Showing 2,761 - 2,780 results of 5,943 for search '"security"', query time: 0.06s Refine Results
  1. 2761

    Cities and environmental emergencies. Green Infrastructures for the urban project by Federica Dell'Acqua

    Published 2020-12-01
    “…The paper analyses the ability of Green Infrastructures to reduce vulnerability to climate impacts through the increase of biodiversity, positive effects of green open spaces on health and security against the threats posed by pathogens and the role of the digital network to support the maintenance of Green Infrastructures performance over time.…”
    Get full text
    Article
  2. 2762

    Financing Investments in the Future: Pragmatic Solutions Are Needed by Monika Schnitzer, Achim Truger

    Published 2022-01-01
    “…However, they need to be quantified in concrete terms as quickly as possible and designed to ensure legal security in order to send reliable signals for the necessary capacity building, particularly in the construction industry and public administration.…”
    Get full text
    Article
  3. 2763

    International Cooperation and Indonesia’s Geopolitical Perspective in Indo-Pacific by Hesti Rosdiana

    Published 2025-01-01
    “…In other words, regional development through international cooperation will increase regional stability so as to encourage various economic, political and security activities that not only reduce political friction, but also provide strategic advantages for every actor who has an interest in the Indo-Pacific. …”
    Get full text
    Article
  4. 2764
  5. 2765

    Les supermarchés au Mexique et dans la Zone Métropolitaine de Mexico by Guénola Capron, Salomón González Arellano, Linda Moreno Sánchez

    Published 2022-06-01
    “…In the case of Mexico City, the situation of oligopoly by the company Wal-Mart constitutes a risk to food sovereignty and security of the city.…”
    Get full text
    Article
  6. 2766

    Selling Safely: Cybersecurity Best Practices for Small, Rural Ag Businesses by Lauri M. Baker, Cheryl R. Boyer, Russell Boyer

    Published 2022-05-01
    “…Small businesses, like agricultural and rural businesses, should not think they are immune to this threat: obscurity is not security. This new 6-page publication of the UF/IFAS Department of Agricultural Education and Communication includes some cybersecurity best practices and links to resources for further education. …”
    Get full text
    Article
  7. 2767

    Introducing the Citizen’s Income (Bürgergeld): Making Bold Changes by Alexander Herzog-Stein

    Published 2022-02-01
    “…The reform of the in-work benefit element should aim at supporting sustainable employment subject to social security contributions. However, to live up to its name, the citizen’s income must ensure genuine social participation for those receiving the citizen’s income.…”
    Get full text
    Article
  8. 2768

    PUBLIC-PRIVATE PARTNERSHIP IN THE EAEU TRANSIT ECONOMY: RUSSIA AND CENTRAL ASIA STATES by E. V. Pak

    Published 2018-11-01
    “…“Public-Private Partnership – The Basis of Innovative Development and Security in The Transit Economy” / Foreword and ed. by V. …”
    Get full text
    Article
  9. 2769

    A Game Theoretic Model for Wireless Sensor Networks with Hidden-Action Attacks by Yuxin Mao, Ping Zhu, Guiyi Wei

    Published 2013-08-01
    “…We argue that the approach is able to support secure end-to-end communication in wireless sensor networks.…”
    Get full text
    Article
  10. 2770

    « Peurs » et pratiques répressives : mobilisations musulmanes et pouvoir éthiopien (2011-2014) by Jean-Nicolas Bach

    Published 2015-04-01
    “…But conjunctures should be taken into account in a region marked by real security threats. Above all, recent religious tensions are deriving from concrete political authoritative practices of the regime’s leadership.…”
    Get full text
    Article
  11. 2771
  12. 2772

    Housing for the elderly and digital technologies. Perspectives, processes and future scenarios by Anna Mangiatordi

    Published 2020-12-01
    “…Starting from the study of ‘smart homes’ prototype models, the contribution proposes a critical reflection on processes, products and services that could be implemented in future housing for the elderly, facilitating new forms of well-being, security and social inclusion. Compared to ongoing experimental researches, new possible dynamics of innovation in processes and products are delineated, hypothesizing the application of smart systems to real living environments for the elderly.…”
    Get full text
    Article
  13. 2773

    De l’image avant toute chose : mémoires et mythes pour les Espagnes en exil de 1939 by José María Naharro-Calderón

    Published 2021-02-01
    “…The study of some graphic, essayistic, filmic, photographic, odonymic and/or museographic traces around plural 1939 Civil War Spain and its 1939 exiled shifts in France, as historical and memory amalgams fed by the transmission of diverse testimonies and imaginaries, represent other sources in order to redefine myths, between supra-European aspirations of peaceful identity agreed at the end of the 20th century, and national fears about globalization, regionalization, multiculturalism, Islamism and / or migratory pressures in the 21st century, particularly, when scrutinized through concentration practices, derived from the incapability of reconciling freedom and security.…”
    Get full text
    Article
  14. 2774

    International Cooperation and Indonesia’s Geopolitical Perspective in Indo-Pacific by Hesti Rosdiana

    Published 2025-01-01
    “…In other words, regional development through international cooperation will increase regional stability so as to encourage various economic, political and security activities that not only reduce political friction, but also provide strategic advantages for every actor who has an interest in the Indo-Pacific. …”
    Get full text
    Article
  15. 2775

    Central Bank Digital Currencies: Benefits, Risks and the Role of Blockchain Technology by Jonas Groß, Manuel Klein, Philipp Sandner

    Published 2020-07-01
    “…The main motives are higher financial stability, higher security and efficiency of payment systems and a higher degree of automation of business processes. …”
    Get full text
    Article
  16. 2776

    Towards Accurate Node-Based Detection of P2P Botnets by Chunyong Yin

    Published 2014-01-01
    “…Botnets are a serious security threat to the current Internet infrastructure. …”
    Get full text
    Article
  17. 2777
  18. 2778

    Food Insecurity and Obesity by Rachel Savelle, LaToya J. O'Neal

    Published 2017-05-01
    “…It is important that the coexistence of food insecurity and obesity is well understood so that community outreach programs and interventions can continue to be implemented in order to improve food security by increasing access to affordable, healthy foods and promoting good health nationwide. …”
    Get full text
    Article
  19. 2779

    Cost Share Programs for Florida's Agricultural Producers and Landowners by Rao Mylavarapu, Kelly Hines, Alyssa Dodd

    Published 2009-01-01
    “… SL-264, a 4-page fact sheet by Rao Mylavarapu, Kelly Hines, and Alyssa Dodd, describes several conservation programs included in the 2008 Farm Bill — the Environmental Quality Incentives Program (EQIP), Wetlands Reserve Program (WRP), Grassland Reserve Program (GRP), Wildlife Habitats Incentive Program (WHIP), and the Conservation Security Program (CRP) — which may be of high interest to farmers, ranchers, land owners, agricultural consultants, local decision-makers and extension agents. …”
    Get full text
    Article
  20. 2780

    Estate Planning by Martie Gillen, Josephine Turner, Vervil Mitchell

    Published 2012-03-01
    “…An estate plan is a pattern, a guide, or a master method for working toward financial security and the family’s future welfare. To be most effective, estate planning should involve all members of the family. …”
    