) entsprechend amtl. Statistik  

E-Print Network (OSTI)

EMAU Greifswald Studierende Köpfe (Deutsche) entsprechend amtl. Statistik SS 11 1. Studienfach Mecklenburg-Vorpommern Deutsche Studenten Rechtswissenschaft 624 Mecklenburg Vorpommern Rechtswissenschaft 63 Greifswald Studierende Köpfe (Deutsche) entsprechend amtl. Statistik SS 11 1. Studienfach insgesamt

Greifswald, Ernst-Moritz-Arndt-Universität

5

Deutsches Windenergie Institut | Open Energy Information  

Open Energy Info (EERE)

Deutsches Windenergie Institut Deutsches Windenergie Institut Jump to: navigation, search Logo: Deutsches Windenergie Institut Name Deutsches Windenergie Institut Address Ebertstrasse 96 D-26382 Place Wilhelmshaven, Germany Year founded 1990 Phone number +49 (0) 4421 4808 0 Coordinates 53.5180401°, 8.1191847° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":53.5180401,"lon":8.1191847,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

6

Korea, South - Analysis - U.S. Energy Information ...  

U.S. Energy Information Administration (EIA)

In an effort to improve the nation's energy security, ... South Korea is home to the single largest aromatics production site in the world, owned by GS Caltex.

7

EMAU Greifswald Studierende Kpfe (Deutsche) entsprechend amtl. Statistik  

E-Print Network (OSTI)

EMAU Greifswald Studierende Köpfe (Deutsche) entsprechend amtl. Statistik WS 05/06 1. Studienfach-Holstein Rechtswissenschaft 13 Thüringen 1128 Deutsche Studenten Rei?land Page 1 #12;EMAU Greifswald Studierende Köpfe (Deutsche) entsprechend amtl. Statistik WS 05/06 1. Studienfach insgesamt Bundesland Deutsche Studenten

Greifswald, Ernst-Moritz-Arndt-Universität

8

EMAU Greifswald Studierende Kpfe (Deutsche) entsprechend amtl. Statistik  

E-Print Network (OSTI)

EMAU Greifswald Studierende Köpfe (Deutsche) entsprechend amtl. Statistik WS 06/07 1. Studienfach Thüringen 687 Deutsche Studenten Rei?land Page 1 #12;EMAU Greifswald Studierende Köpfe (Deutsche Greifswald Studierende Köpfe (Deutsche) entsprechend amtl. Statistik WS 06/07 Dänisch 2 Mecklenburg

Greifswald, Ernst-Moritz-Arndt-Universität

9

EIA April 2009  

U.S. Energy Information Administration (EIA) Indexed Site

This report is distributed in Hong Kong by Deutsche Bank AG, Hong Kong Branch, in Korea by Deutsche Securities Korea Co. and in Singapore by Deutsche Bank AG, Singapore...

10

Vorlesung zur deutsch-britischen Geschichte  

E-Print Network (OSTI)

Chemie, synthetischer organischer und anorganischer Chemie, Biologie, Statistik und Modellierung so- wie wurde das ,,Hum- boldt-ProMint-Kolleg", dessen Sprecher er ist, feierlich eröffnet. Das von der Deutsche Leistungen auf dem gesamten Gebiet der Chemie auszeichnet. Heinz Grünert zum Gedenken Der langjährige Leiter

Röder, Beate

11

DBD Deutsche Biodiesel GmbH | Open Energy Information  

Open Energy Info (EERE)

DBD Deutsche Biodiesel GmbH Jump to: navigation, search Name DBD Deutsche Biodiesel GmbH Place Berlin, Germany Product Developer of the DBD Regensberg biodiesel project. References...

12

EMAU Greifswald Studierende Kpfe (Deutsche) entsprechend amtl. Statistik  

E-Print Network (OSTI)

EMAU Greifswald Studierende Köpfe (Deutsche) entsprechend amtl. Statistik WS 07/08 1. Studienfach Deutsche Studenten Dez. 2 Ref. 1 Planung Controlling / Berichtswesen / Statistik Page 1 Rei?land #12;EMAU Greifswald Studierende Köpfe (Deutsche) entsprechend amtl. Statistik WS 07/08 1. Studienfach insgesamt

Greifswald, Ernst-Moritz-Arndt-Universität

13

EMAU Greifswald Studierende Kpfe (Deutsche) entsprechend amtl. Statistik  

E-Print Network (OSTI)

EMAU Greifswald Studierende Köpfe (Deutsche) entsprechend amtl. Statistik WS 12/13 1. Studienfach-Holstein Rechtswissenschaft 16 Thüringen 1385 Deutsche Studierende Ref. 2.4 Controlling und Statistik Page 1 Rei?land #12;EMAU Greifswald Studierende Köpfe (Deutsche) entsprechend amtl. Statistik WS 12/13 1. Studienfach insgesamt

Greifswald, Ernst-Moritz-Arndt-Universität

14

EMAU Greifswald Studierende Kpfe (Deutsche) entsprechend amtl. Statistik  

E-Print Network (OSTI)

EMAU Greifswald Studierende Köpfe (Deutsche) entsprechend amtl. Statistik SS 12 1. Studienfach-Holstein Rechtswissenschaft 16 Thüringen 1336 Deutsche Studierende Ref. 2.4 Controlling und Statistik Page 1 Rei?land #12;EMAU Greifswald Studierende Köpfe (Deutsche) entsprechend amtl. Statistik SS 12 1. Studienfach insgesamt

Greifswald, Ernst-Moritz-Arndt-Universität

15

EMAU Greifswald Studierende Kpfe (Deutsche) entsprechend amtl. Statistik  

E-Print Network (OSTI)

EMAU Greifswald Studierende Köpfe (Deutsche) entsprechend amtl. Statistik SS 2009 1. Studienfach-Holstein Rechtswissenschaft 13 Thüringen 1254 Deutsche Studenten Ref. 9 Planung Controlling / Berichtswesen / Statistik Page 1 Rei?land #12;EMAU Greifswald Studierende Köpfe (Deutsche) entsprechend amtl. Statistik SS 2009 1

Greifswald, Ernst-Moritz-Arndt-Universität

16

EMAU Greifswald Studierende Kpfe (Deutsche) entsprechend amtl. Statistik  

E-Print Network (OSTI)

EMAU Greifswald Studierende Köpfe (Deutsche) entsprechend amtl. Statistik WS 08/09 1. Studienfach-Holstein Rechtswissenschaft 10 Thüringen 1254 Deutsche Studenten Dez. 2 Ref. 1 Planung Controlling / Berichtswesen / Statistik Page 1 Rei?land #12;EMAU Greifswald Studierende Köpfe (Deutsche) entsprechend amtl. Statistik WS 08

Greifswald, Ernst-Moritz-Arndt-Universität

17

EMAU Greifswald Studierende Kpfe (Deutsche) entsprechend amtl. Statistik  

E-Print Network (OSTI)

EMAU Greifswald Studierende Köpfe (Deutsche) entsprechend amtl. Statistik WS 10/11 1. Studienfach Mecklenburg Vorpommern Deutsche Studenten Rechtswissenschaft 621 Mecklenburg-Vorpommern Rechtswissenschaft 50 Greifswald Studierende Köpfe (Deutsche) entsprechend amtl. Statistik WS 10/11 1. Studienfach insgesamt

Greifswald, Ernst-Moritz-Arndt-Universität

18

EMAU Greifswald Studierende Kpfe (Deutsche) entsprechend amtl. Statistik  

E-Print Network (OSTI)

EMAU Greifswald Studierende Köpfe (Deutsche) entsprechend amtl. Statistik SS 08 1. Studienfach 62 Schleswig-Holstein Rechtswissenschaft 14 Thüringen 1215 Deutsche Studenten Dez. 2 Ref. 1 Planung Controlling / Berichtswesen / Statistik Page 1 Rei?land #12;EMAU Greifswald Studierende Köpfe (Deutsche

Greifswald, Ernst-Moritz-Arndt-Universität

19

EMAU Greifswald Studierende Kpfe (Deutsche) entsprechend amtl. Statistik  

E-Print Network (OSTI)

EMAU Greifswald Studierende Köpfe (Deutsche) entsprechend amtl. Statistik 1. Studienfach insgesamt Thüringen 1365 Deutsche Studenten Ref. 9 Planung Controlling / Berichtswesen / Statistik Page 1 Rei?land #12;EMAU Greifswald Studierende Köpfe (Deutsche) entsprechend amtl. Statistik Rechtswissenschaft 597

Greifswald, Ernst-Moritz-Arndt-Universität

20

EMAU Greifswald Studierende Kpfe (Deutsche) entsprechend amtl. Statistik  

E-Print Network (OSTI)

EMAU Greifswald Studierende Köpfe (Deutsche) entsprechend amtl. Statistik WS 11/12 1. Studienfach Thüringen 1368 Deutsche Studierende 1368 Rechtswissenschaft 650 Mecklenburg-Vorpommern Rechtswissenschaft 63 Studierende Köpfe (Deutsche) entsprechend amtl. Statistik WS 11/12 1. Studienfach insgesamt Bundesland

Greifswald, Ernst-Moritz-Arndt-Universität

Note: This page contains sample records for the topic "deutsche securities korea" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

EMAU Greifswald Studierende Kpfe (Deutsche) entsprechend amtl. Statistik  

E-Print Network (OSTI)

EMAU Greifswald Studierende Köpfe (Deutsche) entsprechend amtl. Statistik WS 09/10 1. Studienfach Thüringen Deutsche Studenten Betriebswirtschaftslehre 12 Thüringen 1300 Rechtswissenschaft 622 Mecklenburg / Berichtswesen / Statistik Page 1 Rei?land #12;EMAU Greifswald Studierende Köpfe (Deutsche) entsprechend amtl

Greifswald, Ernst-Moritz-Arndt-Universität

22

EMAU Greifswald Studierende Kpfe (Deutsche) entsprechend amtl. Statistik  

E-Print Network (OSTI)

EMAU Greifswald Studierende Köpfe (Deutsche) entsprechend amtl. Statistik SS 2007 1. Studienfach-Holstein Rechtswissenschaft 10 Thüringen 1010 Deutsche Studenten Dez. 2 Abt. 1 Conrolling/ Berichtswesen/ Statistik Rei?land #12;EMAU Greifswald Studierende Köpfe (Deutsche) entsprechend amtl. Statistik SS 2007 Medizin 343

Greifswald, Ernst-Moritz-Arndt-Universität

23

DEE Deutsche Erneuerbare Energien GmbH | Open Energy Information  

Open Energy Info (EERE)

DEE Deutsche Erneuerbare Energien GmbH DEE Deutsche Erneuerbare Energien GmbH Jump to: navigation, search Name DEE - Deutsche Erneuerbare Energien GmbH Place Düsseldorf, Germany Zip 40215 Sector Biomass, Wind energy Product DEE is investing globally in equity of small and medium sized projects. At the moment DEE mainly focus on wind and biomass projects. References DEE - Deutsche Erneuerbare Energien GmbH[1] LinkedIn Connections CrunchBase Profile No CrunchBase profile. Create one now! This article is a stub. You can help OpenEI by expanding it. DEE - Deutsche Erneuerbare Energien GmbH is a company located in Düsseldorf, Germany . References ↑ "[ DEE - Deutsche Erneuerbare Energien GmbH]" Retrieved from "http://en.openei.org/w/index.php?title=DEE_Deutsche_Erneuerbare_Energien_GmbH&oldid=344

24

NNSA, Republic of Korea Ministry Agree to Minimize Use of HEU...  

National Nuclear Security Administration (NNSA)

Republic of Korea Ministry Agree to Minimize Use of HEU in Nuclear Reactors | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation...

25

Accelerators | Photon Science | Particle Physics Deutsches Elektronen-Synchrotron  

E-Print Network (OSTI)

Accelerators | Photon Science | Particle Physics Deutsches Elektronen-Synchrotron A Research Centre and documentation. For further questions please do not hesitate to contact Prof. Dr. Chris Meier (chris.meier@chemie-Mail to: Deutsches Elektronen-Synchrotron DESY Human Resources Department | Code: EM085/2013 Notkestra?e

26

Sunpower Korea | Open Energy Information  

Open Energy Info (EERE)

Sunpower Korea Jump to: navigation, search Name Sunpower Korea Place Daejeongwangyeok-Si, Korea (Republic) Sector Solar Product Manufacturer of solar modules and inverters....

27

CO2 Emissions - United Korea  

NLE Websites -- All DOE Office Websites (Extended Search)

Fossil Fuel CO2 Emissions Regional Centrally Planned Asia United Korea CO2 Emissions from United Korea Data graphic Data CO2 Emissions from United Korea...

28

DS Deutsche Solargesellschaft mbH | Open Energy Information  

Open Energy Info (EERE)

DS Deutsche Solargesellschaft mbH DS Deutsche Solargesellschaft mbH Jump to: navigation, search Name DS Deutsche Solargesellschaft mbH Place Heilbronn, Germany Zip 74074 Sector Solar Product DS Deutsche Solargesellschaft markets PV installations in Spain to mostly German private investors. Coordinates 49.143145°, 9.219295° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":49.143145,"lon":9.219295,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

29

Secretary Chu to Join President Obama at Nuclear Security Summit...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security Summit WHEN: Monday, March 26 and Tuesday, March 27 WHERE: Seoul, Republic of Korea Media Accreditation information can be found online at http:www.thenuclearsecuritysu...

30

Studiengang Bachelor Studiengangsmoderator Zugangsinformationen Unterrichtssprache Fakultt Afrikanische Sprachen, Literaturen und Kunst B.A. Prof. D. Ibriszimow Deutsch 4  

E-Print Network (OSTI)

Studienrichtung Biophysik B.Sc. Prof. W. Köhler Deutsch 1 C Chemie B.Sc. Prof. J. Senker Deutsch 2 D E Economics B A Afrikanische Sprachen, Literaturen und Kunst B.A. Prof. D. Ibriszimow Deutsch 4 Angewandte Informatik B.A. Prof. D. Henrich Deutsch 1 Anglistik B.A. Prof. M. Steppat Deutsch 4 B Berufliche Bildung, Fachrichtung

Schmidt, Matthias

31

Sources of History of Nursing in Korea  

E-Print Network (OSTI)

Sources of Nursing History in Korea, 1886-1911. Commissionedthe nursing profession in Korea. Regarding the publicationearly modern and colonial Korea, and stimulate the in-depth

UCLA Center for the Study of Women

2012-01-01T23:59:59.000Z

32

South Korea - NETL Cooperation | Open Energy Information  

Open Energy Info (EERE)

Korea - NETL Cooperation Jump to: navigation, search Name South Korea - NETL Cooperation AgencyCompany Organization National Energy Technology Laboratory Partner South Korea...

33

AstroKorea | Open Energy Information  

Open Energy Info (EERE)

AstroKorea Jump to: navigation, search Name AstroKorea Place Korea (Republic) Sector Solar Product General project contractor, which has some experience installing solar PV...

34

SolarWorld Korea | Open Energy Information  

Open Energy Info (EERE)

SolarWorld Korea Jump to: navigation, search Name SolarWorld Korea Place Korea (Republic) Sector Solar Product Korea-based JV set up by SolarWorld AG and SolarPark Engineering Co...

35

Gender and Modernity in Colonial Korea  

E-Print Network (OSTI)

Kim Gender & Modernity in Colonial Korea T was central toprocess in colonial Korea (19101945). A consideration of

Jung-Kim, Jennifer J.

2006-01-01T23:59:59.000Z

36

Preparing for the 2012 Nuclear Security Summit | National Nuclear...  

National Nuclear Security Administration (NNSA)

about prepreations for the 2012 Nuclear Security Summit to be held in Seoul, South Korea. She writes: "Even though I'd been aware of many of these events as they happened, it...

37

Das Deutsche Elektronen-Synchrotron DESY mit seinen Standorten Hamburg und Zeuthen ist eines  

E-Print Network (OSTI)

Vorwort Vorwort Das Deutsche Elektronen-Synchrotron DESY mit seinen Standorten Hamburg und Zeuthen Oberflächenpyhsik, Geo- wissenschaften, Chemie und Materialforschung bis hinzurMolekularbiologiereicht. Die Hamburg von seinen Zuwendungsgebern, der Bundesrepublik Deutsch- land (90%) und der Freien und Hansestadt

38

Security Perimeter  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Perimeter Security Perimeter Protecting the Laboratory against threats and vulnerabilities. Contact Security Perimeter Coordinators Email The security perimeter helps to...

39

Deutsche Rotor und Turm Service GmbH Co KG DRTS | Open Energy Information  

Open Energy Info (EERE)

Rotor und Turm Service GmbH Co KG DRTS Rotor und Turm Service GmbH Co KG DRTS Jump to: navigation, search Name Deutsche Rotor und Turm Service GmbH & Co KG (DRTS) Place Bremen, Germany Zip 28239 Sector Wind energy Product Service company for wind turbine blades and towers. References Deutsche Rotor und Turm Service GmbH & Co KG (DRTS)[1] LinkedIn Connections CrunchBase Profile No CrunchBase profile. Create one now! This article is a stub. You can help OpenEI by expanding it. Deutsche Rotor und Turm Service GmbH & Co KG (DRTS) is a company located in Bremen, Germany . References ↑ "Deutsche Rotor und Turm Service GmbH & Co KG (DRTS)" Retrieved from "http://en.openei.org/w/index.php?title=Deutsche_Rotor_und_Turm_Service_GmbH_Co_KG_DRTS&oldid=344202" Categories:

40

The Division System in Crisis: Essays on Contemporary Korea  

E-Print Network (OSTI)

2005 led to the first nuclear test by North Korea in 2006,years. North Koreas nuclear tests and the attendant tensionof North Koreas nuclear test and some of the difficulties

Nak-chung, Paik

2011-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "deutsche securities korea" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

Global Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Global Security Global Security LANL's mission is to develop and apply science and technology to ensure the safety, security, and effectiveness of the U.S. nuclear deterrent;...

42

Korea Advanced Nano Fab Center KANC | Open Energy Information  

Open Energy Info (EERE)

Korea Advanced Nano Fab Center KANC Jump to: navigation, search Name Korea Advanced Nano Fab Center (KANC) Place Gwangju, Korea (Republic) Zip 443-270 Product String representation...

43

Countries Korea, South Overview - U.S. Energy Information ...  

U.S. Energy Information Administration (EIA)

Countries Korea, South Last Updated: January 17, 2013 (Notes) full report Overview South Korea is a major energy importer. EIA estimates that South Korea was the ...

44

Korea's Green Growth Strategy: Mitigating Climate Change and...  

Open Energy Info (EERE)

Type Publications, Guidemanual Website http:www.oecd.orgofficialdo Country South Korea UN Region Eastern Asia References Korea's Green Growth Strategy1 Overview "Korea's...

45

Medicine, Seoul, Korea  

E-Print Network (OSTI)

This report describes clinical and parasitological findings of an 82-yr-old female patient who lived in a local rural village and suffered from severe chronic anemia for several years. She was transferred to the National Police Hospital in Seoul for management of severe dyspnea and dizziness. At admission, she showed symptoms or signs of severe anemia. Gastroduodenoscopy observed hyperemic mucosa of the duodenum and discovered numerous moving roundworms on the mucosa. Endoscopy isolated seven of them, which were identified as Necator americanus by characteristic morphology of cutting plates in the buccal cavity. The patient was treated with albendazole and supportive measures for anemia, and her physical condition much improved. This case suggests the possibility that hookworm N. americanus is still transmitted in a remote local mountainous area in Korea.

Hee Jae Hyun; Eun-min Kim; So Yeon Park; Jun-oh Jung; Jong-yil Chai; Sung-tae Hong; Hee Jae Hyun; Eun-min Kim Contributed

2010-01-01T23:59:59.000Z

46

Security Plans  

Science Conference Proceedings (OSTI)

... Appendix A Glossary - A glossary of security terms used within the security planning document. ... F, Glossary. None applicable.

2013-09-30T23:59:59.000Z

47

Security | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Security The Y-12 National Security Complex places the highest priority on maintaining and improving its security posture. We employ security police officers, cyber...

48

Active security  

Science Conference Proceedings (OSTI)

In this paper we introduce active security, a new methodology which introduces programmatic control within a novel feedback loop into the defense infrastructure. Active security implements a unified programming environment which provides interfaces ... Keywords: central management, digital forensics, network security

Ryan Hand, Michael Ton, Eric Keller

2013-11-01T23:59:59.000Z

49

Asian Energy Security  

Science Conference Proceedings (OSTI)

OAK-B135 In the Asian Energy Security (AES) Project, Nautilus Institute works together with a network of collaborating groups from the countries of Northeast Asia to evaluate the energy security implications of different national and regional energy ''paths''. The goal of the Asia Energy Security project is to illuminate energy paths--and the energy policy choices that might help to bring them about--that result in a higher degree of energy security for the region and for the world as a whole, that is, to identify energy paths that are ''robust'' in meeting many different energy security and development objectives, while also offering flexibility in the face of uncertainty. In work to date, Nautilus has carefully assembled a network of colleagues from the countries of the region, trained them together as a group in the use of a common, flexible, and transparent energy and environmental analysis planning software tool (LEAP, the Long-range Energy Alternatives Planning system), and worked with them to prepare base-year energy sector models for each country. To date, complete data sets and models for ''Business as Usual'' (BAU) energy paths have been compiled for China, Japan, the Republic of Korea, and the Democratic Peoples' Republic of Korea. A partial data set and BAU path has been compiled for the Russian Far East, and a data set is being started in Mongolia, where a team of researchers has just joined the AES project. In several countries, ''Alternative'' energy paths have been developed as well, or partially elaborated. National energy sector developments, progress on national LEAP modeling, additional LEAP training, and planning for the next phase of the AES project were the topics of a recent (early November) workshop held in Vancouver, British Columbia. With funding from the Department of Energy, Nautilus is poised to build upon the successes of the project to date with a coordinated international effort to research the energy security ramifications of regional coordination on energy issues in Northeast Asia. The paragraphs below summarize Nautilus' plans for the AES project in the coming months.

Peter Hayes, PhD

2003-12-01T23:59:59.000Z

50

A Game Theoretical Approach to Communication Security  

E-Print Network (OSTI)

Security solutions . . . . . . . . . . . . . . . .Practical security solutions . . . . . . . . . . . . .Communication security

Gueye, Assane

2011-01-01T23:59:59.000Z

51

Health impact assessment in Korea  

Science Conference Proceedings (OSTI)

Recently, Health Impact Assessment has gained great attention in Korea. First, the Ministry of Environment introduced HIA within existing Environment Impact Assessment. Second, the Korea Institute for Health and Social Affairs began an HIA program in 2008 in alliance with Healthy Cities. In this short report, these two different efforts are introduced and their opportunities and challenges discussed. We believe these two approaches complement each other and both need to be strengthened. We also believe that both can contribute to the development of health in policy and project development and ultimately to improvements in the Korean population's health.

Kang, Eunjeong, E-mail: marchej@kihasa.re.r [Division for Health Promotion Research, Korea Institute for Health and Social Affairs, 268 Jinheung-ro, Bulgwang-dong, Eunpyeong-gu, Seoul (Korea, Republic of); Lee, Youngsoo, E-mail: leeys@kei.re.k [Centre for Environmental Impact Assessment Review, Korea Environment Institute, 290 Jinheung-ro, Bulgwang-dong, Eunpyeong-gu (Korea, Republic of); Harris, Patrick, E-mail: Patrick.harris@unsw.edu.a [Centre for Health Equity Training, Research and Evaluation, part of the UNSW, Research Centre for Primary Health Care and Equity, UNSW, Locked Mail Bag 7103, Liverpool BC, NSW 1981 (Australia); Koh, Kwangwook, E-mail: kwkoh@hanafos.co [Department of Preventive Medicine, Kosin University, 149-1 Dongsam-1-dong, Youngdo-gu, Busan (Korea, Republic of); Kim, Keonyeop, E-mail: pmkky@knu.ac.k [Department of Preventive Medicine, School of Medicine and Department of Public Health, Graduate School of Public Health, KyungPook National University, 101 Dongin 2 , Jung-gu, Daegu (Korea, Republic of)

2011-07-15T23:59:59.000Z

52

Deutsche Gesellschaft für Internationale Zusammenarbeit (GIZ) GmbH | Open  

Open Energy Info (EERE)

Deutsche Gesellschaft für Internationale Zusammenarbeit (GIZ) GmbH Deutsche Gesellschaft für Internationale Zusammenarbeit (GIZ) GmbH (Redirected from GTZ) Jump to: navigation, search Logo: Deutsche Gesellschaft für Technische Zusammenarbeit (GTZ) Name Deutsche Gesellschaft für Technische Zusammenarbeit (GTZ) Address Dag-Hammarskjöld-Weg 1-5 65760 Eschborn Germany Number of employees 10,000+"+" is not declared as a valid unit of measurement for this property. Year founded 1975 Phone number +49 6196 79-0 Website http://www.gtz.de/en/index.htm Coordinates 50.1466915°, 8.5540848° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":50.1466915,"lon":8.5540848,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

53

Deutsche Gesellschaft für Internationale Zusammenarbeit (GIZ) GmbH | Open  

Open Energy Info (EERE)

Deutsche Gesellschaft für Internationale Zusammenarbeit (GIZ) GmbH Deutsche Gesellschaft für Internationale Zusammenarbeit (GIZ) GmbH (Redirected from German Society for International Cooperation (GIZ)) Jump to: navigation, search Logo: Deutsche Gesellschaft für Technische Zusammenarbeit (GTZ) Name Deutsche Gesellschaft für Technische Zusammenarbeit (GTZ) Address Dag-Hammarskjöld-Weg 1-5 65760 Eschborn Germany Number of employees 10,000+ Year founded 1975 Phone number +49 6196 79-0 Website http://www.gtz.de/en/index.htm Coordinates 50.1466915°, 8.5540848° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":50.1466915,"lon":8.5540848,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

54

Correlations and scaling in one-dimensional heat conduction J. M. Deutsch and Onuttom Narayan  

E-Print Network (OSTI)

Correlations and scaling in one-dimensional heat conduction J. M. Deutsch and Onuttom Narayan of the heat current, through the Kubo formula, gives a thermal conductivity exponent of 1/3 in agreement.40.Mg I. INTRODUCTION Heat conduction in one-dimensional systems is a simple example of the general

California at Santa Cruz, University of

55

Delay in First Marriage and First Childbearing in Korea: Trends in Educational Differentials  

E-Print Network (OSTI)

Marriage Behaviors in South Korea. pp.291 309. in Changin Twentieth Century Korea . New York: Routledge. Coale,Soo. eds. Population in Korea . Korea National Statistical

Kye, Bongoh

2008-01-01T23:59:59.000Z

56

Has Globalization Strengthened South Koreas National Research System  

E-Print Network (OSTI)

We trace the structural patterns of co-authorship between Korean researchers at three institutional types (University, Government, and Industry) and their international partners in terms of the mutual information generated in these relations. Data were collected from the Web of Science during the period 1968-2009. The traditional Triple-Helix indicator was modified to measure the evolving network of co-authorship relations.. The results show that international co-authorship relations have varied considerably over time and with changes in government policies, but most relations have become stable since the early 2000s. In other words, the national publication system of Korea has gained some synergy from R&D internationalization during the 1990s, but the development seems to stagnate particularly at the national level: whereas both university and industrial collaborations are internationalized, the cross-connection within Korea has steadily eroded.

Ki-seok Kwon; Han Woo Park; Minho So; Loet Leydesdorff

2012-01-01T23:59:59.000Z

57

Joint Statement between U.S. Department of Energy and Republic of Korea's  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

between U.S. Department of Energy and Republic of between U.S. Department of Energy and Republic of Korea's Ministry of Trade, Industry, and Energy Joint Statement between U.S. Department of Energy and Republic of Korea's Ministry of Trade, Industry, and Energy May 7, 2013 - 2:18pm Addthis NEWS MEDIA CONTACT (202) 586-4940 Acting Secretary of Energy Daniel B. Poneman and Mr. Yoon Sang-jick, Minister of Trade, Industry, and Energy (MOTIE) of the Republic of Korea, met on May 7, 2013, at the Department of Energy (DOE) headquarters in Washington, D.C., where they exchanged views on cooperation on a wide range of energy priorities. They noted the importance of clean energy technologies for energy security, economic competitiveness and sustainable growth while mitigating the effects of greenhouse gas emissions. Acting Secretary Poneman and

58

Joint Statement between U.S. Department of Energy and Republic of Korea's  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Joint Statement between U.S. Department of Energy and Republic of Joint Statement between U.S. Department of Energy and Republic of Korea's Ministry of Trade, Industry, and Energy Joint Statement between U.S. Department of Energy and Republic of Korea's Ministry of Trade, Industry, and Energy May 7, 2013 - 2:18pm Addthis NEWS MEDIA CONTACT (202) 586-4940 Acting Secretary of Energy Daniel B. Poneman and Mr. Yoon Sang-jick, Minister of Trade, Industry, and Energy (MOTIE) of the Republic of Korea, met on May 7, 2013, at the Department of Energy (DOE) headquarters in Washington, D.C., where they exchanged views on cooperation on a wide range of energy priorities. They noted the importance of clean energy technologies for energy security, economic competitiveness and sustainable growth while mitigating the effects of greenhouse gas emissions. Acting Secretary Poneman and

59

Secure Facilities & Capabilities | National Security | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Facilities Events and Conferences Supporting Organizations National Security Home | Science & Discovery | National Security | Facilities SHARE Secure Facilities and Capabilities...

60

Speakers: Adam Sieminski, Deutsche Bank Stephen P. A. Brown, Resources for the Future  

U.S. Energy Information Administration (EIA) Indexed Site

5: "Energy and the Economy" 5: "Energy and the Economy" Speakers: Adam Sieminski, Deutsche Bank Stephen P. A. Brown, Resources for the Future Donald L. Paul, University of Southern California Energy Institute David Sandalow, DOE Christof Rühl, Group Chief Economist, BP [Note: Recorders did not pick up introduction of panel (see biographies for details on the panelists) or introduction of session.] Adam: Microphone. So, we've lost a little bit of time because of all of the sessions running a bit over, but here is how we're going to make that up. I had about 12 minutes worth of slides that we're going to abandon. Isn't that great? We get to hear from the panelists rather than me. Now, my name is Adam Sieminski. I'm the Chief Energy Economist for Deutsche Bank. Don't let that intimidate you. I'm really a civil

Note: This page contains sample records for the topic "deutsche securities korea" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

Security Cases  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

security-cases Office of Hearings and Appeals 1000 security-cases Office of Hearings and Appeals 1000 Independence Ave., SW Washington, DC, 20585 202-287-1566 en PSH-13-0103 - In the Matter of Personnel Security http://energy.gov/oha/downloads/psh-13-0103-matter-personnel-security security" class="title-link">PSH-13-0103 - In the Matter of Personnel Security

62

Security Policy  

Science Conference Proceedings (OSTI)

... M/S ACES Pvt. Ltd. Pakistan Page Security Policy ... 2013 M/S ACES Pvt. Ltd. Pakistan 5/27/2013 Page 2. [SECURITY POLICY] May 27, 2013 ...

2013-05-29T23:59:59.000Z

63

Gender and Mission Encounters in Korea: New Women, Old Ways  

E-Print Network (OSTI)

Baird, William Baird of Korea (Oakland, Calif. : Baird,1899), 18 19. 96. The Korea Methodist 1, no. 5 (1905): 50.on the West District, The Korea Meth- odist 1 (1905): 139

Choi, Hyaeweol

2009-01-01T23:59:59.000Z

64

Factory Girl Literature: Sexuality, Violence, and Representation in Industrializing Korea  

E-Print Network (OSTI)

Asias Next Giant, 79. 25. South Korea as a rich and strong234. 35. Ogle, South Korea, 107. 36. Hakchul literallyJongchaek Yonguwon [Korea Institute of Criminology].

Barraclough, Ruth

2012-01-01T23:59:59.000Z

65

The Political Economies of Broadband Development in Korea and Japan  

E-Print Network (OSTI)

number of DSL subscriptions in Korea rose from 97,000 to 2.4Paper 2004: Broadband IT Korea (Seoul: NCA, 2004), p. 15. 7.Rate Per 100 Inhabitants Korea Japan USA OECD average

Kushida, Kenji; Oh, Seung-Youn

2007-01-01T23:59:59.000Z

66

Diverging Paths for IT Industries in Taiwan and Korea  

E-Print Network (OSTI)

E B A article, Twn/Korea 11-9-94 Diverging PathsIT Industries in Taiwan and Korea Jason Dedrick and Kennethtechnology (IT) industry in Korea and Taiwan. Riding the

Dedrick, Jason; Kraemer, Kenneth L.

1994-01-01T23:59:59.000Z

67

Borderland Intimacies: GIs, Koreans, and American Military Landscapes in Cold War Korea  

E-Print Network (OSTI)

Women and Mixed- race Children]. 1997. US Forces Korea. US Forces Korea's Welcome Guide for 2006-2007. http://Charles K. Americas Korea, Koreas Vietnam. Critical

Hwang, Whitney Taejin

2010-01-01T23:59:59.000Z

68

South Korea-ANL Distributed Energy Resources and Demand Side...  

Open Energy Info (EERE)

Korea-ANL Distributed Energy Resources and Demand Side Management Jump to: navigation, search Name Distributed Energy Resources and Demand Side Management in South Korea Agency...

69

Cyber Security | National Security | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

National Security Home | Science & Discovery | National Security | Initiatives | Cyber Security SHARE Cyber Security Through Science A Science-Based Approach image ORNL uses a science-based approach that combines experimentation, theory, modeling, and high performance computing to solve some of the nation's cyber security grand challenges. Significant, 'game-changing' transformation requires a science-based approach that combines fundamental understanding with experimentation, theory, and modeling. The most successful scientific programs use peer review to maximize intellectual capital and prioritize research needs. The Department of Energy has applied this approach through programs such as the Scientific Discovery through Advanced Computing (SciDAC) and ASCI,

70

Language Policies in South-Korea:  

E-Print Network (OSTI)

Korean historical linguistic resistance The Korean language is at least 5000 years old and spoken by about 67 million people in both South Korea and North Korea. The Korean language was first used by people of the ancient kingdom of Chosen, but records of the written alphabet can be traced back to 1443 (Lee, I. & Ramsey, 2000; Lee,

unknown authors

2009-01-01T23:59:59.000Z

71

SecureBox: National Security Through Secure Cargo Team Members  

SecureBox: National Security Through Secure Cargo Team Members: Front Row (left to right): Howard Lowdermilk, Greg Dallum, Faranak Nekoogar, Vickie ...

72

Korea Power Exchange (KPX) | Open Energy Information  

Open Energy Info (EERE)

Exchange (KPX) Exchange (KPX) Jump to: navigation, search Logo: Korea Power Exchange (KPX) Name Korea Power Exchange (KPX) Agency/Company /Organization Argonne National Laboratory Sector Energy Focus Area Energy Efficiency Topics Background analysis Website http://www.dis.anl.gov/news/Ko Country South Korea Eastern Asia References http://www.dis.anl.gov/news/KoreaKpxIit.html Abstract In an agreement signed on March 26, 2007, Argonne National Laboratory and the Illinois Institute of Technology are joining with the Korea Power Exchange to establish a joint training program combining training and research at Argonne with formal academic education at IIT. Argonne-IIT Joint Graduate Program in Electricity Markets: In an agreement signed on March 26, 2007, Argonne National Laboratory and the Illinois

73

Safety, Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Safety, Security Safety, Security Safety, Security LANL's mission is to develop and apply science and technology to ensure the safety, security, and reliability of the U.S. nuclear deterrent; reduce global threats; and solve other emerging national security and energy challenges. Contact Operator Los Alamos National Laboratory (505) 667-5061 We do not compromise safety for personal, programmatic, or operational reasons. Safety: we integrate safety, security, and environmental concerns into every step of our work Our commitments We conduct our work safely and responsibly to achieve our mission. We ensure a safe and healthful environment for workers, contractors, visitors, and other on-site personnel. We protect the health, safety, and welfare of the general public. We do not compromise safety for personal, programmatic, or

74

Transportation Security  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

For Review Only 1 Transportation Security Draft Annotated Bibliography Review July 2007 Preliminary Draft - For Review Only 2 Work Plan Task * TEC STG Work Plan, dated 8206,...

75

Global Security  

NLE Websites -- All DOE Office Websites (Extended Search)

transparency, and security that are preconditions to the ultimate fulfillment of the Non-Proliferation Treaty's goals and ambitions. Open Source Center The Open Source Center...

76

Security Automation Conference & Workshop  

Science Conference Proceedings (OSTI)

... Security Automation Conference & Workshop. ... Richard Hale, DISA - Information Security & Security Automation in DoD (coming soon); ...

77

HIPAA Security Rule  

Science Conference Proceedings (OSTI)

Related ActivitiesHIPAA Security RuleHealth Information Exchange (HIE) Security Architecture. Related ... HIPAA Security Rule. NIST ...

2011-11-21T23:59:59.000Z

78

Security Enforcement Reporting Criteria  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Classified Information Security Noncompliance Reporting Criteria January 2012 MANDATORY SECURITY INCIDENT REPORTING Classified information security noncompliances are categorized...

79

Potential Collaborative Research topics with Koreas Agency for Defense Development  

SciTech Connect

This presentation provides a high level summary of current research activities at the Los Alamos National Laboratory (LANL)-University of California Jacobs School of Engineering (UCSD) Engineering Institute that will be presented at Korea's Agency for Defense Development (ADD). These research activities are at the basic engineering science level with different level of maturity ranging from initial concepts to field proof-of-concept demonstrations. We believe that all of these activities are appropriate for collaborative research activities with ADD subject to approval by each institution. All the activities summarized herein have the common theme that they are multi-disciplinary in nature and typically involved the integration of high-fidelity predictive modeling, advanced sensing technologies and new development in information technology. These activities include: Wireless Sensor Systems, Swarming Robot sensor systems, Advanced signal processing (compressed sensing) and pattern recognition, Model Verification and Validation, Optimal/robust sensor system design, Haptic systems for large-scale data processing, Cyber-physical security for robots, Multi-source energy harvesting, Reliability-based approaches to damage prognosis, SHMTools software development, and Cyber-physical systems advanced study institute.

Farrar, Charles R. [Los Alamos National Laboratory; Todd, Michael D. [Univ. of California, San Diego

2012-08-23T23:59:59.000Z

80

Potential Collaborative Research topics with Koreas Agency for Defense Development  

SciTech Connect

This presentation provides a high level summary of current research activities at the Los Alamos National Laboratory (LANL)-University of California Jacobs School of Engineering (UCSD) Engineering Institute that will be presented at Korea's Agency for Defense Development (ADD). These research activities are at the basic engineering science level with different level of maturity ranging from initial concepts to field proof-of-concept demonstrations. We believe that all of these activities are appropriate for collaborative research activities with ADD subject to approval by each institution. All the activities summarized herein have the common theme that they are multi-disciplinary in nature and typically involved the integration of high-fidelity predictive modeling, advanced sensing technologies and new development in information technology. These activities include: Wireless Sensor Systems, Swarming Robot sensor systems, Advanced signal processing (compressed sensing) and pattern recognition, Model Verification and Validation, Optimal/robust sensor system design, Haptic systems for large-scale data processing, Cyber-physical security for robots, Multi-source energy harvesting, Reliability-based approaches to damage prognosis, SHMTools software development, and Cyber-physical systems advanced study institute.

Farrar, Charles R. [Los Alamos National Laboratory; Todd, Michael D. [Univ. of California, San Diego

2012-08-23T23:59:59.000Z

Note: This page contains sample records for the topic "deutsche securities korea" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

Lab announces security changes  

NLE Websites -- All DOE Office Websites (Extended Search)

Lab announces security changes Lab announces security changes The Laboratory is implementing several changes to its security procedures as the result of a recent security...

82

Performance of the Services Sector in Korea: An Empirical Investigation  

E-Print Network (OSTI)

There is a widespread perception that Koreas services sector lags behind its dynamic world-class manufacturing sector. We empirically analyze the past performance of Koreas services sector in order to assess its prospects as an engine of growth. Our analysis resoundingly confirms the conventional wisdom of an underperforming service sector. In light of Koreas high income and development level, the poor performance of modern services is of particular concern. We identify a number of factors underlying the poor performance, and set forth policy recommendations for addressing them. Overall, Korea faces a challenging but navigable road ahead in developing a high value-added services sector.

Donghyun Park; Kwanho Shin

2012-01-01T23:59:59.000Z

83

Personnel Security Program | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Personnel Security Program Home > About Us > Our Programs > Nuclear Security > Personnel Security...

84

Office of Headquarters Security Operations: Headquarters Security...  

NLE Websites -- All DOE Office Websites (Extended Search)

Headquarters Security Operations Home Sub Offices HQ Security Officers (HSO) Program Office of Information Security Office of Headquarters Personnel Office of...

85

Deutsche Gesellschaft für Internationale Zusammenarbeit (GIZ) GmbH | Open  

Open Energy Info (EERE)

Agency for International Cooperation (GIZ)) Agency for International Cooperation (GIZ)) Jump to: navigation, search Logo: Deutsche Gesellschaft für Technische Zusammenarbeit (GTZ) Name Deutsche Gesellschaft für Technische Zusammenarbeit (GTZ) Address Dag-Hammarskjöld-Weg 1-5 65760 Eschborn Germany Number of employees 10,000+"+" is not declared as a valid unit of measurement for this property. Year founded 1975 Phone number +49 6196 79-0 Website http://www.gtz.de/en/index.htm Coordinates 50.1466915°, 8.5540848° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":50.1466915,"lon":8.5540848,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

86

Deutsche Gesellschaft für Internationale Zusammenarbeit (GIZ) GmbH | Open  

Open Energy Info (EERE)

Gesellschaft für Internationale Zusammenarbeit (GIZ) GmbH Gesellschaft für Internationale Zusammenarbeit (GIZ) GmbH Jump to: navigation, search Logo: Deutsche Gesellschaft für Technische Zusammenarbeit (GTZ) Name Deutsche Gesellschaft für Technische Zusammenarbeit (GTZ) Address Dag-Hammarskjöld-Weg 1-5 65760 Eschborn Germany Number of employees 10,000+"+" is not declared as a valid unit of measurement for this property. Year founded 1975 Phone number +49 6196 79-0 Website http://www.gtz.de/en/index.htm Coordinates 50.1466915°, 8.5540848° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":50.1466915,"lon":8.5540848,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

87

Deutsche Gesellschaft für Internationale Zusammenarbeit (GIZ) GmbH | Open  

Open Energy Info (EERE)

International Cooperation (GIZ)) International Cooperation (GIZ)) Jump to: navigation, search Logo: Deutsche Gesellschaft für Technische Zusammenarbeit (GTZ) Name Deutsche Gesellschaft für Technische Zusammenarbeit (GTZ) Address Dag-Hammarskjöld-Weg 1-5 65760 Eschborn Germany Number of employees 10,000+"+" is not declared as a valid unit of measurement for this property. Year founded 1975 Phone number +49 6196 79-0 Website http://www.gtz.de/en/index.htm Coordinates 50.1466915°, 8.5540848° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":50.1466915,"lon":8.5540848,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

88

Energy Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Energy Security Energy Security Energy Security LANL's mission is to develop and apply science and technology to ensure the safety, security, and effectiveness of the U.S. nuclear deterrent; reduce global threats; and solve other emerging national security and energy challenges. April 12, 2012 A closed photobioreactor system is essentially a series of plastic or glass containers for water and algae. A closed photobioreactor system is essentially a series of plastic or glass containers for water and algae. Proponents of such bioreactors (compared to open ponds) say the growth environment can be more easily controlled; they prevent evaporation; and light penetrates through all sides of the container, which increases cell density. However, bioreactors suffer high materials and energy costs as well as mixing and gas-exchange

89

From Elevated Freeway to Linear Park: Land Price Impacts of Seoul, Korea's CGC Project  

E-Print Network (OSTI)

2001 ~ 2006). Seoul, Korea. National Statistical Office,2000 and 2005. Dae-jeon, Korea. Polinsky, M. and Shavell,CGC Project. Seoul, Korea. Seoul Metropolitan Government (

Kang, Chang Deok; Cervero, Robert

2008-01-01T23:59:59.000Z

90

Church and civil society in Korea after democratization : the NGOs' activism for migrant workers  

E-Print Network (OSTI)

as Underclass in Korea ( ????? ????? ??? ?????? )." AsiaBishops Conference of Korea. 1993. "Do Not Neglect theMovement in S. Korea ( ??? ????? ???? ). Seoul: Dangdae.

Kim, Woo-Seon

2007-01-01T23:59:59.000Z

91

New urban housing in Seoul, Korea  

E-Print Network (OSTI)

For the last three decades, the capital city of Korea, Seoul, has experienced an explosive increase in population and rapid urbanization. This increase has led to a severe housing shortage in Seoul. The government responded ...

Lee, Kwanghyun, 1971-

2001-01-01T23:59:59.000Z

92

ENERGY SECURITY  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

national strategy for national strategy for ENERGY SECURITY recommendations to the nation on reducing u.s. oil dependence september 2008 a project of a project of a national strategy for energy security Recommendations to the Nation on Reducing U.S. Oil Dependence september 2008 Table of Contents 2 Energy Security Leadership Council 3 Statement of Purpose 4 Letter to the President, the Congress, and the American People 7 Outline of Main Body of Report 13 Introduction 21 Policy Recommendations: Summary 33 Part I · Diversify Energy Supplies for the Transportation Sector

93

Security | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security Security Security Security program under Office of Health, Safety and Security developes security policy, provides security expertise to assist field elements in planning site protection strategies and coordinates with domestic authorities to provide safeguards and security technical assistance, technical systems support, and technology development and deployment opportunities. Departmental Personnel Security, also ensures that Departmental personnel security programs (included the National Nuclear Security Administration) are consistent and effectively implemented. Headquarters Facilities Master Security Plan The purpose of the Headquarters Facility Master Security Plan (HQFMSP) is to inform employees, contractors, and visitors of the security procedures

94

Deutsche Solar AG formerly Bayer Solar GmbH | Open Energy Information  

Open Energy Info (EERE)

AG formerly Bayer Solar GmbH AG formerly Bayer Solar GmbH Jump to: navigation, search Name Deutsche Solar AG (formerly Bayer Solar GmbH) Place Freiberg/Sachsen, Germany Zip 9599 Sector Solar Product Producers of mono- and multicrystalline silicon wafers for solar cells. Coordinates 50.916956°, 13.339619° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":50.916956,"lon":13.339619,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

95

Security Rulemaking  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2 NATIONAL TRANSPORTATION STAKEHOLDERS FORUM 2 NATIONAL TRANSPORTATION STAKEHOLDERS FORUM Knoxville, TN - May 16, 2012 2 NRC Actions Since September 11, 2001 * Interim solution - enhance existing regulations through Security Orders * Objectives of the Orders are enhanced control of material to - Prevent unauthorized access - Prevent malevolent use of material - Mitigate consequences * Orders were issued to NRC licensees that transport: - Spent Nuclear Fuel - IAEA Code of Conduct Category 1 and 2 quantities of radioactive material Security Rulemakings 3 NRC Ongoing Activities * Orders are an interim measure * Long-term approach is to enhance transport security through public rulemaking * Rulemaking process in progress for - SNF Transportation Security - Physical Protection of Category 1 and 2 material (both fixed

96

Surviving Through The Post-Cold War Era: The Evolution of Foreign Policy In North Korea  

E-Print Network (OSTI)

The Foreign Policy of North Korea edited by Yang Sung ChulChange and Continuity in North Koreas Foreign Policy. Foreign Relations of North Korea During Kim Il Sungs Last

Yee, Samuel

2008-01-01T23:59:59.000Z

97

Transportation Security | ornl.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

Transportation Security SHARE Global Threat Reduction Initiative Transportation Security Cooperation Secure Transport Operations (STOP) Box Security of radioactive material while...

98

One-dimensional heat conductivity exponent from a random collision model J. M. Deutsch and Onuttom Narayan  

E-Print Network (OSTI)

One-dimensional heat conductivity exponent from a random collision model J. M. Deutsch and Onuttom to conductivity would predict that if the temperature gradient "T in a material is small, the heat current flowing January 2003; published 18 July 2003 We obtain numerically the thermal conductivity of a quasi

California at Santa Cruz, University of

99

National Security Technology Center | Y-12 National Security...  

NLE Websites -- All DOE Office Websites (Extended Search)

Global Security Security and Training National Security ... National Security Technology Center What kinds of security technologies are we talking about? See our capabilities...

100

Tag: security | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

security security Tag: security Displaying 1 - 5 of 5... Category: Security Security Y-12 places the highest priority on maintaining and improving its security posture. More... Category: News Johnson shares perspective on security Rod Johnson, B&W Y-12 deputy general manager of Security, recently discussed the security atmosphere since his arrival last August and what he sees as Y-12's security future. More... Category: News Y-12 to Install New Fence to Reduce Trespassing The National Nuclear Security Administration today announced plans to extend the boundary fence at the Y-12 National Security Complex along Scarboro Road. The new fence is expected to be in place by April 4. More... Category: News New institute promotes nuclear security Y-12 is partnering with the University of Tennessee and others to provide

Note: This page contains sample records for the topic "deutsche securities korea" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

Transportation Security  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

For Review Only 1 Transportation Security Draft Annotated Bibliography Review July 2007 Preliminary Draft - For Review Only 2 Work Plan Task * TEC STG Work Plan, dated 8/2/06, Product #16, stated: "Develop an annotated bibliography of publicly-available documents related to security of radioactive material transportation." * Earlier this year, a preliminary draft annotated bibliography on this topic was developed by T-REX , UNM, to initially address this STG Work Plan Task. Preliminary Draft - For Review Only 3 Considerations in Determining Release of Information * Some "Publicly-available" documents could potentially contain inappropriate information according to standards set by DOE information security policy and DOE Guides. - Such documents would not be freely

102

Message Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Message Message Security Services Overview ECS Audio/Video Conferencing Fasterdata IPv6 Network Network Performance Tools (perfSONAR) ESnet OID Registry PGP Key Service Virtual Circuits (OSCARS) OSCARS Case Study Documentation User Manual FAQ Design Specifications Functional Specifications Notifications Publications Authorization Policy Default Attributes Message Security Clients For Developers Interfaces Links Hardware Requirements DOE Grids Service Transition Contact Us Technical Assistance: 1 800-33-ESnet (Inside the US) 1 800-333-7638 (Inside the US) 1 510-486-7600 (Globally) 1 510-486-7607 (Globally) Report Network Problems: trouble@es.net Provide Web Site Feedback: info@es.net Message Security Overview The OSCARS Web pages and Web Services are run within a Tomcat container which uses SSL connections to encrypt all messages. The OSCARS Web Service

103

Allied Security Scholarship ALLIED SECURITY SCHOLARSHIP 2013  

E-Print Network (OSTI)

Allied Security Scholarship ALLIED SECURITY SCHOLARSHIP 2013 BACKGROUND The Allied Security Scholarship was established by Allied Security to assist students to undertake full-time study at the University of Waikato. REGULATIONS 1. The Scholarship shall be known as the Allied Security Scholarship. 2

Waikato, University of

104

South Korea Fossil-Fuel CO2 Emissions  

NLE Websites -- All DOE Office Websites (Extended Search)

Far East » South Korea Far East » South Korea South Korea Fossil-Fuel CO2 Emissions Graph graphic Graphics Data graphic Data Trends South Korea, or the Republic of Korea, is the world's tenth largest emitter of CO2 based on 2008 fossil-fuel consumption and cement production with 139 million metric tons of carbon. From 1946-1997 South Korea experienced phenomenal growth in fossil-fuel CO2 emissions with a growth rate that averaged 11.5%. Initial growth in emissions was due to coal consumption, which still accounts for 46.9% of South Korea's fossil-fuel CO2 emissions. Since the late 1960s oil consumption has been a major source of emissions. South Korea is the world's fifth largest importer of crude oil. Natural gas became a significant source of CO2 for the first time in 1987, as South

105

ICT Development in North Korea: Changes and Challenges  

Science Conference Proceedings (OSTI)

Conditions of ICT development in North Korea are among the least known in the world. This paper relies on interviews, documentary material, and other sources to analyze the potentials of and constraints on North Korea's ICT development. We find substantial ...

Heejin Lee; Jaeho Hwang

2004-09-01T23:59:59.000Z

106

Freeport, TX Liquefied Natural Gas Exports to South Korea (Million...  

U.S. Energy Information Administration (EIA) Indexed Site

South Korea (Million Cubic Feet) Freeport, TX Liquefied Natural Gas Exports to South Korea (Million Cubic Feet) Year Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec 2011 3,157...

107

Sabine Pass, LA Exports to Korea Liquefied Natural Gas (Million...  

Gasoline and Diesel Fuel Update (EIA)

Korea Liquefied Natural Gas (Million Cubic Feet) Sabine Pass, LA Exports to Korea Liquefied Natural Gas (Million Cubic Feet) Year Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec...

108

Statistics and Possible Sources of Aviation Turbulence over South Korea  

Science Conference Proceedings (OSTI)

The characteristics of aviation turbulence over South Korea during the recent five years (200308, excluding 2005) are investigated using pilot reports (PIREPs) accumulated by the Korea Aviation Meteorological Agency (KAMA). Among the total of ...

Jung-Hoon Kim; Hye-Yeong Chun

2011-02-01T23:59:59.000Z

109

The consumer Internet in South Korea : an American's perspective  

E-Print Network (OSTI)

This thesis will explore the consumer internet industry in South Korea from the perspective of an American with Western values and sensibilities. South Korea is widely considered to be one of the most connected and ...

Byun, Jeffrey

2008-01-01T23:59:59.000Z

110

International diffusion practice : lessons from South Korea's New Village Movement  

E-Print Network (OSTI)

This research focuses on how South Korea's development model-namely, the Saemaul Undong, or the New Village Movement-is diffused internationally, in particular, to the developing country of Vietnam. South Korea's successful ...

Kim, Jung Hwa, M.C.P. Massachusetts Institute of Technology

2013-01-01T23:59:59.000Z

111

Physical Security Evaluations - Reports  

NLE Websites -- All DOE Office Websites (Extended Search)

Summary Report - Independent Oversight Inspection of Safeguards and Security and Cyber Security at the Y-12 Site Office and the Y-12 National Security Complex (U), January...

112

Security for grids  

E-Print Network (OSTI)

S. Kent, R. Atkinson. Security Architecture for the InternetTsudik, S. Tuecke. A Security Architecture for ComputationalComputer and Communications Security Conference, pp. 83-92,

Humphrey, Marty; Thompson, Mary R.; Jackson, Keith R.

2005-01-01T23:59:59.000Z

113

Taxation and Social Security  

E-Print Network (OSTI)

Re: Taxation and Social Security Attached is draft chapter11 TAXATION AND SOCIAL SECURITY A substantial fraction ofaspects of social security schemes in a setting in which

Kaplow, Louis

2006-01-01T23:59:59.000Z

114

Security and Elections  

E-Print Network (OSTI)

World Conf. Information Security Education, 2007, pp. 1724;Security andElections IEEE Security & Privacy, 10(5):6467, Sept. -

Bishop, Matt; Peisert, Sean

2012-01-01T23:59:59.000Z

115

Border & Port Security | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

the United States Senate Committee on Armed Services Sep 17, 2013 NNSA, Republic of Korea Ministry Agree to Minimize Use of HEU in Nuclear Reactors Sep 3, 2013 NNSA Conducts...

116

Assessing Macroprudential Policies: Case of Korea  

E-Print Network (OSTI)

This paper develops methods for assessing the sensitivity of capital ows to global nancial conditions, and applies the methods in assessing the impact of macroprudential policies introduced by Korea in 2010. Relative to a comparison group of countries, we nd that the sensitivity of capital ows into Korea to global conditions decreased in the period following the introduction of macroprudential policies. JEL codes: Keywords: F32, F33, F34 Capital ows, credit booms, macroprudential policy Prepared for the symposium issue of the Scandinavian Journal of Economics on capital ows. We are grateful to Maurice Obstfeld and two referees for their comments and guidance on an earlier draft. One of the authors (Shin) was involved in the design of the macroprudential policy tools introduced in Korea in 2010, and hence is not a disinterested party in the ndings reported in this paper. 1 1

Valentina Bruno; Hyun Song Shin

2013-01-01T23:59:59.000Z

117

Java Security  

Science Conference Proceedings (OSTI)

From the Publisher:With a market share of almost 70%, Java can be rightly called the programming language of the Web. Java security allows transmission of sensitive information, stores sensitive data, ensures that code is from a trusted source, and ensures ...

Madhushree Ganguli

2002-11-01T23:59:59.000Z

118

South Korea: Energy Resources | Open Energy Information  

Open Energy Info (EERE)

Korea: Energy Resources Korea: Energy Resources Jump to: navigation, search Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"TERRAIN","zoom":5,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"390px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":37,"lon":127.5,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

119

North Korea: Energy Resources | Open Energy Information  

Open Energy Info (EERE)

North Korea: Energy Resources North Korea: Energy Resources Jump to: navigation, search Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"TERRAIN","zoom":5,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"390px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":40,"lon":127,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

120

Formalizing information security knowledge  

Science Conference Proceedings (OSTI)

Unified and formal knowledge models of the information security domain are fundamental requirements for supporting and enhancing existing risk management approaches. This paper describes a security ontology which provides an ontological structure for ... Keywords: information security, risk management, security ontology

Stefan Fenz; Andreas Ekelhart

2009-03-01T23:59:59.000Z

Note: This page contains sample records for the topic "deutsche securities korea" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

Physical Security Systems | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Physical Security Systems | National Nuclear Security Administration Physical Security Systems | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Physical Security Systems Home > About Us > Our Programs > Nuclear Security > Physical Security Systems Physical Security Systems After the 9/11 terrorist attacks, NNSA took steps to protect its critical

122

Security Forms | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Management & Safeguards System Security Forms Federal Information Processing Standards Publications (FIPS PUBS) FIPS-Associated Documents FIPS 140-2 Security Requirements...

123

Physical Security Systems | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Physical Security Systems | National Nuclear Security Administration Physical Security Systems | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Physical Security Systems Home > About Us > Our Programs > Nuclear Security > Physical Security Systems Physical Security Systems After the 9/11 terrorist attacks, NNSA took steps to protect its critical

124

Information Security: Coordination of Federal Cyber Security...  

NLE Websites -- All DOE Office Websites (Extended Search)

a federal agenda for cyber security research. GAO also recommends that the Office of Management and Budget (OMB) issue guidance to agencies for providing cyber security research...

125

Security Forms | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Security Forms Home > About Us > Our Programs > Nuclear Security > Nuclear Materials...

126

Cyber Security Evaluations Reports  

NLE Websites -- All DOE Office Websites (Extended Search)

Oversight Home Sub Offices Security Evaluations Cyber Security Evaluations Emergency Management Oversight Environment, Safety and Health Evaluations Mission &...

127

Global Security 2009  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security *Intelligence *Hyper Innovation Global Security Weapons & Complex Integration NIF Office of Strategic Outcomes Operations & Business Lawrence Livermore National...

128

National Security Initiatives | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Bioinformatics Facilities Events and Conferences Supporting Organizations National Security Home | Science & Discovery | National Security | Initiatives SHARE National...

129

Safety and Security  

Science Conference Proceedings (OSTI)

*. Bookmark and Share. Safety and Security. ... National and International Standards for X-ray Security Screening Applications. ...

2013-07-29T23:59:59.000Z

130

Cryptographic and Security Testing  

Science Conference Proceedings (OSTI)

Directory of Accredited Laboratories. Cryptographic and Security Testing. ... TX. atsec information security corporation, Austin, TX [200658- 0] VA. ...

2013-12-27T23:59:59.000Z

131

Computer Security Division Homepage  

Science Conference Proceedings (OSTI)

Computer Security Division. ... The 2012 Computer Security Division Annual Report (Special Publication 800-165) is now available. ...

2013-09-12T23:59:59.000Z

132

Mobile Security and Forensics  

Science Conference Proceedings (OSTI)

Mobile Security and Forensics. Summary: The goal of the project is to improve the security of mobile devices and software. ...

2013-01-15T23:59:59.000Z

133

HAN System Security Requirements  

Science Conference Proceedings (OSTI)

This report, "Home Area Network (HAN) Security Requirements," identifies and discusses the key cyber security requirements for different interfaces of HAN-based systems. These cyber security requirements for HAN interfaces are derived from the Department of Homeland Security (DHS) "Catalog of Control Systems Security," which provides an excellent checklist of general security requirements.

2009-12-22T23:59:59.000Z

134

"Who needs MacArthur?" : analyzing South Korea's counterinvasion capability against North Korea  

E-Print Network (OSTI)

Assuming there is another North Korean invasion; could the South Koreans counterinvade North Korea and prevail even without the United States' assistance? This paper studies the possibility of a South Korean counterinvasion ...

Chung, Jonghyuk

2011-01-01T23:59:59.000Z

135

Security seal  

DOE Patents (OSTI)

Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to "fingerprints" are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

Gobeli, Garth W. (Albuquerque, NM)

1985-01-01T23:59:59.000Z

136

Korea's Green Growth Strategy: Mitigating Climate Change and Developing New  

Open Energy Info (EERE)

Korea's Green Growth Strategy: Mitigating Climate Change and Developing New Korea's Green Growth Strategy: Mitigating Climate Change and Developing New Growth Engines Jump to: navigation, search Name Korea's Green Growth Strategy: Mitigating Climate Change and Developing New Growth Engines Agency/Company /Organization Organisation for Economic Co-Operation and Development Topics Policies/deployment programs, Pathways analysis, Background analysis Resource Type Publications, Guide/manual Website http://www.oecd.org/officialdo Country South Korea UN Region Eastern Asia References Korea's Green Growth Strategy[1] Overview "Korea's greenhouse gas emissions almost doubled between 1990 and 2005, the highest growth rate in the OECD area. Korea recently set a target of reducing emissions by 30% by 2020 relative to a "business as usual"

137

October 10th Daejeon Convention Center, KOREA  

E-Print Network (OSTI)

Center, KOREA Organized by International Atomic Energy Agency (IAEA) Hosted by Ministry of Education City Recognizing the prominent global role of nuclear energy, and based on the expectation that nuclear fusion will be able to provide an abundant source of energy, the International Atomic Energy Agency (IAEA

138

INSTITUTE FOR CYBER SECURITY Security Models  

E-Print Network (OSTI)

INSTITUTE FOR CYBER SECURITY 1 Security Models: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio July 2010 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY 2 THE BIG

Sandhu, Ravi

139

Security rules versus Security properties Mathieu Jaume  

E-Print Network (OSTI)

Security rules versus Security properties Mathieu Jaume SPI ­ LIP6 ­ University Pierre & Marie components of security policies can be expressed, and we identify their role in the de- scription of a policy, of a system and of a secure system. In this setting, we formally describe two approaches to define policies

Paris-Sud XI, Université de

140

INSTITUTE FOR CYBER SECURITY Security Models  

E-Print Network (OSTI)

INSTITUTE FOR CYBER SECURITY 1 Security Models: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio July 2009 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY 2 THE BIG

Sandhu, Ravi

Note: This page contains sample records for the topic "deutsche securities korea" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

Security Procedures Caltech Campus Security Dispatch  

E-Print Network (OSTI)

Security Procedures Caltech Campus Security Dispatch: 5000 (from any Caltech phone) or (626) 395-5000 (from any phone) When emergencies arise, contact Caltech Campus Security MEDICAL If someone experiences a medical emergency: · Remain calm · Notify Campus Security Dispatch · Do NOT move victim EARTHQUAKE When

Goddard III, William A.

142

Obfuscation (IND-CPA Security Circular Security)  

E-Print Network (OSTI)

Obfuscation (IND-CPA Security Circular Security) (Draft Version, 24 October 2013) Antonio@cs.au.dk 2 Aarhus University, Denmark, orlandi@cs.au.dk Abstract Circular security is an important notion for public-key encryption schemes and is needed by several cryptographic protocols. In circular security

International Association for Cryptologic Research (IACR)

143

Nonproliferation & International Security | National Nuclear Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Nonproliferation & International Security | National Nuclear Security Nonproliferation & International Security | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nonproliferation & International Security Home > About Us > Our Programs > Nonproliferation > Nonproliferation & International Security Nonproliferation & International Security

144

Nonproliferation & International Security | National Nuclear Security  

National Nuclear Security Administration (NNSA)

Nonproliferation & International Security | National Nuclear Security Nonproliferation & International Security | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nonproliferation & International Security Home > About Us > Our Programs > Nonproliferation > Nonproliferation & International Security Nonproliferation & International Security

145

Romancing race and gender : intermarriage and the making of a 'modern subjectivity' in colonial Korea, 1910-1945  

E-Print Network (OSTI)

a Colonial Society: Rural Korea under Japanese Rule. Diss.Legality, and Power in Korea under Japanese Rule. ColonialAbandon Nationalism? Korea Journal, Summer 1999. ---. Yi

Kim, Su Yun

2009-01-01T23:59:59.000Z

146

Government-led Vocational Training System and its Lessons: In case of South Korea before the IMF Economic Crisis  

E-Print Network (OSTI)

Education and Training. Korea Research Institute forof Korean Literacy Education, Korea University, DoctoralVocational Training System in Korea in Gerhard Bosch and

Ra, Young Sun

2012-01-01T23:59:59.000Z

147

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... approach to protect critical federal missions and business functions ... security areas such physical security, personnel security, continuity of operations ...

148

Using Operational Security (OPSEC) to Support a Cyber Security...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Using Operational Security (OPSEC) to Support a Cyber Security Culture in Control Systems Environments Using Operational Security (OPSEC) to Support a Cyber Security Culture in...

149

T-592: Cisco Security Advisory: Cisco Secure Access Control System...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Cisco Security Advisory: Cisco Secure Access Control System Unauthorized Password Change Vulnerability T-592: Cisco Security Advisory: Cisco Secure Access Control System...

150

Cyber and Network Security Homepage  

Science Conference Proceedings (OSTI)

Cyber and Network Security. Cyber and network security is focused on ensuring three security objectives of information ...

2010-10-05T23:59:59.000Z

151

GAO Information Security Issues Update  

Science Conference Proceedings (OSTI)

... Critical IT Systems & Infrastructure - NNSA Supercomputers CP & Security - State Security System - Wireless Security - IRS e*File ...

2010-10-08T23:59:59.000Z

152

Bioinformatics Systems | National Security | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Initiatives Cyber Security Nuclear Forensics Bioinformatics Videos Workshops National Security Home | Science & Discovery | National Security | Initiatives | Bioinformatics SHARE...

153

Security Components and Mechanisms Group  

Science Conference Proceedings (OSTI)

Security Components and Mechanisms Group. Welcome. ... A security checklist is a document that contains instructions for securely configuring ...

2013-01-17T23:59:59.000Z

154

Information Security | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Information Security | National Nuclear Security Administration Information Security | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Information Security Home > About Us > Our Programs > Nuclear Security > Information Security Information Security Information security deals with requirements for the protection and control of information and matter required to be classified or controlled by

155

Border Security | ornl.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

Border Security SHARE Border Security Testing of unmanned aerial surveillance equipment. ORNL performs border security research at the Security Sciences Field Laboratory (SSFL),...

156

Korea Silicon Co Ltd | Open Energy Information  

Open Energy Info (EERE)

Silicon Co Ltd Silicon Co Ltd Jump to: navigation, search Name Korea Silicon Co Ltd Place Seongnam, Gyeonggi-do, Korea (Republic) Sector Solar Product Korean manufacturer planning to output polysilicon, ingots and wafers for the solar industry. Coordinates 37.397652°, 127.115189° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":37.397652,"lon":127.115189,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

157

Korea Solar Inc | Open Energy Information  

Open Energy Info (EERE)

Solar Inc Solar Inc Jump to: navigation, search Name Korea Solar Inc Place Seoul, Korea (Republic) Sector Solar Product Manufacturer of solar collectors, modules, and water heaters. Coordinates 37.557121°, 126.977379° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":37.557121,"lon":126.977379,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

158

Industrialization and Social Mobility in Korea  

E-Print Network (OSTI)

This study intends to investigate the patterns of intergenerational mobility among Korean men and to assess the extent to which the Korean case shows distinctiveness within the framework of the core model proposed by Erikson and Goldthorpe (1992a). The greater dissimilarity between origins and destinations associated with massive movement of labor forces out of farm origins, and in the process the predominance of upward over downward mobility are distinctive features of Korea compared to England, France, and Sweden. More importantly, Korean society shows substantial deviations from the core model as four effects among original eight effects in the core more turn out to be non-significant. Finally, the analysis of the log-multiplicative layer effect model even suggests that the overall level of fluidity appears higher in Korea relative to the three European countries. 1

Hyunjoon Park; Hyunjoon Park

1999-01-01T23:59:59.000Z

159

North Korea Fossil-Fuel CO2 Emissions  

NLE Websites -- All DOE Office Websites (Extended Search)

Far East » North Korea Far East » North Korea North Korea Fossil-Fuel CO2 Emissions Graph graphic Graphics Data graphic Data Trends The total fossil-fuel CO2 emissions for North Korea, or the Democratic People's Republic of Korea, averaged 11.2% growth from 1950-93, reaching 71 million metric tons of carbon. Since 1993 according to published UN energy statistics, fossil-fuel CO2 emissions have declined 70% to 21.4 million metric tons of carbon. As the world's 14th largest producer of coal, it is no surprise North Korea's fossil-fuel CO2 emissions record is dominated by emissions from coal burning. Coal consumption accounted for 93% of the 2008 CO2 emission total. With no natural gas usage, another 3.4% currently comes from liquid petroleum consumption, and the remainder is from cement

160

Intergenerational Transmission of Womens Educational Attainment in South Korea: An Application of Multi-group Population Projection Model  

E-Print Network (OSTI)

Park Sangtae, and Eun Ki-Soo. eds. Population in Korea.Korea National Statistical Office. (in Korean) Keyfitz,Ki-Soo. eds. Population in Korea. Korea National Statistical

Kye, Bongoh

2008-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "deutsche securities korea" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

States Senate Committee on Armed Services Press Release Sep 17, 2013 NNSA, Republic of Korea Ministry Agree to Minimize Use of HEU in Nuclear Reactors Press Release Sep 3, 2013...

162

National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Committee on Armed Services September 17, 2013 2 weeks 4 days ago NNSA, Republic of Korea Ministry Agree to Minimize Use of HEU in Nuclear Reactors September 03, 2013 4 weeks 4...

163

Energy, Climate & Infrastructure Security  

E-Print Network (OSTI)

Energy, Climate & Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST Sandia Security Administration under contract DE-AC04-94AL85000. SAND 2012-1670P Thermal thermal environments different from regulatory standards. Packaging, Transport, Storage & Security

164

Designing security into software  

E-Print Network (OSTI)

When people talk about software security, they usually refer to security applications such as antivirus software, firewalls and intrusion detection systems. There is little emphasis on the security in the software itself. ...

Zhang, Chang Tony

2006-01-01T23:59:59.000Z

165

CAMPUS SECURITY CARD REQUISITION  

E-Print Network (OSTI)

CAMPUS SECURITY CARD REQUISITION DEPARTMENT LAST NAME GIVEN NAME(S) SFU ID NUMBER CARD NUMBER CAMPUS SECURITY OFFICE USE ONLY SERVICE CHARGE: ___________________________ DEPOSIT be reported or returned to Campus Security TC 050 (291-5448). CARDHOLDER SIGNATURE DATE: #12;

166

South KoreaU.S. free trade agreement will lower export barriers for California products  

E-Print Network (OSTI)

trade U.S. exports to South Korea (South Korean imports fromPistachios Lettuce To South Korea (A) To all destinations (DC. www.fas.usda.gov/gats. [KATI] Korea Agricultural Trade

Lee, Hyunok; Sumner, Daniel A

2011-01-01T23:59:59.000Z

167

Tik-borne rickettsial pathogens in ticks and small mammals in Korea  

E-Print Network (OSTI)

mites and small mammals in Korea. J. Vet. Sci. 6:327334.Haemaphysalis longicornis in Korea. Microbiol. Immunol. 47:hemorrhagic disease patients in Korea, 1988. J. Korean Soc.

2006-01-01T23:59:59.000Z

168

Fuel and Famine: Rural Energy Crisis in the Democratic People's Republic of Korea  

E-Print Network (OSTI)

Energy Supply in North Korea, 1990 and 1996. All forms ofEnergy Consumption in North Korea by sector, 1990 and 1996.Peoples Republic of Korea James H. Williams, David Von

Williams, James H.; von Hippel, David; Hayes, Peter

2000-01-01T23:59:59.000Z

169

Establishing a New Stock Market for Shareholder Value Oriented Firms in Korea  

E-Print Network (OSTI)

a reform, moreover, may give Korea the incentive and time toConference Program (Seoul, Korea 2002) sponsored by theVALUE*** (BIL. WON) OF * The Korea composite stock price

Choi, Stephen

2004-01-01T23:59:59.000Z

170

Engaging in Dialogue: Womens Petitions in Eighteenth Century Chos?n Korea  

E-Print Network (OSTI)

in Eighteenth Century of Chos?n Korea Petitions are used bywith its own legal system. Korea is no exception in thateighteenth century of Chos?n Korea (1392-1910). The petition

Kim, Jisoo

2008-01-01T23:59:59.000Z

171

Crisis, Contradiction and Contingency: An Ethnography of Corporate Capitalism in Korea and Indonesia  

E-Print Network (OSTI)

Asias Next Giant: South Korea and Industrialization. Newthe Environment in South Korea. Armonk: M.E. Sharpe. Embree,Political Struggle in South Korea. New York: Monthly Review

Eau, Jaisohn

2010-01-01T23:59:59.000Z

172

Holy Mother of Chiri Mountain: A Female Mountain Spirit in Korea  

E-Print Network (OSTI)

Female Mountain Spirit in Korea by Maya Stiller UCLA Centera Female Mountain Spirit in Korea by Maya Stiller I n hisfemale mountain spirits in Korea, James Grayson argues that

Stiller, Maya

2011-01-01T23:59:59.000Z

173

The Prospective Free Trade Agreement with Korea: Background, Analysis, and Perspectives for California Agriculture  

E-Print Network (OSTI)

and T. Moll. Negotiating the Korea-United States Free TradeBrie?ng Room, South Korea. Available at www.ers.usda.gov/Service. Fact Sheet: U.S. -Korea Free Trade Agree- ment

Lee, Hyunok; Sumner, Dan

2009-01-01T23:59:59.000Z

174

Judgments of Children and Adolescents on Exclusion and Inclusion of a Biracial Peer in Korea  

E-Print Network (OSTI)

of foreign wives in rural area. Korea Cultural Anthropology,and Psychopathology, 9, 5973. Korea faces up to the2008, August 07). The Korea Herald. Retrieved from http://

HWANG, JEONG YEON

2011-01-01T23:59:59.000Z

175

Bus Rapid Transit Impacts on Land Uses and Land Values in Seoul, Korea  

E-Print Network (OSTI)

a GIS company based in Korea, for technical support and toKim from Veolia Transport Korea for assistance with thisPublic Transport. Seoul, Korea: Seoul Development Institute,

Cervero, Robert; Kang, Chang Deok

2009-01-01T23:59:59.000Z

176

Wildlife Vehicle Collision be Decreased by Increasing the Number of Wildlife Passages in Korea?  

E-Print Network (OSTI)

living in the rural area of Korea. Journal of Ecology andUsing Snow Tracking in Korea. Korean Journal of EnvironmentGwanakgu, Seoul 151-742 Korea Abstract: The mitigation of

Choi, Tae-Young; Park, Chong-Hwa

2007-01-01T23:59:59.000Z

177

A Survey Study of Institutional Review Board Thought Processes in the United States and South Korea  

E-Print Network (OSTI)

Institutional Review Boards in Korea. Korean J Med Ethics.trials in the Republic of Korea. Drug Inf J. 1998;32:S1217in the United States and South Korea Si-Kyung Jung, MD, PhD*

Jung, Si-Kyung; Jeong, Yeon Hee; Lee, Woon Jeong; Lee, Carol; Kaji, Amy H; Lewis, Roger J

2012-01-01T23:59:59.000Z

178

Accidental Activists: How Victim Groups Hold the Government Accountable in Japan and South Korea  

E-Print Network (OSTI)

2067. Yokota, Sakie. North Korea Kidnapped My Daughter. NewShimbun Yomiuri Shimbun Sankei Shimbun Japan Times KoreaTimes Korea Herald JoongAng Ilbo Chosun Ilbo Dong-A Ilbo

Arrington, Celeste Louise

2010-01-01T23:59:59.000Z

179

Gender modifies the relationship between social networks and smoking among adults in Seoul, South Korea  

E-Print Network (OSTI)

adults in Seoul, South Korea John W. Ayers C. Richardbehaviors in Seoul, South Korea, where smoking is commonKyonggi-Do, Republic of Korea H. -Y. Paik Department of Food

2010-01-01T23:59:59.000Z

180

National Nuclear Security Administration  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

National Nuclear Security Administration National Nuclear Security Administration Ofice of Secure Transportation mKlK= Box RQMM= ^luquerqueI= kj= UTNUR= ;JAN 03 213 MEMORANDUM FOR GREGORY eK= WOODS GENERAL COUNSEL DEPARTMENT OF ENERGY FROM: SUBJECT: JEFFREY P. HARREL ASSIST ANT DEPU FOR SECURE 2013 ANNUAL PLANNING SUMMARY In response to your memorandum of December TI= 2012, the following information is provided for the National Nuclear Security Administration Ofice of Secure

Note: This page contains sample records for the topic "deutsche securities korea" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

Security guide for subcontractors  

Science Conference Proceedings (OSTI)

This security guide of the Department of Energy covers contractor and subcontractor access to DOE and Mound facilities. The topics of the security guide include responsibilities, physical barriers, personnel identification system, personnel and vehicular access controls, classified document control, protecting classified matter in use, storing classified matter repository combinations, violations, security education clearance terminations, security infractions, classified information nondisclosure agreement, personnel security clearances, visitor control, travel to communist-controlled or sensitive countries, shipment security, and surreptitious listening devices.

Adams, R.C.

1991-01-01T23:59:59.000Z

182

Korea, South - Analysis - U.S. Energy Information Administration (EIA)  

U.S. Energy Information Administration (EIA)

Exploration and production. South Korea produced about 18 Bcf of natural gas (about 1.3 percent of consumption) in 2011 from the domestic gas field in production, ...

183

The Political Economies of Broadband Development in Korea and Japan  

E-Print Network (OSTI)

NCA), Informatization White Paper 2004: Broadband IT Korea (FTTH was 95% (MIC, White Paper, 2003). 67. See Kushida, and communications white paper 2006] (Tokyo: MIC, 2006), p.

Kushida, Kenji; Oh, Seung-Youn

2007-01-01T23:59:59.000Z

184

NIST, Computer Security Division, Computer Security ...  

Science Conference Proceedings (OSTI)

... Standards. ITL January 1999, Jan 1999, Secure Web-Based Access to High Performance Computing Resources. ITL November ...

185

NIST, Computer Security Division, Computer Security ...  

Science Conference Proceedings (OSTI)

... Security Strategies for the Smart Grid: Protecting the ... Overview: The Government Smart Card Interoperability ... Mar 2001, An Introduction to IPsec ...

186

Personnel Security Program | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

187

Radiological Security | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

188

Cyber Security Evaluations - Reports  

NLE Websites -- All DOE Office Websites (Extended Search)

Oversight Program Home Office of Security and Cyber Evaluations Office of Safety and Emergency Management Evaluations Guidance Documents Security and Cyber Evaluations ...

189

Cyber Security Module  

NLE Websites -- All DOE Office Websites (Extended Search)

Cyber Security Module Cyber security training is required for all facility users and must be submitted before or upon arrival at the GUV Center. System Requirements and Information...

190

Security - Problem Solved?  

Science Conference Proceedings (OSTI)

There are plenty of security problems that have solutions. Yet, our security problems don't seem to be going away. What's wrong here?

John Viega

2005-06-01T23:59:59.000Z

191

Office of Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Security Home Sub Offices › Security Policy › Security Assistance › Departmental Personnel Security Mission & Functions › Security Policy › Security Assistance › Departmental Personnel Security Human Reliability Program (HRP) Guidance Documents Security Technology Information Archive (STIA) Related Links › DOE › DOE CIO › NNSA › DOE CFO › NTC › S&S PIR Contact Us HSS Logo Welcome to the Office of Security Mission and Functions The Office of Security (HS-50) developes security policy, provides security expertise to assist field elements in planning site protection strategies and coordinates with domestic authorities to provide safeguards and security technical assistance, technical systems support, and technology development and deployment opportunities. The Office of Security, through the Office of Departmental Personnel Security, also ensures that Departmental personnel security programs (included the National Nuclear Security Administration) are consistent and effectively implemented.

192

Security: A Coordinated Approach  

Science Conference Proceedings (OSTI)

... SIM / SEM Asset Management System AAA ICS/SCADA Security Physical Security ... Location-Awareness ICS/SCADA Smart Grid Mobile Devices ...

2012-10-26T23:59:59.000Z

193

JLab Security Banner  

NLE Websites -- All DOE Office Websites (Extended Search)

Computer Center | Jefferson Lab Home | Experiments | The Lab | News Privacy and Security Notice Security Notice This is a Federal computer system and is the property of the United...

194

NNSA orders security enhancements  

NLE Websites -- All DOE Office Websites (Extended Search)

orders security enhancements NNSA orders security enhancements Because of this government order, until further notice all vehicles entering government property will be required to...

195

NIST Cyber Security Framework  

Science Conference Proceedings (OSTI)

Page 1. NIST Cyber Security Framework ISA-62443-2-1 :2009 ISA-62443-2-1 (Ed. 2, D2E8 ... Page 2. Security NIST Cyber ...

2013-12-13T23:59:59.000Z

196

Office of Security Policy  

NLE Websites -- All DOE Office Websites (Extended Search)

Office of Security Policy Office of Security Policy Mission and Functions The Office of Security Policy develops and promulgates safeguards and security policy governing the protection of National Security and other critical assets entrusted to the Department. Director's Perspective Welcome to the Office of Security Policy Jack Cowden, Director The Office of Security Policy analyzes, develops and interprets safeguards and security policy governing national security functions and the protection of related critical assets entrusted to the Department. This includes the protection of DOE nuclear facilities, nuclear weapons components, special nuclear materials and classified information. Our broad topical areas are organized as: Program Planning and Management, Protection Program Operations (which includes both physical security and protective forces), Information Security and Material Control and Accountability.

197

CYBER SECURITY METRICS AND MEASURES  

Science Conference Proceedings (OSTI)

... CYBER SECURITY METRICS AND MEASURES ... Keywords: cyber security; metrics; measures; software; computer systems; IT ...

2013-05-07T23:59:59.000Z

198

Secure Manufacturing | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Secure Secure Manufacturing Secure Manufacturing The depth and breadth of Y-12's manufacturing capabilities and expertise enable Y-12 to address current and emerging national security challenges by providing leadership and direction to perform the following activities: solving unique, high-risk manufacturing problems; eliminating the most difficult manufacturability and development obstacles; protecting classified and proprietary materials, components, and information; developing unique technologies to optimize manufacturing and systems performance; and executing projects cost effectively and with timeliness. Y-12 accomplishes this mission to meet the national security challenges of today and those of the future, with capability and expertise in the following areas:

199

Security tasks are highly interdependent.  

E-Print Network (OSTI)

Motivation Security tasks are highly interdependent. To improve security tools, we need to understand how security practitioners collaborate in their organizations. Security practitioners in context Exchange of Information Develop security tools that: · Integrate information from different communication

200

Security Policies Dr. Ahmad Almulhem  

E-Print Network (OSTI)

Security Policies Dr. Ahmad Almulhem Computer Engineering Department, KFUPM Spring 2008 Ahmad Almulhem - Network Security Engineering - 2008 1 / 51 #12;Security Policies Types of Security Policies Trust Types of Access Control Summary Part I Overview Ahmad Almulhem - Network Security Engineering

Almulhem, Ahmad

Note: This page contains sample records for the topic "deutsche securities korea" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

Nuclear Security | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

| National Nuclear Security Administration | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nuclear Security Home > About Us > Our Programs > Nuclear Security Nuclear Security The Office of Defense Nuclear Security (DNS) is responsible for the development and implementation of security programs for NNSA. In this capacity, DNS is the NNSA line management organization responsible for

202

Nuclear Security | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

| National Nuclear Security Administration | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nuclear Security Home > About Us > Our Programs > Nuclear Security Nuclear Security The Office of Defense Nuclear Security (DNS) is responsible for the development and implementation of security programs for NNSA. In this capacity, DNS is the NNSA line management organization responsible for

203

Nuclear Security Enterprise | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Enterprise | National Nuclear Security Administration Enterprise | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nuclear Security Enterprise Home > About Us > Our Programs > Defense Programs > Nuclear Security Enterprise Nuclear Security Enterprise The Nuclear Security Enterprise (NSE) mission is to ensure the Nation sustains a safe, secure, and effective nuclear deterrent through the

204

Implications of the Lisbon Treaty on the European Union's Common Security Defense Policy and the Emerging Strategic  

E-Print Network (OSTI)

, such as those involving Iran and North Korea; significant strengthening of the nuclear non-proliferation and nuclear security regimes, including bringing India, Israel and Pakistan into the Nuclear Non-Proliferation of states not conforming to international rules and norms. In the nuclear non-proliferation regime

205

Nuclear Security & Safety  

Energy.gov (U.S. Department of Energy (DOE))

The Energy Department is working to enhance nuclear security through defense, nonproliferation, and environmental efforts.

206

Security Technologies Group  

Science Conference Proceedings (OSTI)

Security Technologies Group. Welcome. Our group develops measurement science in support of performance-based standards ...

2012-10-24T23:59:59.000Z

207

Industrial Control Systems Security  

Science Conference Proceedings (OSTI)

... Risk Management Architecture security focus Physical interaction ... Cybersecurity Cybersecurity Framework Smart Grid Program ...

2013-06-05T23:59:59.000Z

208

NERSC Computer Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Security NERSC Computer Security NERSC computer security efforts are aimed at protecting NERSC systems and its users' intellectual property from unauthorized access or modification. Among NERSC's security goal are: 1. To protect NERSC systems from unauthorized access. 2. To prevent the interruption of services to its users. 3. To prevent misuse or abuse of NERSC resources. Security Incidents If you think there has been a computer security incident you should contact NERSC Security as soon as possible at security@nersc.gov. You may also call the NERSC consultants (or NERSC Operations during non-business hours) at 1-800-66-NERSC. Please save any evidence of the break-in and include as many details as possible in your communication with us. NERSC Computer Security Tutorial

209

Office of Security Assistance  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Security Home Sub Offices › Security Policy › Security Assistance › Departmental Personnel Security Mission & Functions › Security Policy › Security Assistance › Departmental Personnel Security Human Reliability Program (HRP) Guidance Documents Security Technology Information Archive (STIA) Related Links › DOE › DOE CIO › NNSA › DOE CFO › NTC › S&S PIR Contact Us HSS Logo Director's Perspective Welcome to the Office of Security Assistance Samuel N. Callahan, Director Mission and Functions The Office of Health, Safety, and Security (HSS) created the Office of Security Assistance Program to provide timely technical assistance and system support to field and Headquarters elements to enhance site security programs, upon request. The program is comprised of technologists and subject matter experts from all security disciplines including Program Management, Protection Program Operations, Information Security, Materials Control and Accountability, and Personnel Security. HSS is committed to building a security assistance program to serve the interests of the Department based upon the needs of our customers - with emphasis on customer-focus and meeting multi-disciplinary security needs. In Fiscal Year 2007, HSS performed extensive assistance activities at the request of DOE/NNSA program offices and field sites. The activities ranged from special and routine site survey assistance, physical and technical security inspections in support of the Office of Intelligence, Vulnerability Assessment and Design Basis Threat (DBT) implementation assistance, third-party, adversary support, and DBT implementation and planning validation activities associated with the Site Assistance Visits and Technology Assistance Visits. The security assistance provided to our customers included technical expertise tailored to augment site capabilities in critical fields.

210

MasteringWeb Services Security MasteringWeb Services Security  

E-Print Network (OSTI)

Preview of MasteringWeb Services Security Preview of MasteringWeb Services Security Konstantin introduction Highlights of the book Web Services security problem XML Security WS-Security Security mechanisms for ASP.NET Web Services Planning and building secure Web Service systems ­ Architectural and policy

211

Global Security | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Security Global Security We train nuclear industry professionals, emergency responders and security forces from around the world to safeguard vulnerable materials. Nuclear nonproliferation - stopping the spread of nuclear materials - is a critical part of creating a safer world. Y-12 has been working in nonproliferation since the early 1990s in more than 25 countries. As the nation reduces the size of its arsenal, Y-12 will play a central role in decommissioning weapons systems and providing weapons material for peacetime uses. We are a leader across the National Nuclear Security Administration in implementing technology and current training to ensure materials are protected with the highest degree of confidence. We provide the expertise to secure highly enriched uranium - domestically

212

Security Notice | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Notice Security Notice Security Notice Security Information This website is part of a federal computer system used to accomplish federal functions. Y-12 uses software programs to monitor this website for security purposes to ensure it remains available to all users and to protect information in the system. By accessing this website, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features; to use the system for other than intended purposes; to deny service to authorized users; to access, obtain, alter, damage, or destroy information; or otherwise to interfere with the system or its operation - all are prohibited. Evidence of such acts may be disclosed to law enforcement authorities and result in criminal prosecution under the Computer Fraud and

213

NIST, Computer Security Division, Computer Security ...  

Science Conference Proceedings (OSTI)

... The NIST Handbook SP 800-12. SP 800-12 (HTML). NIST IR 7621, Oct 2009, Small Business Information Security: The Fundamentals NISTIR 7621. ...

214

Office of Headquarters Security Operations: Security Awareness...  

NLE Websites -- All DOE Office Websites (Extended Search)

Paul Ruehs Contact Information: Paul Ruehs - (301) 903-7189; Room F-324 Scope: The Security Awareness Program is established by DOE Order to inform individuals of their...

215

National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

i. i. Message from the Administrator President Obama has reshaped our national security priorities making enterprise infrastructure modernization with integrated Information Technology (IT) capabilities a key strategic initiative. Our IT infrastructure must ensure that our workforce can access appropriate information in a secure, reliable, and cost-effective manner. Effective information sharing throughout the government enhances the national security of the United States (US). For the National Nuclear Security Administration (NNSA), effective information sharing helps strengthen our nuclear security mission; builds collaborative networks within NNSA as well as with the Department of Energy (DOE), Department of Defense (DoD), and other national security

216

Homeland Security Programs | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Homeland Security Programs Homeland Security Programs SHARE Homeland Security Programs The Homeland Security Programs support the Department of Homeland Security (DHS), other federal and state agencies, and commercial partners. Through the integration of a number of key competencies, ORNL is able to provide critical operational, technical, and scientific support to these sponsors. A key focus of this area is to translate the critical research into operational capability for the security, protection, response, and recovery of the nation against natural and man-made events. Research Areas detecting, preventing, and reversing the proliferation of weapons of mass destruction deploying integrated systems for incident awareness, detection, and response providing technology for detecting explosives at the

217

SECURITY ASSESSMENTS: TOOLS FOR MEASURING THE EFFECTIVENESS OF SECURITY CONTROLS  

E-Print Network (OSTI)

SECURITY ASSESSMENTS: TOOLS FOR MEASURING THE EFFECTIVENESS OF SECURITY CONTROLS Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute of Standards and Technology The selection and implementation of security controls are critical decisions for protecting

218

Campus Security Report 1 Campus seCurity  

E-Print Network (OSTI)

Campus Security Report 1 Campus seCurity and Fire saFety report UC Santa Cruz 2010 #12;Campus Security Report 2 UC Santa Cruz Geography ........................................................ 8 Security and Access to Campus Buildings and Grounds ........................................ 8

Wilmers, Chris

219

Country Report on Building Energy Codes in Korea  

SciTech Connect

This report is part of a series of reports on building energy efficiency codes in countries associated with the Asian Pacific Partnership (APP) - Australia, South Korea, Japan, China, India, and the United States of America (U.S.). This reports gives an overview of the development of building energy codes in Korea, including national energy policies related to building energy codes, history of building energy codes, recent national projects and activities to promote building energy codes. The report also provides a review of current building energy codes (such as building envelope, HVAC, and lighting) for commercial buildings in Korea.

Evans, Meredydd; McJeon, Haewon C.; Shui, Bin; Lee, Seung Eon

2009-04-17T23:59:59.000Z

220

Design of the soalr town project in Seoul, Korea  

Science Conference Proceedings (OSTI)

The design of a complete solar residential subdivision in Seoul, Korea is described. The design work included site visits, the familiarization with local building practices, and the transfer of American solar technology to the Korean architectural/engineering community. This program is part of an immense project by the Korean government establishing a satellite community near Seoul, Korea and will eventually contain 2,200 solar residential units. This area of Korea, which experiences winters similar to Boston, Massachusetts, relies heavily on imported oil for residential space heating use and would welcome the energy cost relief that solar energy could produce.

Marchand, K.E. (Bickle/CM Inc., Albuquerque, NM); Lee, U.J.

1980-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "deutsche securities korea" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

Learning mobile security with android security labware  

Science Conference Proceedings (OSTI)

As smart mobile devices grow increasingly in popularity, so do the incentives for attackers. Recent surveys on mobile security describe the rapidly increasing number and sophistication of mobile attacks. Newer sources of risks are being introduced or ... Keywords: android, labware, mobile security

Minzhe Guo; Prabir Bhattacharya; Ming Yang; Kai Qian; Li Yang

2013-03-01T23:59:59.000Z

222

Quantifying Security in Secure Software Development Phases  

Science Conference Proceedings (OSTI)

Secure software is crucial in todays software dependent world. However, most of the time, security is not addressed from the very beginning of a software development life cycle (SDLC), and it is only incorporated after the software has been developed. ...

Muhammad Umair Ahmed Khan; Mohammad Zulkernine

2008-07-01T23:59:59.000Z

223

Recent Experience of and Prospects for High-Speed Rail in Korea: Implications of a Transport System and Regional Development from a Global Perspective  

E-Print Network (OSTI)

from the High-speed Rail, Korea Research Institute for Humanof High-Speed Rail, Korea Research Institute for Humanhigh-speed rail (Korea Railway Research Institute) Improving

Shin, Dong-Chun

2005-01-01T23:59:59.000Z

224

Recent Experience of and Prospects for High-Speed Rail in Korea: Implications of a Transport System and Regional Development from a Global Perspective  

E-Print Network (OSTI)

for High-Speed Rail in Korea: Implications of a TransportMinistry of Transport Seoul, Korea and Visiting ScholarDevelopment in Korea 13 III.1.

Shin, Dong-Chun

2005-01-01T23:59:59.000Z

225

OCEAN DRILLING PROGRAM LEG 160 PRELIMINARY REPORT  

E-Print Network (OSTI)

/Canada/Chinese Taipei/Korea Consortium for Ocean Drilling Deutsche Forschungsgemeinschaft (Federal Republic of Germany

226

OCEAN DRILLING PROGRAM LEG 160 SCIENTIFIC PROSPECTUS  

E-Print Network (OSTI)

/Canada/Chinese Taipei/Korea Consortium for Ocean Drilling Deutsche Forschungsgemeinschaft (Federal Republic of Germany

227

Nuclear Security 101 | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

101 | National Nuclear Security Administration 101 | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > Media Room > Fact Sheets > Nuclear Security 101 Fact Sheet Nuclear Security 101 Mar 23, 2012 The goal of United States Government's nuclear security programs is to prevent the illegal possession, use or transfer of nuclear material,

228

Nuclear Security 101 | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

101 | National Nuclear Security Administration 101 | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > Media Room > Fact Sheets > Nuclear Security 101 Fact Sheet Nuclear Security 101 Mar 23, 2012 The goal of United States Government's nuclear security programs is to prevent the illegal possession, use or transfer of nuclear material,

229

Cyber Security Evaluations - Reports  

NLE Websites -- All DOE Office Websites (Extended Search)

Cyber Security Reports Cyber Security Reports 2012 Review of the Classified Cyber Security Programs at the Lawrence Livermore National Laboratory, January 2012, (OUO) Independent Oversight Review of the Classified Cyber Security Programs at the Savannah River Site, March 2012, (OUO) Independent Oversight Review of the Unclassified and Classified Cyber Security Programs at the Office of Scientific and Technical Information, March 2012, (OUO) Independent Oversight 2011 Report on Security Vulnerabilities of National Laboratory Computers, April 13, 2012, (OUO) Technical Review of the Office of Health, Safety and Security Classified Local Area Network, May 2012, (OUO) 2011 (U) Unclassified Cyber Security Technical Review of the Bonneville Power Administration Transmission Services Control Center Network, (OUO), May 2011

230

Secure Shell (SSH)  

NLE Websites -- All DOE Office Websites (Extended Search)

Secure Shell (SSH) Name: Rutaiwan Status: Educator Age: 20s Location: NA Country: NA Date: June 2003 Question: What is the Secure Shell (SSH)? What is a strong and weak points of...

231

Foundation for system security  

Science Conference Proceedings (OSTI)

We provide a coherent framework for the design and analysis of secure systems. Our framework is inspired by Lawrence Lessig's modalities of control, by Niklas Luhmann's theory of trust, by existing models of information security, and by existing models ...

Clark Thomborson

2009-01-01T23:59:59.000Z

232

Performance and security tradeoff  

Science Conference Proceedings (OSTI)

A tradeoff is a situation that involves losing one quality or aspect of something in return for gaining another quality or aspect. Speaking about the tradeoff between performance and security indicates that both, performance and security, can be measured, ...

Katinka Wolter; Philipp Reinecke

2010-06-01T23:59:59.000Z

234

Checking Security Policy Compliance  

E-Print Network (OSTI)

Ensuring compliance of organizations to federal regulations is a growing concern. This paper presents a framework and methods to verify whether an implemented low-level security policy is compliant to a high-level security policy. Our compliance checking framework is based on organizational and security metadata to support refinement of high-level concepts to implementation specific instances. Our work uses the results of refinement calculus to express valid refinement patterns and their properties. Intuitively, a low-level security policy is compliant to a high-level security policy if there is a valid refinement path from the high-level security policy to the low-level security policy. Our model is capable of detecting violations of security policies, failures to meet obligations, and capability and modal conflicts.

Gowadia, Vaibhav; Kudo, Michiharu

2008-01-01T23:59:59.000Z

235

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... Digital Age - Information Security Transformation for the ... to Information Systems (Transforming the Certification ... for Smart Grid Cyber Security (NIST ...

236

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... Automated Information Flows for Situational Awareness; Transformation of Dynamic Security ... Cyber security leadership in the Executive Branch. ...

237

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... per the Security Content Automation Protocol (SCAP ... securely install and configure a device; and; ... applicable scenarios and distribution formats, the ...

238

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... Nuclear Regulatory Commission; National Security Agency (File ... Richard S. Carson & Associates; RSA Securities; RU Consulting (File 1 of 2 ...

239

ADVANCED DATA SECURITY  

Science Conference Proceedings (OSTI)

ADVANCED DATA SECURITY. NVLAP Lab Code: 200968-0. Address and Contact Information: 1933 O'Toole Avenue San ...

2013-11-08T23:59:59.000Z

240

National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

Note: This page contains sample records for the topic "deutsche securities korea" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

Security system signal supervision  

SciTech Connect

This purpose of this NUREG is to present technical information that should be useful to NRC licensees for understanding and applying line supervision techniques to security communication links. A review of security communication links is followed by detailed discussions of link physical protection and DC/AC static supervision and dynamic supervision techniques. Material is also presented on security for atmospheric transmission and video line supervision. A glossary of security communication line supervision terms is appended. 16 figs.

Chritton, M.R. (BE, Inc., Barnwell, SC (United States)); Matter, J.C. (Sandia National Labs., Albuquerque, NM (United States))

1991-09-01T23:59:59.000Z

242

Verifiably secure devices  

Science Conference Proceedings (OSTI)

We put forward the notion of a verifiably secure device, in essence a stronger notion of secure computation, and achieve it in the ballot-box model. Verifiably secure devices 1. Provide a perfect solution to the problem of achieving correlated equilibrium, ...

Sergei Izmalkov; Matt Lepinski; Silvio Micali

2008-03-01T23:59:59.000Z

243

Understanding Android Security  

Science Conference Proceedings (OSTI)

Google's Android platform is a widely anticipated open source operating system for mobile phones. This article describes Android's security model and attempts to unmask the complexity of secure application development. The authors conclude by identifying ... Keywords: Android, mobile phones, Smartphones, security

William Enck; Machigar Ongtang; Patrick McDaniel

2009-01-01T23:59:59.000Z

244

Lemnos interoperable security project.  

Science Conference Proceedings (OSTI)

With the Lemnos framework, interoperability of control security equipment is straightforward. To obtain interoperability between proprietary security appliance units, one or both vendors must now write cumbersome 'translation code.' If one party changes something, the translation code 'breaks.' The Lemnos project is developing and testing a framework that uses widely available security functions and protocols like IPsec - to form a secure communications channel - and Syslog, to exchange security log messages. Using this model, security appliances from two or more different vendors can clearly and securely exchange information, helping to better protect the total system. Simplify regulatory compliance in a complicated security environment by leveraging the Lemnos framework. As an electric utility, are you struggling to implement the NERC CIP standards and other regulations? Are you weighing the misery of multiple management interfaces against committing to a ubiquitous single-vendor solution? When vendors build their security appliances to interoperate using the Lemnos framework, it becomes practical to match best-of-breed offerings from an assortment of vendors to your specific control systems needs. The Lemnos project is developing and testing a framework that uses widely available open-source security functions and protocols like IPsec and Syslog to create a secure communications channel between appliances in order to exchange security data.

Halbgewachs, Ronald D.

2010-03-01T23:59:59.000Z

245

Security auditing course development  

Science Conference Proceedings (OSTI)

As people increasingly depend on computers and network systems, security auditing has become one of the most effective security practices to achieve defense-in-depth in organizations. It follows an effective process to measure policies, procedures ... Keywords: IT audit, IT education, curriculum development, security

Yin Pan

2007-10-01T23:59:59.000Z

246

Energy, Climate & Infrastructure Security  

E-Print Network (OSTI)

Energy, Climate & Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST Sandia Security Administration under contract DE-AC04-94AL85000. SAND 2012-1846P CustomTraining Sandia providesPRAsandhowtheycanbemanaged to increase levels of safety and security. Like othertrainings,Sandiaexpertsdesigncoursesto beasbroadorin

247

Human Rights and Security  

E-Print Network (OSTI)

Migration, Human Rights and Security in Europe MRU Student Conference Proceedings 2012 Edited by Siril Berglund, Helen McCarthy and Agata Patyna #12;2 "Migration, Human Rights and Security...............................................................................................58 #12;3 "Migration, Human Rights and Security in Europe", MRU Student Conference Proceedings

Saunders, Mark

248

UNIVERSITY POLICE ANNUAL SECURITY  

E-Print Network (OSTI)

UNIVERSITY POLICE 2013 ANNUAL SECURITY AND FIRE SAFETY GUIDE In compliance with the Jeanne Clery Disclosure of Campus Security Policy and Campus Crime Statistics Act The University of New Orleans. Please take a moment to read the following information. #12;ANNUAL SECURITY AND FIRE SAFETY GUIDE 2013

Kulp, Mark

249

Functional Programming and Security  

E-Print Network (OSTI)

This paper analyses the security contribution of typical functional-language features by examining them in the light of accepted information security principles. Imperative and functional code are compared to illustrate various cases. In conclusion, there may be an excellent case for the use of functional languages on the grounds of better security; however, empirical research should be done to validate this possibility.

Motara, Yusuf Moosa

2012-01-01T23:59:59.000Z

250

Information Security Guide  

E-Print Network (OSTI)

Information Security Guide For Government Executives Pauline Bowen Elizabeth Chew Joan Hash #12; Table of Contents Introduction 1 Why do I need to invest in information security? 2 Where do I need to focus my attention in accomplishing critical information security goals? 4 What are the key activities

251

Energy, Climate & Infrastructure Security  

E-Print Network (OSTI)

Energy, Climate & Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST Sandia Security Administration under contract DE-AC04-94AL85000. SAND 2012-0987P Transportation of the safe and secure transport of radioactive and hazardous materials. AWaytoEnsureSafeTransport Sandia

252

Program Areas | National Security | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Programs Initiatives Facilities Events and Conferences Supporting Organizations National Security Home | Science & Discovery | National Security | Program Areas SHARE Program...

253

Supporting Organizations | National Security | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Initiatives Facilities Events and Conferences Supporting Organizations National Security Home | Science & Discovery | National Security | Supporting Organizations SHARE Supporting...

254

South Korea-Green Growth Strategy Support | Open Energy Information  

Open Energy Info (EERE)

South Korea-Green Growth Strategy Support South Korea-Green Growth Strategy Support Jump to: navigation, search Name South Korea-Green Growth Strategy Support Agency/Company /Organization Global Green Growth Institute (GGGI) Partner Brazilian Finance Ministry, EMBRAPA, FGV, Danish Energy Agency Sector Energy, Land Topics Low emission development planning Resource Type Publications Website http://www.gggi.org/ Program Start 2010 Country South Korea Eastern Asia References Global Green Growth Institute[1] Contents 1 Overview 2 Brazil 3 Indonesia 4 References Overview The Global Green Growth Institute (GGGI) was founded on the belief that economic growth and environmental sustainability are not merely compatible objectives; their integration is essential for the future of humankind. GGGI is dedicated to pioneering and diffusing a new model of economic

255

An assessment of North Korea's nuclear weapons capabilities  

E-Print Network (OSTI)

In February of 2013, North Korea conducted its third nuclear weapons test. Speculations are that this test was conducted to further develop a warhead small enough to fit on an intercontinental ballistic missile. This test ...

Sivels, Ciara (Ciara Brooke)

2013-01-01T23:59:59.000Z

256

Korea Electrotechnology Research Institute and Berkeley Lab Will...  

NLE Websites -- All DOE Office Websites (Extended Search)

Korea Electrotechnology Research Institute and Berkeley Lab Will Work Together on Smart Grid R&D NOTICE Due to the current lapse of federal funding, Berkeley Lab websites are...

257

A Spatiotemporal Analysis of Historical Droughts in Korea  

Science Conference Proceedings (OSTI)

The climatological characteristics of drought in South Korea were investigated using daily precipitation data for 17772008. The effective drought index was used to quantify the drought intensity. As a result, five characteristics were discovered. ...

Do-Woo Kim; Hi-Ryong Byun; Ki-Seon Choi; Su-Bin Oh

2011-09-01T23:59:59.000Z

258

Historical Records of Asian Dust Events (Hwangsa) in Korea  

Science Conference Proceedings (OSTI)

The observation of dust events in Korea must have been important through its long history because of its geographical and meteorological setting. Descriptions about dust events were well documented in historical archives, such as Samguk sagi (57 ...

Youngsin Chun; Hi-Ku Cho; Hyo-Sang Chung; Meehye Lee

2008-06-01T23:59:59.000Z

259

Building security requirements with CLASP  

Science Conference Proceedings (OSTI)

Traditionally, security requirements have been derived in an ad hoc manner. Recently, commercial software development organizations have been looking for ways to produce effective security requirements.In this paper, we show how to build security ... Keywords: application security, security process, security requirements

John Viega

2005-07-01T23:59:59.000Z

260

Lemnos Interoperable Security Program  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Lemnos Interoperable Security Program Lemnos Interoperable Security Program Creating common language and metrics for describing functions of network security tools and testing for interoperability As energy control systems employ more Internet-based features and routable communication methods, the need grows for enhanced security functions, such as firewalls, virtual private networks (VPNs), and intrusion detection systems. When purchasing network security products, today's control systems users cannot adequately compare products from different vendors because the industry lacks a widely accepted mechanism for evaluating functionality, performance,

Note: This page contains sample records for the topic "deutsche securities korea" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

Security | Argonne National Laboratory  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Security Nonproliferation and Nuclear Forensics Decision Science Sensors and Materials Security Enhancing national and homeland security requires technological advancements in everything from biosensors to risk assessments. Game-changing scientific discovery is required for the development of sensors, detectors and other technological advancements used to protect and defend our country. At Argonne, our highly collaborative community of scientists and engineers discover and develop critical security and defense technologies to prevent and mitigate events with the potential for mass disruption or destruction, thereby protecting our citizens and our national interests. Our goal is to make America a safer place through innovations in threat decision science, sensors and materials, infrastructure assurance,

262

Engineering secure software  

E-Print Network (OSTI)

In recent years computer software has gained notoriety for the endemic nature of security problems in software. These problems have been exploited with malicious intent by attackers. Most attempts at fixing these problems have been after-the-fact fixes in the form of software patches. The root causes for security problems in software are explored. A survey of research attempts at engineering secure software is presented. The techniques discussed range from those that are very similar to classical software engineering, to those that may be used in analyses of security requirements, as well as tools that can help engineer secure software. The survey classifies the approaches as process-oriented and as tools-oriented. The current approaches are incomplete in nature. They seem to address the security problem in parts and not in the whole. A comprehensive methodology, integrated with evolutionary software engineering practices is presented. The methodology combines both process and tools oriented approaches to construct secure software.

Jetly, Prateek

2001-01-01T23:59:59.000Z

263

T-674: Drupal Secure Password Hashes Module Security Bypass Vulnerability |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

74: Drupal Secure Password Hashes Module Security Bypass 74: Drupal Secure Password Hashes Module Security Bypass Vulnerability T-674: Drupal Secure Password Hashes Module Security Bypass Vulnerability July 22, 2011 - 3:00pm Addthis PROBLEM: Drupal Secure Password Hashes Module Security Bypass Vulnerability PLATFORM: Drupal Secure Password Hashes 6.X-1.0 Drupal Secure Password Hashes 5.X-1.4 ABSTRACT: The Secure Password Hashes module for Drupal is prone to a security-bypass vulnerability. reference LINKS: Drupal Homepage SA-CONTRIB-2011-026 - Secure Password Hashes (phpass) - Multiple Vulnerabilities IMPACT ASSESSMENT: Medium Discussion: This module uses the PHPass hashing library to try to store users hashed passwords securely. The module sets a fixed string for the 'pass' column in the {users} database column but does not replace the pass attribute of the account

264

Safeguards and Security and Cyber Security RM  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Safeguards and Security and Safeguards and Security and Cyber Security Review Module March 2010 CD- -0 OFFICE O S CD-1 OF ENVIRO Standard Safeguar and Cy Rev Critical D CD-2 M ONMENTA Review Pla rds and S yber Secu view Modul Decision (CD CD March 2010 AL MANAG an (SRP) Security urity le D) Applicabili D-3 GEMENT ity CD-4 Post Ope eration Standard Review Plan, 2 nd Edition, March 2010 i FOREWORD The Standard Review Plan (SRP) 1 provides a consistent, predictable corporate review framework to ensure that issues and risks that could challenge the success of Office of Environmental Management (EM) projects are identified early and addressed proactively. The internal EM project review process encompasses key milestones established by DOE O 413.3A, Change 1, Program and Project Management for the Acquisition of Capital Assets, DOE-STD-

265

Office of Headquarters Security Operations: Operations Security...  

NLE Websites -- All DOE Office Websites (Extended Search)

The Office of Health, Safety and Security HSS Logo Department of Energy Seal Left Tab SEARCH Right Tab TOOLS Right Tab Left Tab HOME Right Tab Left Tab ABOUT US Right Tab Left Tab...

266

Office of Headquarters Security Operations: Headquarters Security...  

NLE Websites -- All DOE Office Websites (Extended Search)

The Office of Health, Safety and Security HSS Logo Department of Energy Seal Left Tab SEARCH Right Tab TOOLS Right Tab Left Tab HOME Right Tab Left Tab ABOUT US Right Tab Left Tab...

267

International Reserves Management and Capital Mobility in a Volatile World: Policy Considerations and a Case Study of Korea  

E-Print Network (OSTI)

process, the Bank of Korea incurs the high quasi-fiscal costSupervisory Service of Korea, http://www.fss.or.kr. SEDdata are from Bank of Korea, http://www.bok.or.kr, unless

Aizenman, Joshua; Lee, Yeonho; Rhee, Yeongseop

2004-01-01T23:59:59.000Z

268

THE CHANGING ORDER IN NORTHEAST ASIA AND THE PROSPECTS FOR U.S.-JAPAN-CHINA-KOREA RELATIONS  

E-Print Network (OSTI)

successes in Asia, with North Korea as well as the Communistnational interests. ChinaKorea It remains to examine Chinas relations with the two Koreas and with Mongolia. It is

Scalapino, Robert A.

1998-01-01T23:59:59.000Z

269

International reserves management and capital mobility in a volatile world: Policy considerations and a case study of Korea  

E-Print Network (OSTI)

process, the Bank of Korea incurs the high quasi-fiscal costSupervisory Service of Korea, http://www.fss.or.kr. SEDdata are from Bank of Korea, http://www.bok.or.kr, unless

Aizenman, Joshua; Lee, Yeonho; Rhee, Yeongseop

2004-01-01T23:59:59.000Z

270

Cyberspace security: How to develop a security strategy  

E-Print Network (OSTI)

Despite all visible dividers, the Internet is getting us closer and closer, but with a great price. Our security is the price. The internatl. community is fully aware of the urgent need to secure the cyberspace as you see the multiplication of security standards and national schemes interpreting them beyond borders: ISO 15408, ISO 17799, and ISO 27001. Even though some countries, incl. the Security Big Six (SB6), are equipped with their security books and may feel relatively safe; this remains a wrong sense of security as long as they share their networks with entities of less security. The standards impose security best practices and system specifications for the development of information security management systems. Partners beyond borders have to be secure as this is only possible if all entities connected to the partnership remain secure. Unfortunately, there is no way to verify the continuous security of partners without periodic security auditing and certification, and members who do not comply should ...

Raggad, Bel G

2007-01-01T23:59:59.000Z

271

National Security Science Archive  

NLE Websites -- All DOE Office Websites (Extended Search)

National Security Science » National Security Science » NSS Archive National Security Science magazine Latest Issue:April 2013 All Issues » submit National Security Science Archive Using its broad and unique scientific and engineering capabilities, the Laboratory solves a diverse set of challenges to national and global security and the weapons programs. National Security Science magazine showcases the breadth and depth of the Laboratory's scientific and technical work to policy makers, the general public, academia, and scientific and technical experts. past issues cover Issue 2 2012 interactive | web | pdf past issues cover Issue 1 2012 interactive | web | pdf past issues cover Issue 3 2011 web | pdf past issues cover Issue 2 2011 web | pdf past issues cover Issue 1 2011 web | pdf past issues cover

272

Security and Privacy Notice  

NLE Websites -- All DOE Office Websites (Extended Search)

Security and Privacy Notice Security and Privacy Notice Thank you for visiting the Office of Health, Safety and Security (HSS) web site and reviewing our position on security and privacy. SECURITY NOTICE This web site is part of a Federal computer system and is the property of the United States Government. It is for authorized use only. The Department of Energy monitors this web site for security purposes to ensure it remains available and to protect information in the system. The Department of Energy uses software programs and additional equipment to monitor network traffic to identify unauthorized attempts to access, obtain, alter, damage or destroy information, or otherwise to interfere with the system or its operation. Any and all uses of this system and all files on this system

273

PNNL: Security & Privacy  

NLE Websites -- All DOE Office Websites (Extended Search)

Security & Privacy Security & Privacy Thank you for visiting the Pacific Northwest National Laboratory (PNNL) website (pnnl.gov) and reviewing our security and privacy policies. The following policies apply to all pages and sites in the pnnl.gov domain, unless otherwise noted. Security Notice This website is part of a Federal computer system used to accomplish Federal functions. The Department of Energy monitors this website for security purposes to ensure it remains available to all users and to protect information in the system. By accessing this website, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features, to use the system for other than intended purposes, to deny service to authorized users, to access, obtain, alter, damage, or destroy information, or

274

Security Topic Group  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Group Group Security and TEC * Tension exists between open forum concept of TEC and the ability of STG members to discuss security topics. - DOE will maintain the open forum - it will not form a subgroup of cleared members NAS Study * Some members want STG to formally recommend a fully independent review of security issues - DOE is reviewing the NAS study and has not formulated a position Security Topic Group (Continued) Classification Guide & Information Sharing Protocol * Guide is finished and undergoing internal concurrence - Slated for late September release * Protocol will be completed once the guide is issued Security-Related Lessons Learned * Lessons learned document was distributed and comments requested by the end of March Security Topic Group (Continued) SRG/CVSA Survey

275

Office of Security Operations  

NLE Websites -- All DOE Office Websites (Extended Search)

Office of Physical Protection Office of Physical Protection Bill Dwyer Director, 202-586-7887 Mission The mission of the Office of Physical Protection is to implement and oversee dedicated human resources, processes, and equipment designed to protect personnel and assets entrusted to our care at Department of Energy (DOE) Headquarters facilities. The Office is comprised of dedicated DOE Federal security professionals, Headquarters Protective Force personnel, and Alarms and Access Control Technicians. These security subject matter experts work together to ensure compliance with DOE Safeguards and Security regulations, Interagency Security Committee guidance, and federal laws. The result of this collaboration is a security program designed to ensure a safe and secure working environment for all Headquarters employees.

276

Security (Un-)Usability 17 Security Usability Fundamentals  

E-Print Network (OSTI)

Security (Un-)Usability 17 Security Usability Fundamentals An important consideration when you're building an application is the usability of the security features that you'll be employing. Security experts frequently lament that security has been bolted onto applications as an afterthought, however

Cortes, Corinna

277

Enterprise Cyber Security Posture  

Science Conference Proceedings (OSTI)

... to enable organizations to transform uncertainties into ... org/issues- research/telecom/security-breach-notification ... systems C. Cyber-physical systems ...

2013-04-10T23:59:59.000Z

278

Hazardous Material Security (Maryland)  

Energy.gov (U.S. Department of Energy (DOE))

All facilities processing, storing, managing, or transporting hazardous materials must be evaluated every five years for security issues. A report must be submitted to the Department of the...

279

Nevada National Security Site  

NLE Websites -- All DOE Office Websites (Extended Search)

of nuclear weapons and storing special nuclear materials. Other activities include environmental management, national security response, and defense and civil technologies....

280

Security - Identification Badges  

Science Conference Proceedings (OSTI)

Security - Identification Badges. All doors to the Child Care Center are locked at all times and access is via the card reader system only. ...

2013-08-15T23:59:59.000Z

Note: This page contains sample records for the topic "deutsche securities korea" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

Seamless and Secure Mobility  

Science Conference Proceedings (OSTI)

... layer techniques and the use of advanced measurement in order to accurately assess and manage the performance and security characteristics of ...

2013-11-27T23:59:59.000Z

282

security blunders (INMM 2010)  

NLE Websites -- All DOE Office Websites (Extended Search)

OF SECURITY BLUNDERS Roger G. Johnston and Jon S. Warner Vulnerability Assessment Team Nuclear Engineering Division Argonne National Laboratory 9700 S. Cass Ave, Building 206,...

283

DOC Information System Security Conference on Innovating ...  

Science Conference Proceedings (OSTI)

... B. Walsh, Acting Director, Cyber Security Program, Department of Homeland Security. ... R. Clark, Senior Advisor National and Cyber Security, DOC. ...

2013-06-28T23:59:59.000Z

284

National Nuclear Security Administration Overview | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Nuclear Security Administration Overview National Nuclear Security Administration Overview National Nuclear Security Administration Overview More Documents & Publications National...

285

SECURITY TERMINATION STATEMENT | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

SECURITY TERMINATION STATEMENT SECURITY TERMINATION STATEMENT Form provides an individual's statement in connection with the termination of access authorization (security...

286

Annual Security Report October 2012  

E-Print Network (OSTI)

1 Annual Security Report October 2012 Mission Statement The Campus Security and Parking Services Department ("Security") exists to provide a secure and welcoming research, educational, and work environment in which security concerns are balanced with freedom of movement in an open campus atmosphere while

Goddard III, William A.

287

Dumb Ideas in Computer Security  

E-Print Network (OSTI)

Dumb Ideas in Computer Security Dr Charles P Pfleeger Pfleeger Consulting Group 19 July 2011 chuck Security" (2005) http://www.ranum.com/security/computer_security/editorials/dumb/ Default permit Ideas in Computer Security 219 Jul 2011 #12;Struck a Nerve Results 1-10 of about 2,030,000 for dumb

288

Borderland Intimacies: GIs, Koreans, and American Military Landscapes in Cold War Korea  

E-Print Network (OSTI)

Press, Goedde, Petra. GIs and Germans: Culture, Gender, andFor many young American GIs, Korea was the first strangeof Prostitutes in American GIs Town in Korea]. Masters

Hwang, Whitney Taejin

2010-01-01T23:59:59.000Z

289

Monitoring Volume Transport through Measurement of Cable Voltage across the Korea Strait  

Science Conference Proceedings (OSTI)

Voltage induced by the Tsushima Current on an abandoned submarine telephone cable between Pusan, Korea, and Hamada, Japan, has been measured since March 1998 in order to monitor the volume transport through the Korea Strait. Voltage has a good ...

Kuh Kim; Sang Jin Lyu; Young-Gyu Kim; Byung Ho Choi; Keisuke Taira; Henry T. Perkins; William J. Teague; Jeffrey W. Book

2004-04-01T23:59:59.000Z

290

Electricity privatization : should South Korea privatize its state-owned electric utility?  

E-Print Network (OSTI)

The state-owned electric utility, Korea Electricity Power Cooperation (KEPCO), privatization has been a key word in South Korea since 1997, when the government received $55 billion from the International Monetary Fund in ...

Lim, Sungmin

2011-01-01T23:59:59.000Z

291

Security and Cyber Evaluations - Guidance Documents  

NLE Websites -- All DOE Office Websites (Extended Search)

Guidance Documents Security and Cyber Evaluations Security Evaluations Appraisal Process Guide, April 2008 Cyber Security Evaluations Appraisal Process Guide, April 2008 Security...

292

Integrated Security System | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Integrated Security System Integrated Security System A security platform providing multi-layer intrusion detection and security management for a networked energy control systems...

293

Nevada National Security Site | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Nevada National Security Site Nevada National Security Site Nevada National Security Site | October 2011 Control Point Nevada National Security Site | October 2011 Control Point...

294

Headquarters Facilities Master Security Plan | Department of...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security Headquarters Facilities Master Security Plan Headquarters Facilities Master Security Plan Welcome to the 2013 version of the Headquarters Facilities Master Security...

295

Physical Security Reports | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Oversight Security & Cyber Evaluations Security and Cyber Guidance Physical Security Reports Physical Security Reports 2012 (U) Pantex Plant Protective Force Response...

296

Nuclear Safeguards and Security | National Nuclear Security Administra...  

National Nuclear Security Administration (NNSA)

17, 2013 NNSA, Republic of Korea Ministry Agree to Minimize Use of HEU in Nuclear Reactors Sep 3, 2013 NNSA Conducts Two Emergency Response Training Courses in Armenia Aug 29, 2013...

297

Tag: Global Security | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Global Security Global Security Tag: Global Security Displaying 1 - 10 of 61... Category: Global Security Ultrasonic cleaner cuts costs, enhances safety The process of upgrading an old cleaning unit revealed how things were once done and the advances that have followed. More... Category: Global Security Well Logging Security Initiatives GTRI demonstrates the threat to the security of (oil) well logging systems and outlines the initiatives that are enhancing the security of these sources worldwide. More... Category: Global Security Y-12 Receives Two R&D 100 Awards Engineers at the National Nuclear Security Administration's Y-12 National Security Complex have won two R&D 100 Awards. More... Category: Global Security Y-12 researchers garner R&D 100 awards A research chemist and his revolutionary cloth invented to clean surfaces

298

Economic Considerations of Nuclear Desalination in Korea  

SciTech Connect

The objective of this study is to assess the economics of SMART (System-integrated Modular Advanced Reactor) desalination plant in Korea through DEEP (Devaluation Economic Evaluation Program). SMART is mainly designed for the dual purpose of producing water and electricity with the total capacity of 100 MWe which 10 MWe is used for water production and the remains for the electric generation. SMART desalination plant using MED (Multi-Effect Distillation) process is in the stage of the commercial development and its cost information is also being accumulated. In this circumstances, the economic assessment of nuclear desalination by SMART and the effect of water(or electric) supply price to the regional economy is meaningful to the policy maker. This study is focused on the case study analysis about the economics of SMART desalination plant and the meanings of the case study result. This study is composed of two parts. One is prepared to survey the methodology regarding cost allocation between electricity and water in DEEP and the other is for the economic assessment of SMART. The cost allocation methods that have been proposed or used can be classified into two main groups, one is the cost prorating method and the other is the credit method. The cost of an product item in the dual-purpose plant can be determined differently depending on the costing methods adopted. When it comes to applying credit method adopted in this thesis, the production cost of water depends on what kind of the power cost will be chosen in calculating the power credit. This study also analyses the changes of nuclear desalination economics according to the changes of the important factors such as fossil fuel price. I wish that this study can afford to give an insight to the policy maker about SMART desalination plant. (authors)

Man-Ki, Lee; Seung-Su, Kim [Korea Atomic Energy Research Institute, 150, Deok-jin dong, Yu-seong gu, Dae-jeon city (Korea, Republic of)

2006-07-01T23:59:59.000Z

299

Secure video communications system  

DOE Patents (OSTI)

A secure video communications system having at least one command network formed by a combination of subsystems. The combination of subsystems to include a video subsystem, an audio subsystem, a communications subsystem, and a control subsystem. The video communications system to be window driven and mouse operated, and having the ability to allow for secure point-to-point real-time teleconferencing.

Smith, Robert L. (Idaho Falls, ID)

1991-01-01T23:59:59.000Z

300

Seoul, South Korea: Energy Resources | Open Energy Information  

Open Energy Info (EERE)

Seoul, South Korea: Energy Resources Seoul, South Korea: Energy Resources Jump to: navigation, search Name Seoul, South Korea Equivalent URI DBpedia GeoNames ID 1835848 Coordinates 37.5985°, 126.9783° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":37.5985,"lon":126.9783,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

Note: This page contains sample records for the topic "deutsche securities korea" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

The Office of Nuclear Safeguards and Security | National Nuclear Security  

National Nuclear Security Administration (NNSA)

Safeguards and Security | National Nuclear Security Safeguards and Security | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The Office of Nuclear Safeguards and Security Home > About Us > Our Programs > Nonproliferation > Nonproliferation & International Security > The Office of Nuclear Safeguards and Security The Office of Nuclear Safeguards and Security

302

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... and Space Administration, the National Security Agency, the Department of Energy, the US Office of Management and Budget, the Social Security ...

303

Well Logging Security Initiatives | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Well Logging Security ... Well Logging Security Initiatives The mp4 video format is not supported by this browser. Download video Captions: On Watch as GTRI demonstrates the threat...

304

Berkeley Lab Cyber Security - Cyber Security Website - Berkeley...  

NLE Websites -- All DOE Office Websites (Extended Search)

Department of Energy logo Phone Book Jobs Search Contact Us About CPIC Intranet Cyber Home Resources Training Requirements Search Cyber Security Cyber Security Website FAQs...

305

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... NIST Computer Security Division is Proud to Announce the Release of DRAFT NISTIR 7298, Revision 2: NIST Glossary of Key Information Security ...

306

Security and Training | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Training Security and Training Instability in parts of the world and increased terrorist activities worldwide intensify security concerns in protecting personnel, materials and...

307

From National Security to Environmental Security: A Historical Overview .  

E-Print Network (OSTI)

??The study attempts to provide a historical approach to the role of the environment in security studies. Contemporary security challenges have shown that the narrow (more)

Vella, Andre`

2012-01-01T23:59:59.000Z

308

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... To receive email notification(s) when new security publications are released, subscribe to the CSRC Publications Mailing List. ... NIST Security Events. ...

309

High-precision location and yield of North Korea's 2013 nuclear test Miao Zhang1  

E-Print Network (OSTI)

High-precision location and yield of North Korea's 2013 nuclear test Miao Zhang1 and Lianxing Wen2 Korea's 2009 nuclear test as reference and satellite imagery, we show that the location and yield of North Korea's 2013 nuclear test can be quickly and accurately determined based on seismic data. North

Wen, Lianxing

310

Country hedging for real income stabilization: a case study of South Korea and Egypt  

E-Print Network (OSTI)

A CASE S1UDY OF SOUIH KOREA AND EGYPT by Kathryn M. llirdonA CASE STUDY OF SOUTII KOREA AND EGYPT* By Kathryn M. GordonA CASE STIJDY OF SOlJIH KOREA AND EGYPT The major upheavals

Gordon, Kathryn M.; Rausser, Gordon C.

1984-01-01T23:59:59.000Z

311

Security Assistance | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security Assistance Security Assistance Security Assistance Welcome to Security Assistance Samuel N. Callahan, Director Mission and Functions The Office of Health, Safety, and Security (HSS) created the Office of Security Assistance Program to provide timely technical assistance and system support to field and Headquarters elements to enhance site security programs, upon request. The program is comprised of technologists and subject matter experts from all security disciplines including Program Management, Protection Program Operations, Information Security, Materials Control and Accountability, and Personnel Security. HSS is committed to building a security assistance program to serve the interests of the Department based upon the needs of our customers - with emphasis on customer-focus and meeting multi-disciplinary security needs. In Fiscal

312

Evaluating mobile agent platform security  

Science Conference Proceedings (OSTI)

Agent mobility requires additional security standards. While the theoretical aspects of mobile agent security have been widely studied, there are few studies about the security standards of current agent platforms. In this paper, test cases are proposed ...

Axel Brkle; Alice Hertel; Wilmuth Mller; Martin Wieser

2006-09-01T23:59:59.000Z

313

UC SECURITY FRAMEWORK 2011 -2012  

E-Print Network (OSTI)

1 UC SECURITY FRAMEWORK 2011 - 2012 #12;2 Contents Background..................................................................................................................................4 About UC Security & Campus Community Support .................................................................5 Security Service Authority and Relationship with NZ Police and Emergency Services ...........5

Hickman, Mark

314

The security of machine learning  

E-Print Network (OSTI)

of the IEEE symposium on security and privacy (pp. 188201).and communications security (CCS) (pp. 5968). Globerson,detection. In USENIX security symposium. Klimt, B. , & Yang,

Barreno, Marco; Nelson, Blaine; Joseph, Anthony D.; Tygar, J. D.

2010-01-01T23:59:59.000Z

315

January 2005 INTEGRATING IT SECURITY  

E-Print Network (OSTI)

January 2005 INTEGRATING IT SECURITY INTO THE CAPITAL PLANNING AND INVESTMENT CONTROL PROCESS By Joan S. Hash, Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology Introduction To assist federal agencies with effec tively integrating security

316

Securing Control Systems Modems  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Recommended Practice for Securing Recommended Practice for Securing Control System Modems January 2008 iii ABSTRACT This paper addresses an often overlooked "backdoor" into critical infrastructure control systems created by modem connections. A modem's connection to the public telephone system is similar to a corporate network connection to the Internet. By tracing typical attack paths into the system, this paper provides the reader with an analysis of the problem and then guides the reader through methods to evaluate existing modem security. Following the analysis, a series of methods for securing modems is provided. These methods are correlated to well-known networking security methods. iv ACKNOWLEDGEMENT This document was developed for the U.S. Department of Homeland

317

International Nuclear Security  

SciTech Connect

This presentation discusses: (1) Definitions of international nuclear security; (2) What degree of security do we have now; (3) Limitations of a nuclear security strategy focused on national lock-downs of fissile materials and weapons; (4) What do current trends say about the future; and (5) How can nuclear security be strengthened? Nuclear security can be strengthened by: (1) More accurate baseline inventories; (2) Better physical protection, control and accounting; (3) Effective personnel reliability programs; (4) Minimize weapons-usable materials and consolidate to fewer locations; (5) Consider local threat environment when siting facilities; (6) Implement pledges made in the NSS process; and (7) More robust interdiction, emergency response and special operations capabilities. International cooperation is desirable, but not always possible.

Doyle, James E. [Los Alamos National Laboratory

2012-08-14T23:59:59.000Z

318

PRIVACY/SECURITY NOTICE  

NLE Websites -- All DOE Office Websites (Extended Search)

PRIVACY/SECURITY NOTICE PRIVACY/SECURITY NOTICE By continuing to use this system you indicate your awareness of and consent to the following terms and conditions of use. LOG OFF IMMEDIATELY if you do not agree to the conditions stated in this warning. SECURITY NOTICE This Web site is part of a Federal computer system used to accomplish Federal functions. The Department of Energy monitors this Web site for security purposes to ensure it remains available to all users and to protect information in the system. The system employs software programs to monitor network traffic to identify unauthorized activities. By accessing this Web site, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features; to use the system for other than intended purposes; to deny service to authorized

319

Secure Contexts (Extended Abstract)  

E-Print Network (OSTI)

Information flow security in a multilevel system aims at guaranteeing that no high level information is revealed to low levels. A usual requirement to ensure information flow security for a process is that no generic attacker can induce a high-to-low information flow. This requirement is too demanding when we have some knowledge about the contexts where the process is going to run. To deal with these situations we introduce the notion of secure contexts for a process. The notion is parametric with respect to both the observational equivalence and the operation used to characterize the low level behavior. In the paper we mainly analyze the cases of bisimulation and trace equivalence. We describe how to build secure contexts in these cases and we show that two well-known security properties, BNDC and NDC, are just special instances of our general notion.

Annalisa Bossi; Damiano Macedonio; Carla Piazza; Sabina Rossi

2003-01-01T23:59:59.000Z

320

Indirection and computer security.  

SciTech Connect

The discipline of computer science is built on indirection. David Wheeler famously said, 'All problems in computer science can be solved by another layer of indirection. But that usually will create another problem'. We propose that every computer security vulnerability is yet another problem created by the indirections in system designs and that focusing on the indirections involved is a better way to design, evaluate, and compare security solutions. We are not proposing that indirection be avoided when solving problems, but that understanding the relationships between indirections and vulnerabilities is key to securing computer systems. Using this perspective, we analyze common vulnerabilities that plague our computer systems, consider the effectiveness of currently available security solutions, and propose several new security solutions.

Berg, Michael J.

2011-09-01T23:59:59.000Z

Note: This page contains sample records for the topic "deutsche securities korea" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

SCADA system security, complexity, and security proof  

Science Conference Proceedings (OSTI)

Modern Critical infrastructures have command and control systems. These command and control systems are commonly called supervisory control and data acquisition (SCADA). In the past, SCADA system has a closed operational environment, so these systems ... Keywords: 11770-2 mechanism 9, Formal security poof, SCADA, key management

Reda Shbib; Shikun Zhou; Khalil Alkadhimi

2012-11-01T23:59:59.000Z

322

Remote PC Security: Securing the home worker  

Science Conference Proceedings (OSTI)

A recent study of 1000 teleworkers in 10 countries, commissioned by Cisco, showed that one in five allows friends, family and others to use their work PC to access the Internet. Now is the time to pull stray remote workers back into the security fold. ...

Steven Furnell

2006-11-01T23:59:59.000Z

323

Office of Security Operations: Headquarters Security Officers (HSO) Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Headquarters Security Officers (HSO) Program Headquarters Security Officers (HSO) Program Responsible Individual/Contact: Wayne Berkebile - (301) 903-1163 - D-320 Scope: The Headquarters Security Officer (HSO) Program was established in 1990 by the Under Secretary of Energy in order to improve communications between the Office of Headquarters Security Operations and component organizations within DOE Headquarters. It is governed by DOE Headquarters Order 472.1, Headquarters Security Officer Program, dated 3-19-2010. Each Headquarters element is required to appoint at least one HSO and an Alternate HSO. HSOs perform a wide variety of security-related functions within their element such as obtaining security badges and clearances, maintaining Security Areas, acquiring security equipment, implementing procedures for protecting classified and sensitive information, conducting security inquiries, and arranging for required security services.

324

Security Suites | ornl.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Suites Available by Internet Service Providers Comcast Comcast offers the Norton Security Suite with antivirus and firewall software for your protection, for no additional...

325

Security and Suitability Process Reform  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security and Suitability Process Reform December 2008 Provided by the Joint Security and Suitability Reform Team EXECUTIVE OFFICE OF THE PRESIDENT OFFICE OF MANAGEMENT AND BUDGET...

326

Smart-Grid Security Issues  

Science Conference Proceedings (OSTI)

TITLE: Smart-Grid Security Issues (Editorial Material, English) IEEE SECURITY & PRIVACY 8 (1). JAN-FEB 2010. p.81-85 IEEE COMPUTER SOC, LOS ALAMITOS

Khurana, Himanshu; Hadley, Mark D.; Lu, Ning; Frincke, Deborah A.

2010-01-29T23:59:59.000Z

327

Secure quantum private information retrieval using phase-encoded queries  

Science Conference Proceedings (OSTI)

We propose a quantum solution to the classical private information retrieval (PIR) problem, which allows one to query a database in a private manner. The protocol offers privacy thresholds and allows the user to obtain information from a database in a way that offers the potential adversary, in this model the database owner, no possibility of deterministically establishing the query contents. This protocol may also be viewed as a solution to the symmetrically private information retrieval problem in that it can offer database security (inability for a querying user to steal its contents). Compared to classical solutions, the protocol offers substantial improvement in terms of communication complexity. In comparison with the recent quantum private queries [Phys. Rev. Lett. 100, 230502 (2008)] protocol, it is more efficient in terms of communication complexity and the number of rounds, while offering a clear privacy parameter. We discuss the security of the protocol and analyze its strengths and conclude that using this technique makes it challenging to obtain the unconditional (in the information-theoretic sense) privacy degree; nevertheless, in addition to being simple, the protocol still offers a privacy level. The oracle used in the protocol is inspired both by the classical computational PIR solutions as well as the Deutsch-Jozsa oracle.

Olejnik, Lukasz [CERN, 1211 Geneva 23, Switzerland and Poznan Supercomputing and Networking Center, Noskowskiego 12/14, PL-61-704 Poznan (Poland)

2011-08-15T23:59:59.000Z

328

Privacy/Security Policy  

NLE Websites -- All DOE Office Websites (Extended Search)

Privacy/Security Privacy/Security Privacy/Security Policy This web site is part of a federal computer system used to accomplish federal functions. Read the following important privacy and security information carefully. Security Notice October 31, 2000 This web site is part of a federal computer system used to accomplish federal functions. The Department of Energy monitors this web site for security purposes to ensure that it remains available to all users and to protect information in the system. By accessing this web site, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features, to use the system for other than intended purposes, to deny service to authorized users, to access, obtain, alter, damage, or destroy information, or otherwise to interfere with the system or its operation are prohibited. Evidence of such acts may be disclosed to law enforcement authorities and result in criminal prosecution under the Computer Fraud and Abuse Act of 1986 (Pub. L. 99-474) and the National Information Infrastructure Protection Act of 1996 (Pub. L. 104-294), (18 U.S.C. 1030), or other applicable criminal laws.

329

Home Network Security  

E-Print Network (OSTI)

Home computers that are connected to the Internet are under attack and need to be secured. That process is relatively well understood, even though we do not have perfect solutions today and probably never will. Meanwhile, however, the home computing environment is evolving into a home network of multiple devices, which will also need to be secured. We have little experience with these new home networks and much research needs to be done in this area. This paper gives a view of the requirements and some of the techniques available for securing home networks.

Technology Journal Interoperable; Carl M. Ellison; Corporate Technology Group; Intel Corporation

2002-01-01T23:59:59.000Z

330

Federal Computer Security Program Managers' Forum (Forum ...  

Science Conference Proceedings (OSTI)

Federal Computer Security Program Managers' Forum. Summary: The Federal Computer Security Program Managers' Forum ...

2013-01-15T23:59:59.000Z

331

Global Nuclear Security Technology Division (GNSTD)  

NLE Websites -- All DOE Office Websites (Extended Search)

Systems Nonproliferation Technology Nuclear Material Detection & Characterization Nuclear Security Advanced Technologies Safeguards & Security Technology Threat Reduction...

332

Federal Information Systems Security Educators' Association ...  

Science Conference Proceedings (OSTI)

Federal Information Systems Security Educators' Association (FISSEA). Summary: The Federal Information Systems Security ...

2013-01-15T23:59:59.000Z

333

Border Gateway Protocol - Robustness and Security  

Science Conference Proceedings (OSTI)

Border Gateway Protocol - Robustness and Security. Summary: This project focuses on Robustness, Security, and Scalability ...

2012-05-03T23:59:59.000Z

334

NIST Highlight about workshop on homeland security ...  

Science Conference Proceedings (OSTI)

Workshop on Homeland Security Standards. On ... Related Links: ANSI Homeland Security Standards Panel. Contact. General ...

2011-12-14T23:59:59.000Z

335

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... Risks posters; National Security Agency Counterintelligence Awareness (301-688-6535); Native Intelligence, Inc. Rainbow ...

336

SOCIAL SECURITY ADMINISTRATION Application for a Social Security Card  

E-Print Network (OSTI)

SOCIAL SECURITY ADMINISTRATION Application for a Social Security Card Applying for a Social Security Card is easy AND it is FREE! If you DO NOT follow these instructions, we CANNOT process your and evidence to any Social Security office. Follow instructions below. HOW TO COMPLETE THE APPLICATION Most

Li, Mo

337

Safety and Security What do Safety/Security work with?  

E-Print Network (OSTI)

Safety and Security on campus #12;Agenda · What do Safety/Security work with? · If something happens · Opening hours · Remember · Website · How to find us #12;The Section for Safety and Security work with; · Security revolving work environment · Handle locks, keys, alarms, surveillance · Responsible

338

28 00 00 ELECTRONIC SAFETY AND SECURITY ELECTRONIC SECURITY  

E-Print Network (OSTI)

28 00 00 ELECTRONIC SAFETY AND SECURITY ELECTRONIC SECURITY SYSTEM DESIGN, CONSTRUCTION Services #12;28 00 00 ELECTRONIC SAFETY AND SECURITY August 8, 2011 2 THE UNIVERSITY OF TEXAS AT AUSTIN ELECTRONIC SECURITY SYSTEM DESIGN, CONSTRUCTION AND COMMISSIONING GUIDE PART 1 - GENERAL 1.1 NOTICE

Texas at Austin, University of

339

28 00 00 ELECTRONIC SAFETY AND SECURITY ELECTRONIC SECURITY  

E-Print Network (OSTI)

28 00 00 ELECTRONIC SAFETY AND SECURITY ELECTRONIC SECURITY SYSTEM DESIGN, CONSTRUCTION Services #12;28 00 00 ELECTRONIC SAFETY AND SECURITY May 1, 2013 2 THE UNIVERSITY OF TEXAS AT AUSTIN ELECTRONIC SECURITY SYSTEM DESIGN, CONSTRUCTION AND COMMISSIONING GUIDE PART 1 - GENERAL 1.1 NOTICE

Texas at Austin, University of

340

National Security Information Systems (NSIS) -National Security Systems &  

NLE Websites -- All DOE Office Websites (Extended Search)

NSSA: National Security Information Systems NSSA: National Security Information Systems Nonproliferation & National Security (NPNS) Overview Technical Nonproliferation Policy Support Strategic Trade Control Review of export license applications Multilateral Export Control Arrangements Interdiction Engagement & Training INECP INSEP GIPP Safeguards Concepts and Approaches Human Capital Development Additional Protocol Technical Assistance National Security Systems & Assessments National Security Information Systems Vulnerability Assessment Team (VAT) Radiation Detection & Response (RDR) Contact NPNS Other Major Programs Work with Argonne Contact us For Employees Site Map Help Join us on Facebook Follow us on Twitter NE Division on Flickr Nonproliferation and National Security Program National Security Systems & Assessments

Note: This page contains sample records for the topic "deutsche securities korea" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

South Korea-Economics of Climate Change and Low Carbon Growth Strategies in  

Open Energy Info (EERE)

South Korea-Economics of Climate Change and Low Carbon Growth Strategies in South Korea-Economics of Climate Change and Low Carbon Growth Strategies in Northeast Asia Jump to: navigation, search Name South Korea-Economics of Climate Change and Low Carbon Growth Strategies in Northeast Asia Agency/Company /Organization Asian Development Bank Partner Government of Republic of Korea Topics Background analysis, Low emission development planning Program Start 2009 Country South Korea Eastern Asia References Economics of Climate Change and Low Carbon Growth Strategies in Northeast Asia[1] Overview The Asian Development Bank (ADB) is planning a study entitled the Economics of Climate Change and Low Carbon Growth Strategies in Northeast Asia, covering the People's Republic of China (PRC), Japan, the Republic of Korea, and Mongolia. The Government of the Republic of Korea will cofinance

342

Green Growth in Motion: Sharing Korea's Experience | Open Energy  

Open Energy Info (EERE)

Green Growth in Motion: Sharing Korea's Experience Green Growth in Motion: Sharing Korea's Experience Jump to: navigation, search Tool Summary Name: Green Growth in Motion: Sharing Korea's Experience Agency/Company /Organization: Global Green Growth Institute (GGGI) Sector: Climate Focus Area: Renewable Energy, Economic Development, People and Policy Topics: Finance, Implementation, Low emission development planning, -LEDS, Market analysis, Pathways analysis, Policies/deployment programs, Resource assessment Resource Type: Case studies/examples Website: www.gggi.org/sites/www.gggi.org/files/research/GreenGrowthInMotion.pdf Country: South Korea Cost: Free Eastern Asia Coordinates: 35.907757°, 127.766922° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":35.907757,"lon":127.766922,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

343

Branching Mechanism of the Tsushima Current in the Korea Strait  

Science Conference Proceedings (OSTI)

Hydrographic studies show the seasonal variation of the East Korean Warm Current (EKWC), which is a branch of the Tsushima Current along the Korean coast. To understand the dynamics of the branching mechanism of the TC in the Korea Strait, a ...

Yang-Ki Cho; Kuh Kim

2000-11-01T23:59:59.000Z

344

Information Security: Coordination of Federal Cyber Security Research and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security: Coordination of Federal Cyber Security Security: Coordination of Federal Cyber Security Research and Development Information Security: Coordination of Federal Cyber Security Research and Development GAO recommends that the Office of Science and Technology Policy establish timelines for developing a federal agenda for cyber security research. GAO also recommends that the Office of Management and Budget (OMB) issue guidance to agencies for providing cyber security research data to repositories. In commenting on a draft of this report, OMB stated that it would review the need for such guidance. Information Security: Coordination of Federal Cyber Security Research and Development More Documents & Publications Networking and Information Technology Research and Development Supplement to the President's Budget (February 2010)

345

Erera, Spring School 2004 Transportation Security  

E-Print Network (OSTI)

! Transportation security research: future #12;Erera, Spring School 2004 Outline ! Understanding transportationErera, Spring School 2004 Transportation Security Alan Erera and Chelsea C. White III Industrial transportation security ! Security regulations and programs ! Transportation security research: present

Erera, Alan

346

Security/Disclaimer  

Office of Scientific and Technical Information (OSTI)

U.S. Department of Energy DOE Green Energy Home & Search About Contact Us Javascript Not Enabled OSTI Security Website Policies and Important Links Some links on this page may take...

347

National Nuclear Security Administration  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

AI~W~~l AI~W~~l 11Vl'~~4 National Nuclear Security Administration Department of Energy National Nuclear Security Administration Nevada Site Office P.O. Box 98518 Las Vegas, NV 89193-8518 JAN! 8 2013 Gregory H. Woods, General Counsel, DOE/HQ (GC-1) FORS NATIONAL NUCLEAR SECURITY ADMINISTRATION NEVADA SITE OFFICE (NNSA/NSO) NATIONAL ENVIRONMENTAL POLICY ACT (NEPA) ANNUAL SUMMARY In accordance with DOE Order 451.1B, National Environmental Policy Act Compliance Program, NNSA/NSO is submitting the enclosed Annual NEP A Planning Summary. The document provides a brief description of ongoing and planned NEP A actions for calendar year 2013. This summary provides information for completion of the Site- Wide Environmental Impact Statement for the Nevada National Security Site and Off-Site Locations in the State of Nevada.

348

National Security, Weapons Science  

NLE Websites -- All DOE Office Websites (Extended Search)

National Security, Weapons Science National Security, Weapons Science /science-innovation/_assets/images/icon-science.jpg National Security, Weapons Science National security depends on science and technology. The United States relies on Los Alamos National Laboratory for the best of both. No place on Earth pursues a broader array of world-class scientific endeavors. Dual-Axis Radiographic Hydrodynamic Test Facility (DARHT) The Dual-Axis Radiographic Hydrodynamic Test Facility at LANL is part of the DOE's stockpile stewardship program. It uses two large X-ray machines to record three-dimensional interior images of materials. In most experiments, materials (including plutonium) undergo hydrodynamic shock to simulate the implosion process in nuclear bombs and/or the effects of severe hydrodynamic stress. The tests are described as "full-scale mockups

349

Internet Security Glossary  

Science Conference Proceedings (OSTI)

This Glossary (191 pages of definitions and 13 pages of references) provides abbreviations, explanations, and recommendations for use of information system security terminology. The intent is to improve the comprehensibility of writing that deals with ...

R. Shirey

2000-05-01T23:59:59.000Z

350

Office of Security Enforcement  

NLE Websites -- All DOE Office Websites (Extended Search)

The Office of Health, Safety and Security HSS Logo Department of Energy Seal Left Tab SEARCH Right Tab TOOLS Right Tab Left Tab HOME Right Tab Left Tab ABOUT US Right Tab Left Tab...

351

Office of Security Operations  

NLE Websites -- All DOE Office Websites (Extended Search)

The Office of Health, Safety and Security HSS Logo Department of Energy Seal Left Tab SEARCH Right Tab TOOLS Right Tab Left Tab HOME Right Tab Left Tab ABOUT US Right Tab Left Tab...

352

National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Nuclear Security Administration FY 2011 - FY 2015 Budget Outlook Managing the NNSA 4.0% Science, Technology & Engineering 14.5% Stockpile Support 17.9% Preventing the Spread of...

353

Wi-Fi security  

Science Conference Proceedings (OSTI)

"ALL [wireless security] mechanisms are completely in-effective" was the conclusion of a study by the Department of Computer Science at the University of Maryland. This discussion will systematically shed light on the inherent insecurities involved with ...

Paul Williams

2006-04-01T23:59:59.000Z

354

Incidents of Security Concern  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

NOT MEASUREMENT NOT MEASUREMENT SENSITIVE DOE-STD-1210-2012 September 2012 DOE STANDARD Incidents of Security Concern U.S. Department of Energy AREA SANS Washington, D.C. 20585 DISTRIBUTION STATEMENT A. Approved for public release; distribution is unlimited. DOE-STD-1210-2012 INTENTIONALLY BLANK DOE-STD-1210-2012 TABLE OF CONTENTS PARAGRAPH PAGE FOREWORD ................................................................................................................................ IV INCIDENTS OF SECURITY CONCERN......................................................................................1 1. SCOPE ....................................................................................................................................1 2. PURPOSE...............................................................................................................................1

355

Security Resiliency Testing  

Science Conference Proceedings (OSTI)

An accepted practice within the electric sector is to pre-stage and test equipment before deployment. Verification of functionality, operating parameters, and interoperability of equipment to be deployed can often be incorporated into predeployment testing. This testing may also support the selection of features responsible for the security of the host equipment. However, some security features and many aspects of resiliency testing may require activation, interaction, and interoperability with an ...

2013-12-02T23:59:59.000Z

356

Transportation Security Update  

Science Conference Proceedings (OSTI)

The U.S. Department of Transportation (DOT) final rules issued in 2003 required persons who offer for transportation or transport certain hazardous materials to develop and implement security plans. The Electric Power Research Institute (EPRI) formed a Transportation Security Implementation Working Group, which included representation from the Nuclear Energy Institute (NEI), to identify key projects, which were documented in the original report in 2005. This report updates information in the original rep...

2011-07-27T23:59:59.000Z

357

Data port security lock  

DOE Patents (OSTI)

In a security apparatus for securing an electrical connector, a plug may be fitted for insertion into a connector receptacle compliant with a connector standard. The plug has at least one aperture adapted to engage at least one latch in the connector receptacle. An engagement member is adapted to partially extend through at least one aperture and lock to at least one structure within the connector receptacle.

Quinby, Joseph D. (Albuquerque, NM); Hall, Clarence S. (Albuquerque, NM)

2008-06-24T23:59:59.000Z

358

CMS System Security Plan Template  

Science Conference Proceedings (OSTI)

System Security Plan (SSP) Template Instructions. This template contains boiler plate language. Each template must be ...

2009-06-30T23:59:59.000Z

359

News in ITL - Computer Security  

Science Conference Proceedings (OSTI)

... Cybersecurity Center Seeks Comments on Energy Industry Security ... Commerce Department Proposes New Policy Framework to Strengthen ...

2010-10-22T23:59:59.000Z

360

CMS System Security Plan Procedure  

Science Conference Proceedings (OSTI)

... TASK 5: SYSTEM DECOMMISSION. ... BPSSM Business Partners Systems Security Manual. ... of Information Technology, Policy, Procedures, & Audits. ...

2009-06-30T23:59:59.000Z

Note: This page contains sample records for the topic "deutsche securities korea" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

Publicly Submitted White Papers - Security  

Science Conference Proceedings (OSTI)

... Security Threats, Exploits, Vulnerabilites, Incidents, and Responses; ... CAHV); Critical Incident Response and Disaster Recovery Assistance; ...

2011-08-02T23:59:59.000Z

362

Developing security protocols by refinement  

Science Conference Proceedings (OSTI)

We propose a development method for security protocols based on stepwise refinement. Our refinement strategy guides the transformation of abstract security goals into protocols that are secure when operating over an insecure channel controlled by a Dolev-Yao-style ... Keywords: entity authentication, formal development, key establishment, security protocols, stepwise refinement

Christoph Sprenger; David Basin

2010-10-01T23:59:59.000Z

363

News: IBM launches security offensive  

Science Conference Proceedings (OSTI)

IBM has announced a major security push, representing a US$1.5 billion investment in security-related projects next year. It will partner with other security vendors to offer a set of security services targeting information assets. The services will ...

2007-11-01T23:59:59.000Z

364

Security challenges in embedded systems  

Science Conference Proceedings (OSTI)

Embedded systems security is a significant requirement in emerging environments, considering the increasing deployment of embedded systems in several application domains. The large number of deployed embedded systems, their limited resources and their ... Keywords: Communication system security, computer security, embedded systems, security

Dimitrios N. Serpanos; Artemios G. Voyiatzis

2013-03-01T23:59:59.000Z

365

Towards web security using PLASMA  

Science Conference Proceedings (OSTI)

The World Wide Web is one of the most significant multi-media applications ever developed-and therefore securing the web is one of the most pressing problems. There exist a number of approaches for securing the World Wide Web which, however, usually ... Keywords: high level security, multimedia, secure communications platform, world wide web

Annette Krannig

1998-01-01T23:59:59.000Z

366

Security-oriented program transformations  

Science Conference Proceedings (OSTI)

Security experts generally believe that, "security cannot be added on, it must be designed from the beginning" [1]. This is because the typical way of improving system security by patches is ad hoc and has not produced good results. My work shows that ... Keywords: program transformation, security

Munawar Hafiz; Ralph E. Johnson

2009-04-01T23:59:59.000Z

367

Secure Windows Dr. Bernd Borchert  

E-Print Network (OSTI)

Secure Windows Dr. Bernd Borchert WSI für Informatik Univ. Tübingen #12;Problem: Trojans Server Windows" Server (encoding) Internet #12;Server (encoding) Internet Solution: ,,Secure Windows" #12;Server (encoding) Internet Solution: ,,Secure Windows" #12;Server (encoding) Internet Solution: ,,Secure Windows

Borchert, Bernd

368

Roadmapping Workshop: Measurement of Security ...  

Science Conference Proceedings (OSTI)

Roadmapping Workshop: Measurement of Security Technology Performance Impacts for Industrial Control System. Purpose: ...

2013-10-31T23:59:59.000Z

369

Security Outreach and Integration Group  

Science Conference Proceedings (OSTI)

Security Outreach and Integration Group. Welcome. The US economy, citizens, and government rely on information technology. ...

2013-01-17T23:59:59.000Z

370

UH Mnoa Contacts: Campus Security  

E-Print Network (OSTI)

UH Mnoa Contacts: Campus Security 956-6911 Security Escort Service 956-SAFE Women's Center 956 pauvaw@hawaii.edu University Health Services 956-8965 www.hawaii.edu/shs/ Mlama Pono | www.hawaii.edu/security if you think you have been drugged. Police and Campus Security are trained in assisting with these types

371

Brief No. 9 WATER SECURITY,  

E-Print Network (OSTI)

Brief No. 9 WATER SECURITY, RISK & SOCIETY 1 of 4 Water Security and Federal Rivers March 2012 Australian National University Key messages · Water security in a hydroclimatic risk society. Climate risks interact with rapidly changing social, demographic and economic forces to position water security

New, Mark

372

Framework for SCADA Security Policy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Framework for SCADA Security Policy Framework for SCADA Security Policy Dominique Kilman Jason Stamp dkilman@sandia.gov jestamp@sandia.gov Sandia National Laboratories Albuquerque, NM 87185-0785 Abstract - Modern automation systems used in infrastruc- ture (including Supervisory Control and Data Acquisition, or SCADA) have myriad security vulnerabilities. Many of these relate directly to inadequate security administration, which precludes truly effective and sustainable security. Adequate security management mandates a clear administrative struc- ture and enforcement hierarchy. The security policy is the root document, with sections covering purpose, scope, posi- tions, responsibilities, references, revision history, enforce- ment, and exceptions for various subjects relevant for system

373

Principal Associate Director - Global Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Principal Associate Director - Global Security Principal Associate Director - Global Security As Principal Associate Director for Global Security, Wallace leads Laboratory programs with special focus on developing and applying the scientific and engineering capabilities to address complex national and global security threats. Contact Operator Los Alamos National Laboratory (505 667-5061 Wallace's expertise is forensic seismology, a highly specialized discipline focusing on detection and quantification of nuclear tests. Terry C. Wallace, Jr. Principal Associate Director for Global Security Terry C. Wallace, Jr., Principal Associate Director for Global Security As Principal Associate Director for Global Security, Wallace leads Laboratory programs with a focus on applying scientific and engineering capabilities

374

Nevada National Security Site - Reports  

NLE Websites -- All DOE Office Websites (Extended Search)

Reports Reports Nevada National Security Site Review Reports 2013 Independent Oversight Targeted Review of the Safety Significant Blast Door and Special Door Interlock Systems and Review of Federal Assurance Capability at the Nevada National Security Site, December 2013 Review of the Nevada National Security Site Criticality Safety Program Corrective Action Plan Closure, May 2013 Review Reports 2012 Review of the Nevada National Security Site Implementation Verification Review Processes, March 2012 Activity Reports 2012 Nevada National Security Site Operational Awareness Visit, December 2012 Operational Awareness Oversight of the Nevada National Security Site, August 2012 Review Reports 2011 Review of Nevada Site Office and National Security Technologies, LLC, Line Oversight and Contractor Assurance Systems

375

National Security | ornl.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

Program Areas Program Areas Initiatives Facilities Events and Conferences Supporting Organizations A scientific approach to global security Initiatives | Programs Home | Science & Discovery | National Security National Security | National Security SHARE ORNL plays an important role in national and global security by virtue of its expertise in advanced materials, nuclear science, supercomputing and other scientific specialties. Discovery and innovation in these areas are essential for protecting US citizens and advancing national and global security priorities. ORNL supports these missions by using its signature strengths to meet complex national security challenges in a number of areas. Nuclear Nonproliferation - The laboratory's expertise and experience covers the spectrum of nuclear nonproliferation work, from basic R&D to

376

User-Centered Security Engineering  

E-Print Network (OSTI)

Current approaches to security engineering mainly focus on attacker models, secure mechanisms, and code testing to ensure a high level security standard. However, these approaches do not sufficiently emphasize the usability of the system and the risk arises that the implemented mechanisms create overheads for users or require unworkable user behaviour. In addition, end users will not use security products they cannot understand or which are difficult to apply. Therefore, we propose the new concept of integrated user-centered security engineering to bridge the gap between security and usability. This method has been pursued for the development and implementation of the security tool "Identity Manager".

Daniela Gerd tom Markotten

2002-01-01T23:59:59.000Z

377

Lemnos Interoperable Security Program  

Science Conference Proceedings (OSTI)

The manner in which the control systems are being designed and operated in the energy sector is undergoing some of the most significant changes in history due to the evolution of technology and the increasing number of interconnections to other system. With these changes however come two significant challenges that the energy sector must face; 1) Cyber security is more important than ever before, and 2) Cyber security is more complicated than ever before. A key requirement in helping utilities and vendors alike in meeting these challenges is interoperability. While interoperability has been present in much of the discussions relating to technology utilized within the energy sector and especially the Smart Grid, it has been absent in the context of cyber security. The Lemnos project addresses these challenges by focusing on the interoperability of devices utilized within utility control systems which support critical cyber security functions. In theory, interoperability is possible with many of the cyber security solutions available to utilities today. The reality is that the effort required to achieve cyber security interoperability is often a barrier for utilities. For example, consider IPSec, a widely-used Internet Protocol to define Virtual Private Networks, or ?? tunnels?, to communicate securely through untrusted public and private networks. The IPSec protocol suite has a significant number of configuration options and encryption parameters to choose from, which must be agreed upon and adopted by both parties establishing the tunnel. The exercise in getting software or devices from different vendors to interoperate is labor intensive and requires a significant amount of security expertise by the end user. Scale this effort to a significant number of devices operating over a large geographical area and the challenge becomes so overwhelming that it often leads utilities to pursue solutions from a single vendor. These single vendor solutions may inadvertently lock utilities into proprietary and closed systems Lemnos is built on the successes of Open PCS Security Architecture for Interoperable Design (OPSAID), a previous DOE National SCADA Test Bed (NSTB) project. It enhances security interoperability by identifying basic cyber security functions based on utility requirements and then selecting open source solutions, namely Internet Engineering Task Force (IETF) RFCs, to support these functions. Once identified, specific configuration parameters for each RFC suitable for the electric utility control system environment are identified and documented. These configuration parameters are referred to as Interoperable Configuration Profiles (ICP) and their effectiveness within the utility control systems environment is verified with comprehensive testing as the final step in the process. The project focused on development of ICPs for four security protocols (IPsec, SSH, LDAP, and Syslog) which represent fundamental building blocks which can be utilized for securing utility control systems. These ICPs are product agnostic and can be applied modularly to any device (router, substation gateway, intelligent electronic device, etc.) within the utility control system as the end user deems necessary for their unique system architecture. The Lemnos Interoperable Security Program is a public-private partnership under the U.S. Department of Energy (DOE) Office of Electricity Delivery and Energy Reliability's Cybersecurity for Energy Delivery Systems (CEDS) program and supports The Roadmap to Secure Energy Delivery Systems. In addition to EnerNex, the core team supporting the effort includes Tennessee Valley Authority, Sandia National Laboratories, and Schweitzer Engineering Laboratories. Adding to the core team effort is collaboration from additional industry participants in the project including the Electric Power Research Institute (EPRI), Alien Vault, Cisco, Encore Networks, GarrettCom, Industrial Defender, N-Dimension Solutions, Phoenix Contact, RuggedCom, and Siemens.

John Stewart; Ron Halbgewachs; Adrian Chavez; Rhett Smith; David Teumim

2012-01-31T23:59:59.000Z

378

Argonne Team Challenges Physical Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Engineering & Systems Analysis Engineering & Systems Analysis Success Stories For further information, contact Roger Johnston, rogerj@anl.gov "Real security is thinking like the bad guys," maintains Roger Johnston, head of Argonne's VAT. Argonne Team Challenges Physical Security Physical security-the art of protecting tangible assets-is the counterpart to cyber security. Physical security can take the form of locks, tamper-indicating seals, guards who stand watch

379

Republic of Korea Country report Description of dosimetry services in the Republic of Korea  

E-Print Network (OSTI)

The Korea Atomic Energy Research Institute (KAERI) has a state-of-the-art In Vivo Radioassay and Research Facility (IVRRF) facility designed expressly for in vivo measurement of radioactive material. Although the IVRRF's primary activity is providing routine in vivo counting services to KAERI radiation workers, the facility also conducts work for clients including a fuel fabrication facilities and nuclear facilities. Counting System KAERI in vivo counter combines the characteristics of the U/Pu lung counter and the advantage of a high sensitivity scanning NaI(Tl) whole body counter into one compact system. The low energy lung counter is designed for facilities that need to accurately measure lung depositions of actinides such as uranium, plutonium and americium. The scanning whole body counter is designed to detect and identify the location of higher energy nuclides anywhere in the body. The detection system of the low energy lung counter consists of two arrays of ACT (Actinide)-II detector system which combi...

Lee, T Y

1996-01-01T23:59:59.000Z

380

Environment/Health/Safety/Security (EHSS): Security and Emergency Services  

NLE Websites -- All DOE Office Websites (Extended Search)

Security and Emergency Services Security and Emergency Services SEO Home page collage Documents Organization Chart Related Sites Fire Department Security Services EMERGENCY SERVICES The purpose of Berkeley Lab's Emergency Services is to ensure emergency resources are in maximum readiness, before, during, and after any emergency. ISSM: Integrated Safeguards and Security Management Security Updates MISSION STATEMENT: Provide integrated and efficient life safety, emergency and security services to all employees, guests, and users at the main Berkeley site and off-site facilities. Also, promote continuous improvement of the Lab's scientific and supportive activities. The core competencies of the group are: Emergency response to include fire suppression, emergency medical and hazmat response services

Note: This page contains sample records for the topic "deutsche securities korea" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

A systematic review of security requirements engineering  

Science Conference Proceedings (OSTI)

One of the most important aspects in the achievement of secure software systems in the software development process is what is known as Security Requirements Engineering. However, very few reviews focus on this theme in a systematic, thorough and unbiased ... Keywords: Requirements engineering, Secure development, Security, Security engineering, Security requirements, Security requirements engineering, Systematic review

Daniel Mellado; Carlos Blanco; Luis E. Snchez; Eduardo Fernndez-Medina

2010-06-01T23:59:59.000Z

382

Human Errors in Information Security  

E-Print Network (OSTI)

The purpose of the paper is to target audience and stakeholder individuals whom are in charge of securing the assets of their organisations and institutions. This paper starts by providing a brief overview of information security, outlining the main goals and techniques of the discipline. The paper also discusses the role of human factors and how the information security research community has recognised the increasingly crucial role of human behaviour in many security failures. This is followed by a literature review of human errors in information security. Finally, this paper discusses Reason's Generic Error Modelling System (GEMS) as a potential model for explaining human errors in information security [18]. The terms computer security, network security and information security are used interchangeably in this paper.

Munir Ahmed; Lukman Sharif; Muhammad Kabir; Maha Al-maimani

2012-01-01T23:59:59.000Z

383

Security Clearances; Limitations  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

SEC. 1072. SECURITY CLEARANCES; LIMITATIONS. SEC. 1072. SECURITY CLEARANCES; LIMITATIONS. (a) In General.-Title III of the Intelligence Reform and Terrorism Prevention Act of 2004 (50 U.S.C. 435b) is amended by adding at the end the following new section: "SEC. 3002. SECURITY CLEARANCES; LIMITATIONS. "(a) Definitions.-In this section: "(1) Controlled substance.-The term `controlled substance' has the meaning given that term in section 102 of the Controlled Substances Act (21 U.S.C. 802). "(2) Covered person.-The term `covered person' means- "(A) an officer or employee of a Federal agency; "(B) a member of the Army, Navy, Air Force, or Marine Corps who is on active duty or is in an active status; and "(C) an officer or employee of a contractor of a Federal agency.

384

National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites

National Nuclear Security Administration National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog US, UK, France Discuss Stockpile Stewardship, Arms Control and Nonproliferation and Visit the Nevada National Security Site Learn More NNSA DOE removes all remaining HEU from Hungary Learn More DOE removes all remaining HEU from Hungary Tiffany A. Blanchard-Case receives 2013 Linton Brooks Medal

385

Energy Security Initiatives Update  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Make Energy A Consideration in All We DoTM Make Energy A Consideration in All We DoTM ENERGY SECURITY INITIATIVES UPDATE Ms Karen White AFFEC On behalf of Mr Mike Aimone 1 Make Energy A Consideration in All We DoTM 2 Energy Security Initiatives AFCESA ETL 09-10 -- Aurora Electrical System Vulnerability Assessment and Mitigation Actions FUPWG-EEI CA Net Zero Energy Initiative (Vandenberg AFB, CA) Energy Security Tiger Team Visit (Ft Bliss, TX) National Renewable Energy Lab (NREL) Net Zero Pilot at Marine Corps Air Station Miramar and Naval Base Ventura County (San Nicolas Island) Smart Grid Initiatives: Maxwell AFB AL, Army BAAs (3 each); Naval Base Ventura County (San Nicholas Island) National Defense University sponsored Electric Grid War Game (Jul) Task Force on Grid Vulnerability (Gaps/Seams in S&T ) initiative (Joint

386

SAFEGUARD AND SECURE CONTROL VERIFY POLICY  

National Nuclear Security Administration (NNSA)

export control system to counter state-based proliferators like Iran and North Korea. INECP works with cadres of national technical specialists in partner countries to...

387

Nuclear Safeguards and Security Challenge:  

National Nuclear Security Administration (NNSA)

Nuclear Safeguards and Security Nuclear Safeguards and Security Challenge: The international safeguards and security system is being challenged by evolving proliferation and terrorism threats, expanding International Atomic Energy Agency (IAEA) responsibilities, a retiring safeguards workforce, and the need for better technologies to detect and deter proliferation, theft, and sabotage. Response: Revitalize, strengthen, and sustain U.S. and international safeguards and security capabilities through the Next Generation Safeguards Initiative (NGSI) and International Nuclear Security programs that: * Support the development of safeguards and security policies, concepts and approaches * Develop human capital through training and education * Develop and implement new safeguards systems,

388

Cyber Security Issues and Requirements  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Program Program (SGIG) Cyber Security Issues and Requirements Jeff Dagle November 19, 2009 Communication and Information Technology will be Central to Smart Grid Deployment Final Interim Smart Grid Roadmap, prepared by the Electric Power Research Institute (EPRI) for the National Institute of Standards and Technology (NIST) Cyber Security Requirements Associated with ARRA Projects Proposals were required to include:  Discussion of how cyber security risks will be mitigated  What criteria will be used for vendor and technology selection  Relevant cyber security standards that will be followed (or industry best practices)  How emerging smart grid cyber security standards that are currently being developed will be adopted Cyber Security Objectives for Smart

389

MHK Projects/South Korea | Open Energy Information  

Open Energy Info (EERE)

Korea Korea < MHK Projects Jump to: navigation, search << Return to the MHK database homepage Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":5,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"500px","height":"350px","centre":false,"title":"","label":"","icon":"File:Aquamarine-marker.png","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":35.9078,"lon":127.767,"alt":0,"address":"","icon":"http:\/\/prod-http-80-800498448.us-east-1.elb.amazonaws.com\/w\/images\/7\/74\/Aquamarine-marker.png","group":"","inlineLabel":"","visitedicon":""}]}

390

The Office of Health, Safety and Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Summary Report - Independent Oversight Inspection of Safeguards and Security and Cyber Security at the Y-12 Site Office and the Y-12 National Security Complex (U), January...

391

Strengthening Cyber Security | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Strengthening Cyber Security Strengthening Cyber Security Describes the goals and activities of the National SCADA Test Bed program to secure control systems in the energy sector...

392

Enforcement Regulations and Directives - Security | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security Enforcement Regulations and Directives - Security Classified Information Security 10 C.F.R Part 824 - Procedural Rules for the Assessment of Civil Penalties for Classified...

393

Network Security Automation Standards: TNC and SCAP  

Science Conference Proceedings (OSTI)

... IPAM SIM / SEM Asset Management System AAA ICS/SCADA Security Physical Security Endpoint Security (via NAC) IF-MAP Protocol MAP Page 6. ...

2012-10-26T23:59:59.000Z

394

Lemnos Interoperable Security Program | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security Program More Documents & Publications SECURITY CORE FUNCTION AND DEFINITION REPORT Lemnos Interoperable Security DOE National SCADA Test Bed Program Multi-Year Plan...

395

Security Orchestration with IF-MAP  

Science Conference Proceedings (OSTI)

... IPAM SIM / SEM Asset Management System AAA ICS/SCADA Security Physical Security Endpoint Security (via NAC) IF-MAP Protocol MAP Page 7. ...

2012-10-26T23:59:59.000Z

396

Office of Headquarters Security Operations - Headquarters Facilities...  

NLE Websites -- All DOE Office Websites (Extended Search)

Headquarters Security Operations HomeIntroduction Physical Security Limited Areas and Vault-Type Rooms Personnel Security Foreign Ownership, Control or Influence; Facility...

397

DOE Headquarters Security Quick Reference Book | Navigation  

NLE Websites -- All DOE Office Websites (Extended Search)

TECH. & INFO. SECURITY TEAM HOME COVER | INTRODUCTION SECURITY ACRONYMS TABLE OF CONTENTS HEADQUARTERS SECURITY OFFICER PROTECTIVE FORCE UNCLASSIFIED FOREIGN VISITS & ASSIGNMENTS...

398

Office of Headquarters Security Operations: Headquarters Access...  

NLE Websites -- All DOE Office Websites (Extended Search)

Headquarters Security Operations Home Sub Offices HQ Security Officers (HSO) Program Office of Information Security Office of Headquarters Personnel Office of...

399

Office of Security Operations: Director's Message  

NLE Websites -- All DOE Office Websites (Extended Search)

Office of Executive Protection Home Sub Offices HQ Security Officers (HSO) Program Office of Security Operations Office of Information Security Office of...

400

Oak Ridge National Laboratory - Global Security Directorate  

NLE Websites -- All DOE Office Websites (Extended Search)

External Links Department of Homeland Security DHS Centers of Excellence Home Centers & Programs Department of Homeland Security Programs The Homeland Security Programs Office...

Note: This page contains sample records for the topic "deutsche securities korea" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

Security and Cyber Guidance | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Guidance Security and Cyber Guidance Appraisal Process Guides Security Evaluations Appraisal Process Guide - April 2008 Cyber Security Evaluations Appraisal Process Guide - April...

402

On Cyber Security for Networked Control Systems  

E-Print Network (OSTI)

9.2.2 Security Interdependence . . . . . . Bounded Control7 Security Constrained Networked Control 7.1Inputs 9 Security Interdependencies for Networked 9.1

Amin, Saurabh

2011-01-01T23:59:59.000Z

403

Global Environmental Change and Human Security  

E-Print Network (OSTI)

with human rights, human security or environmental change ifEnvironmental Change and Human Security By Matthew, RichardChange and Human Security. Cambridge, Massachusetts &

Kunnas, Jan

2011-01-01T23:59:59.000Z

404

National Security & Safety Reports | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

National Security & Safety Reports National Security & Safety Reports October 29, 2013 Evaluation Report: IG-0897 The Department of Energy's Unclassified Cyber Security Program -...

405

Security and Performance Considerations in Wireless Networks  

E-Print Network (OSTI)

ACM Workshop on Wireless Security, 2004. [3] ISM Wide-bandTraffic Flows. In Network Security Lab (NSL) Technicalthe Challenges of Security in a Mobile Environment. In

Pelechrinis, Konstantinos

2010-01-01T23:59:59.000Z

406

Cyber Security Reports | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Guidance Cyber Security Reports Cyber Security Reports 2012 Review of the Classified Cyber Security Programs at the Lawrence Livermore National Laboratory, January 2012, (OUO)...

407

Security and United States Immigration Policy  

E-Print Network (OSTI)

Change and European Security. London: Brassey's. Furer,1981]. American National Security, 6th ed. Baltimore, MD:J. Wheeler. 2008. The Security Dilemma: Fear, Cooperation

Totten, Robbie James

2012-01-01T23:59:59.000Z

408

Visitor_Security_and_Safety_Information  

NLE Websites -- All DOE Office Websites (Extended Search)

in a designated lot near the main lobby and auditorium. Office of Health, Safety and Security Office of Security Operations Office of Headquarters Security Operations United...

409

Security, Emergency Planning & Safety Records | Department of...  

NLE Websites -- All DOE Office Websites (Extended Search)

Security, Emergency Planning & Safety Records Security, Emergency Planning & Safety Records ADM 180.pdf More Documents & Publications ADMINISTRATIVE RECORDS SCHEDULE 18: SECURITY,...

410

National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

U.S. Department of Energy National Nuclear Security Administration Federal Equal Opportunity Recruitment Program Plan Certification - Fiscal Year 2009 Please type or print clearly and return this sheet with original signature to: Ms. Carmen Andujar, Manager Recruiting, Examining and Assessment Group Center for Talent and Capacity Policy Strategic Human Resources Policy Attn: FY 2009 FEORP Report U.S. Office of Personnel Management 1900 E Street, NW, Room 6547 Washington, D.C. 20415-9800 A. Name and Address of Agency National Nuclear Security Administration Office of Diversity and Outreach 1000 Independence Avenue, SW Washington, DC 20585 B. Name and Title of Designated FEORP Official (include address, if different from above,

411

National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

U.S. Department of Energy National Nuclear Security Administration Federal Equal Opportunity Recruitment Program Plan Certification - Fiscal Year 2011 Please type or print clearly and return this sheet with original signature to: Ms. Carmen Andujar, Manager Recruiting, Examining and Assessment Group Center for Talent and Capacity Policy Strategic Human Resources Policy Attn: FY 2011 FEORP Report U.S. Office of Personnel Management 1900 E Street, NW, Room 6547 Washington, D.C. 20415-9800 A. Name and Address of Agency National Nuclear Security Administration 1000 Independence Avenue, SW Washington, DC 20585 B. Name and Title of Designated FEORP Official (include address, if different from above,

412

U.S. and South Korea Sign Agreement on FutureGen Project | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

South Korea Sign Agreement on FutureGen Project South Korea Sign Agreement on FutureGen Project U.S. and South Korea Sign Agreement on FutureGen Project June 26, 2006 - 2:34pm Addthis Korea to Participate in World's First Integrated Carbon Sequestration and Hydrogen Production Research Power Plant WASHINGTON, DC - U.S. Energy Secretary Samuel W. Bodman and South Korean Minister of Commerce, Industry & Energy, Chung Sye Kyun, today signed an agreement making South Korea the second country, after India, to join the United States in the FutureGen International Partnership. Korea has pledged $10 million to help build and operate the world's first zero-emissions coal-fired power plant and will sit on a government steering committee to oversee this initiative. Once operational, this plant will remove and sequester carbon dioxide while producing electricity and

413

Environment/Health/Safety/Security (EHSS): Security & Emergency Services:  

NLE Websites -- All DOE Office Websites (Extended Search)

Security & Emergency Services Security & Emergency Services Security Update ID Cards Gate Procedures Visitor/Guest Access Bus/Shuttle Reporting Foreign Contacts Mail Handling Contacts Cyber Protection Website ISSM Website ISSM: Counterintelligence and Counterterrorism Emergency Services Website Security and Emergency Operations Website Security Update THREAT ASSESSMENT: January 9, 2004-- The Department of Energy has directed all DOE sites to lower their security status to Secon Level 3, to coincide with the Department of Homeland Security advisory system. Security measures as listed below are in place. If you have any questions, call Dan Lunsford at x6016. ID Cards: Every employee must have a valid LBNL proximity badge and either wear it or produce it upon request. Badges and clips are available in the Site Access

414

New Security Challenges in the Global Era: Environmental Security  

NLE Websites -- All DOE Office Websites (Extended Search)

New Security Challenges in the Global Era: Environmental Security New Security Challenges in the Global Era: Environmental Security Speaker(s): Beth Chalecki Date: October 4, 2001 - 12:00pm Location: Bldg. 90 Seminar Host/Point of Contact: Mithra Moezzi The environment is the planetary support system on which all other human enterprises depend. If political, social, cultural, religious, and most importantly economic systems are to remain secure and viable, the environment must also remain secure and viable. This makes global environmental conditions a legitimate U.S. national security concern. The security of individuals, communities, nations, and the entire global community is increasingly jeopardized by unpremeditated, non-military environmental threats. These threats are self-generated: we perpetrate them on ourselves, by fouling our air and water, and over-harvesting our land.

415

The security fallacy: Seven myths about physical security | Argonne  

NLE Websites -- All DOE Office Websites (Extended Search)

Watch Roger Johnston speak on voting machine security in the Illinois area. Watch Roger Johnston speak on voting machine security in the Illinois area. Watch Roger Johnston speak on voting machine security in the Illinois area. Because orbiting satellites send GPS signals from space, they are faint and easily overriden by stronger signals. Image credit: NASA. Because orbiting satellites send GPS signals from space, they are faint and easily overriden by stronger signals. Image credit: NASA. Security cameras aren't all they're cracked up to be. Image credit: Jaymis Loveday. Security cameras aren't all they're cracked up to be. Image credit: Jaymis Loveday. The security fallacy: Seven myths about physical security By Louise Lerner * October 26, 2010 Tweet EmailPrint The high-tech access control device was secure, sophisticated, and complex;

416

New Security Challenges in the Global Era: Environmental Security  

NLE Websites -- All DOE Office Websites (Extended Search)

New Security Challenges in the Global Era: Environmental Security Speaker(s): Beth Chalecki Date: October 4, 2001 - 12:00pm Location: Bldg. 90 Seminar HostPoint of Contact: Mithra...

417

An Introduction to Computer Security: the NIST Handbook  

Science Conference Proceedings (OSTI)

An Introduction to Computer Security: the NIST Handbook Keywords: computer security, contingency planning, cryptography, guidance, information assurance, risk management, security audit, security controls, security policy

Barbara Guttman; Edward A. Roback

1995-10-01T23:59:59.000Z

418

Korea Institute of Energy Research Seong-Ryong Park  

E-Print Network (OSTI)

.9 % of total amount of imports Energy imports ( vs total imports) Oil Imports ((Mil bbl) 0.1 Bil USD 1,217 1 material Geo thermal Heat pump (Korea) (EU) RenewableNew Renewable EnergyNew Heat source · 3 New energy, 8 Renewable energy · Heat Pump is NOT included. '02 '05'04 '06 '90 '02 '04 '05 '06 '07 '08 Primary Energy 93

Oak Ridge National Laboratory

419

Digital Operating Experience in the Republic of Korea  

Science Conference Proceedings (OSTI)

This report documents an investigation of digital system operating experience in Korea Hydro Nuclear Power (KHNP) nuclear plants, with a focus on events in which software common-cause failure (CCF) was or could have been a significant factor. CCF remains an unsettled technical and regulatory issue, both for new plants and for digital upgrades at operating plants. The concern is the potential for CCFs to disable multiple equipment trains or systems that use identical software-based components.

2011-11-22T23:59:59.000Z

420

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... cyber maryLaNd summit. Please NOTE -- Last Updated Wednesday, January 20, 2010. PRESENTATIONS: ... NIST Voting Cyber Security: ...

Note: This page contains sample records for the topic "deutsche securities korea" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... Georgia Technology Information Security Center (GTISC); Idaho State University National Center of Academic Excellence in Information Assurance: ...

422

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... Incident Response. Contingency Planning and Disaster Response; Incident Identification, Reporting, and Response. Back to Top Security Controls. ...

423

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... to security control selection and specification considers effectiveness, efficiency, and constraints due to applicable laws, directives, Executive Orders ...

424

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... and OMB have instituted laws, regulations, and directives that govern ... August 2004, Homeland Security Presidential Directive/Hspd-12 Subject ...

425

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... The PRISMA is based upon existing federal directives including Federal Information Security Management Act (FISMA), NIST guidelines and other ...

426

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... NIST Special Publication 800-82: Guide to Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems Security; February ...

427

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... PIV Implementation, Daniel Wood, Treasury; Electricity Subsector Cybersecurity ... Basic Input/Output System (BIOS) Security - Andrew Regenscheid ...

428

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... North Korean nuclear proliferation - using distributed ... in a Collaborative Environment - "to investigate ... can fulfil the current security requirements of ...

429

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... security including, but not limited to: accreditation, audit trails, authorization ... US Department of Energy Computer Incident Advisory Capability (CIAC ...

430

Nuclear Safeguards and Security | National Nuclear Security Administra...  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

431

VERIFYING NORTH KOREA'S NUCLEAR PROGRAMME: TECHNICAL OPTIONS AND POLICY CHOICES  

E-Print Network (OSTI)

This paper considers the challenges and policy choices associated with verifying a North Korean declaration about its past nuclear activities. In terms of the plutonium programme, there are two key choices facing policy makers. First, in light of North Koreas reported statement that its October 2006 test involved only 2 kg of plutonium, is the IAEAs standard definition of a significant quantity appropriate? Second, using open source information, this paper argues that the uncertainty in the material unaccounted for, ?(MUF), will be between 5 and 10 kg, depending on the degree of cooperation afforded by North Korea. In order to ensure that verification produces a conclusive answer, the magnitude of ?(MUF) will necessitate some combination of decreasing the detection probability and increasing the false alarm rate from their standard IAEA values, or adopting entirely different criteria against which to assess North Korean compliance. The paper also includes a discussion of the process for verifying the absence or existence of a clandestine uranium enrichment programme by formulating it as a Bayesian inference problem. This framework, together with an analysis of the politics of inspections at undeclared locations suggests that, unless detailed intelligence pinpointing the location of a clandestine centrifuge facility is available, inspection rights at undeclared facilities may be of limited utility.

Tuscon Az; James M. Acton

2009-01-01T23:59:59.000Z

432

Christian Culture and Military Rule: Assimilation and its Limits during the First Decade of Japan's Colonial Rule in Korea, 1910-19  

E-Print Network (OSTI)

of Japan?s Colonial Rule in Korea, 1910-19 by Michael Isaacof Japan?s Colonial Rule in Korea, 1910-19 Copyright 2010 byof Japan?s Colonial Rule in Korea, 1910-19 By Michael Isaac

Shapiro, Michael Isaac

2010-01-01T23:59:59.000Z

433

The power of the ideology of gender equality and the limitations of state bureaucracy : paradoxes in the institutionalization of gender equality policies in South Korea  

E-Print Network (OSTI)

1994. Women of Japan and Korea : Continuity and Changeof Democratization in South Korea. New York: PalgraveState Policy on Women in Korea (1962-79). Ph.D. dissertation

Cho, Se-Hyun

2010-01-01T23:59:59.000Z

434

Case Studies from the Climate Technology Partnership: Landfill Gas Projects in South Korea and Lessons Learned  

Science Conference Proceedings (OSTI)

This paper examines landfill gas projects in South Korea. Two case studies provide concrete examples of lessons learned and offer practical guidance for future projects.

Larney, C.; Heil, M.; Ha, G. A.

2006-12-01T23:59:59.000Z

435

Crisis, Contradiction and Contingency: An Ethnography of Corporate Capitalism in Korea and Indonesia.  

E-Print Network (OSTI)

??This dissertation is a multi-sited ethnography that focuses on social groups and individuals in factories, business, civil society, government, and corporate organizations in Korea and (more)

Eau, Jaisohn

2010-01-01T23:59:59.000Z

436

A History of Curriculum Thought in South Korea: 57BCE-1987.  

E-Print Network (OSTI)

??This study is a history of curriculum studies literature in the context of South Korea. It includes a chronology with commentaries of curriculum books that (more)

Kim, Daeyoung

2013-01-01T23:59:59.000Z

437

Sodium Sulfur (NaS) Battery Research in Korea: Part II ...  

Science Conference Proceedings (OSTI)

Abstract Scope, The activities of sodium sulfur (NaS) battery research in Korea ... The presentation was focused on the development of tubular NaS batteries...

438

Security Cases | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

31, 2012 31, 2012 PSH-11-0029 - In the Matter of Personnel Security Hearing The individual is employed by a Department of Energy (DOE) contractor, and was granted a security clearance in connection with that employment. A routine reinvestigation of the individual revealed information concerning his finances that raised security concerns, and the local security office (LSO)summoned the individual for an interview with a personnel security specialist in August 2011. March 30, 2012 PSH-12-0002 - In the Matter of Personnel Security Hearing The individual has been employed by a Department of Energy (DOE) contractor since 1997, and has held a DOE access authorization for over 10 years. In October 2011, the individual tested positive for marijuana on a random drug test. The local security office (LSO) conducted a personnel security

439

Security Cases | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security Cases Security Cases Security Cases RSS December 23, 2013 PSH-13-0103 - In the Matter of Personnel Security On January 29, 2013, the Individual completed and submitted a Questionnaire for National Security Positions (QNSP) to a Local Security Office (LSO). In this QNSP, the Individual admitted that he had used a neighbor's internet connection without permission on several occasions in 2010 and 2011, and had downloaded copyrighted software and media to his computer without permission from the copyright holders from 2000 through 2006. Exhibit 7 at 18-19. December 20, 2013 PSH-13-0102 - In the Matter of Personnel Security On December 20, 2013, a Hearing Officer determined that an individual's security clearance should be restored. In reaching this determination, the

440

Climate Change and National Security  

Science Conference Proceedings (OSTI)

Climate change is increasingly recognized as having national security implications, which has prompted dialogue between the climate change and national security communitieswith resultant advantages and differences. Climate change research has ...

Elizabeth L. Malone

2013-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "deutsche securities korea" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

Departmental Personnel Security- Clearance Automation  

Energy.gov (U.S. Department of Energy (DOE))

The primary objective of the DOE Integrated Security System (eDISS+) Initiative is to support the integration of multiple DOE security systems and databases. This integrated environment provides...

442

Facility Security Officer Contractor Toolcart  

NLE Websites -- All DOE Office Websites (Extended Search)

Program Planning and Management DOE M 470.4-1, Chg 2, dated 102010, Safeguards and Security Program Planning and Management Physical Security DOE NAP 70.2, Chg 1, dated 72011,...

443

Security Services Management (Section B)  

Science Conference Proceedings (OSTI)

To take the next step in information security, Security Services Management provides a comprehensive approach to managing people, process, and technology through the sound application of metrics. This book demonstrates how to develop a balanced strategy ...

James S. Tiller

2007-07-01T23:59:59.000Z

444

Security_Walls_VPP_Award  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Force Recognized for Outstanding Safety CARLSBAD, N.M., May 10, 2013 - The U.S. Department of Energy (DOE) has awarded Security Walls, LLC, the Waste Isolation Pilot...

445

Security Ontology for Annotating Resources  

E-Print Network (OSTI)

Abstract. Annotation with security-related metadata enables discovery of resources that meet security requirements. This paper presents the NRL Security Ontology, which complements existing ontologies in other domains that focus on annotation of functional aspects of resources. Types of security information that could be described include mechanisms, protocols, objectives, algorithms, and credentials in various levels of detail and specificity. The NRL Security Ontology is more comprehensive and better organized than existing security ontologies. It is capable of representing more types of security statements and can be applied to any electronic resource. The class hierarchy of the ontology makes it both easy to use and intuitive to extend. We applied this ontology to a Service Oriented Architecture to annotate security aspects of Web service descriptions and queries. A refined matching algorithm was developed to perform requirement-capability matchmaking that takes into account not only the ontology concepts, but also the properties of the concepts. 1

Anya Kim; Jim Luo; Myong Kang

2005-01-01T23:59:59.000Z

446

Metaphors for cyber security.  

SciTech Connect

This report is based upon a workshop, called 'CyberFest', held at Sandia National Laboratories on May 27-30, 2008. Participants in the workshop came from organizations both outside and inside Sandia. The premise of the workshop was that thinking about cyber security from a metaphorical perspective could lead to a deeper understanding of current approaches to cyber defense and perhaps to some creative new approaches. A wide range of metaphors was considered, including those relating to: military and other types of conflict, biological, health care, markets, three-dimensional space, and physical asset protection. These in turn led to consideration of a variety of possible approaches for improving cyber security in the future. From the proposed approaches, three were formulated for further discussion. These approaches were labeled 'Heterogeneity' (drawing primarily on the metaphor of biological diversity), 'Motivating Secure Behavior' (taking a market perspective on the adoption of cyber security measures) and 'Cyber Wellness' (exploring analogies with efforts to improve individual and public health).

Moore, Judy Hennessey; Parrott, Lori K.; Karas, Thomas H.

2008-08-01T23:59:59.000Z

447

FOIA | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

448

Distribution System Cyber Security Architecture  

Science Conference Proceedings (OSTI)

The National Institute of Standards and Technology (NIST) has developed the NISTIR 7628: Guidelines for Smart Grid Cyber Security, while ASAP-SG has developed both the Security Profile for AMI (v2.0) and the Security Profile for Distribution Management. These documents are necessarily high level and generic, covering a broad range of smart grid assets, and focus exclusively on determining the security requirements. However, utilities and their vendors often cannot get a clear picture of what existing tec...

2010-12-31T23:59:59.000Z

449

Secure Systems and Applications Group  

Science Conference Proceedings (OSTI)

... technologies, and on developing security solutions ... the earliest stages of technology development through proof ... industry, and to develop tests, test ...

2013-01-17T23:59:59.000Z

450

Pollux | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Pollux | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our...

451

Testimonials | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Testimonials | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our...

452

Training | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

453

Counterterrorism | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

454

Vocabulary | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

455

Pantex | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

456

Awards | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

457

Policy | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

458

Supercomputers | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

459

Engineering | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

460

Contacts | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

Note: This page contains sample records for the topic "deutsche securities korea" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

Accomplishments | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

462

Preparedness | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

463

Public | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

464

Recovery | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

465

Nonproliferation | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

466

Overview | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

467

Mission | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

468

Operations | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

469

Conferences | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

470

Planning | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

471

5.6 Security Monitoring  

Science Conference Proceedings (OSTI)

... monitoring of the cloud-provider infrastructure to demonstrate compliance with cloud-subscriber security policies and auditing requirements. ...

2010-11-02T23:59:59.000Z

472

Compensation | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

473

Convert | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

474

Protect | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

475

Leave | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

476

International | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

477

Remove | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

478

Interdiction | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

479

Features | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

| National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our...

480

Security Aspects of Electronic Voting  

Science Conference Proceedings (OSTI)

Security Aspects of Electronic Voting. Summary: The Help America Vote Act (HAVA) of 2002 was passed by Congress to ...

2013-08-01T23:59:59.000Z

Note: This page contains sample records for the topic "deutsche securities korea" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

Department of Homeland Security Workshop  

Science Conference Proceedings (OSTI)

Homeland Security Modeling and Simulation Workshop. Purpose: This workshop is a joint effort of US Department of Homeland ...

2011-06-14T23:59:59.000Z

482

X-ray Security Screening  

Science Conference Proceedings (OSTI)

National and International Standards for X-ray Security Screening Applications. Summary: The primary objective of this ...

2013-03-13T23:59:59.000Z

483

Model Driven Security Functional Testing  

Science Conference Proceedings (OSTI)

Model Driven Security Functional Testing. Summary: Model-Driven Engineering (MDE) is emerging as a promising approach ...

2013-01-15T23:59:59.000Z

484

Security Patterns: Comparing Modeling Approaches Armstrong NHLABATSI  

E-Print Network (OSTI)

Security Patterns: Comparing Modeling Approaches Armstrong NHLABATSI ** , Arosha BANDARA the challenges of developing secure software systems remains an active research area in software engineering. Current research efforts have resulted in the documentation of recurring security problems as security

Jurjens, Jan

485

Presented by National Security College  

E-Print Network (OSTI)

of maritime security, the Taiwan question, and the US-China nuclear balance and extended deterrence. HePresented by National Security College Japan Institute Strategic and Defence Studies Centre Department of Political and Social Change ARC Centre of Excellence in Policing and Security Pivotal Alliance

486

Security for wireless sensor networks  

Science Conference Proceedings (OSTI)

This chapter identifies the vulnerabilities associated with the operational paradigms currently employed by Wireless Sensor Networks. A survey of current WSN security research is presented. The security issues of Mobile Ad-Hoc Networks and infrastructure ... Keywords: WSN, security, sensor networks, wireless

Sasikanth Avancha; Jeffrey Undercoffer; Anupam Joshi; John Pinkston

2004-01-01T23:59:59.000Z

487

Secure collaborations over message boards  

Science Conference Proceedings (OSTI)

We provide a message board model for collaborative systems, and propose an architecture and protocol for securing collaborative applications over message boards. The proposed architecture employs only efficient symmetric cryptographic principles, and ... Keywords: collaborative systems, cryptography, key predistribution, message boards, networks, secure collaboration, security, service attacks, trust modules

Mahalingam Ramkumar; Nasir Memon

2006-09-01T23:59:59.000Z

488

Security & Sustainability College of Charleston  

E-Print Network (OSTI)

Security & Sustainability POLI 399 College of Charleston Fall 2013 Day/Time: T/H; 10 we can think about generating greater security and prosperity through systemic change that arises, then providing security is paramount consideration along that path. Using frames of collective, national

Young, Paul Thomas

489

CALENDAR YEAR 2011 ANNUAL SECURITY  

E-Print Network (OSTI)

CALENDAR YEAR 2011 ANNUAL SECURITY FIRE SAFETY REPORT& #12;University of North Dakota Annual Security & Fire Safety Report: Calendar Year 2011 n Page 1 Dear Community Member: I am pleased to introduce the 2011 Annual Security and Fire Safety Report for the University of North Dakota. This report

Delene, David J.

490

MINIMUM SECURITY REQUIREMENTS FOR FEDERAL  

E-Print Network (OSTI)

March 2006 MINIMUM SECURITY REQUIREMENTS FOR FEDERAL INFORMATION AND INFORMATION SYSTEMS: FEDERAL INFORMATION PROCESSING STANDARD (FIPS) 200 APPROVED BY THE SECRETARY OF COMMERCE MINIMUM SECURITY REQUIREMENTS BY THE SECRETARY OF COMMERCE Shirley Radack, EditorShirley Radack, Editor Computer Security Division

491

Security and Verification Provable cryptography  

E-Print Network (OSTI)

Security and Verification Provable cryptography Benjamin Grégoire1 Tamara Rezk1 1INRIA Sophia Antipolis - Méditerranée, France Cours de Master 2 Univerisité de Nice Sophia-Antipolis Security and Verification 1/ 33 #12;Cryptanalysis-driven Security Propose a cryptographic scheme Wait for someone to come

Gregoire, Benjamin - Institut National de Recherche en Informatique et en Automatique, Centre de recherche Sophia Antipolis

492

Visitor Guide to Smart Security  

E-Print Network (OSTI)

Visitor Guide to Smart Security The following articles are prohibited on LANL property, including and are not allowed in Limited Security Areas or above: · personal computers and associated media (including palm- top capabilities, unless disabled). Note 1: Government cell phones are allowed into Security Areas as long

493

Security SmartMay 2007 View and download all Security Smarts for your safety and security meetings  

E-Print Network (OSTI)

Security SmartMay 2007 View and download all Security Smarts for your safety and security meetings http://int.lanl.gov/security/documents/index.shtml#security-smarts Stop! Before You Snap That Photo-employed workers/camera users must obtain approval from their security-responsible line manager (SRLM

494

Y-12 National Security Complex | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Home > About Us > Our Locations > Y-12 National Security Complex Home > About Us > Our Locations > Y-12 National Security Complex Y-12 National Security Complex http://www.y12.doe.gov/ Field Office: The NNSA Production Office is responsible for contract management and oversight of the Pantex Plant in Amarillo, Texas and the Y-12 National Security Complex in Oak Ridge, Tenn. Y-12 supports the Nuclear Security Enterprise through nuclear material processing, manufacturing and storage operations and nuclear nonproliferation activities and provides enriched uranium feedstock for the U.S. Navy. National Security Complex: The Y-12 National Security Complex (Y-12) serves as the nation's only source of enriched uranium nuclear weapons components and provides enriched uranium for the U.S. Navy. Y-12 is a leader in materials science and precision manufacturing and serves as the

495

NNSA: Securing Domestic Radioactive Material | National Nuclear Security  

NLE Websites -- All DOE Office Websites (Extended Search)

NNSA: Securing Domestic Radioactive Material | National Nuclear Security NNSA: Securing Domestic Radioactive Material | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > Media Room > Fact Sheets > NNSA: Securing Domestic Radioactive Material Fact Sheet NNSA: Securing Domestic Radioactive Material Apr 12, 2013 The Department of Energy's National Nuclear Security Administration (NNSA),

496

NISTIR 7751, Computer Security Division 2010 Annual  

Science Conference Proceedings (OSTI)

... 12 Smart Grid Cyber Security 13 Supply Chain Risk Management 14 ... 10. NISTIR 7628, Guidelines for Smart Grid Cyber Security. ...

2012-03-01T23:59:59.000Z

497

The Office of Health, Safety and Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Independent Oversight Home Sub Offices Security Evaluations Cyber Security Evaluations Emergency Management Oversight Environment, Safety and Health Evaluations...

498

GARS | Nonproliferation and National Security Department  

NLE Websites -- All DOE Office Websites (Extended Search)

Nonproliferation and National Security Department Nonproliferation The Nonproliferation and National Security Department carries out research and development, provides technical...

499

Oak Ridge National Laboratory - Global Security Directorate  

NLE Websites -- All DOE Office Websites (Extended Search)

Home Centers & Programs Department of Defense Programs DARPA Programs Department of Homeland Security Programs Nonproliferation, Safeguards, and Security Programs Back...

500

Events and Conferences | National Security | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Areas Initiatives Facilities Events and Conferences Supporting Organizations National Security Home | Science & Discovery | National Security | Events and Conferences Events...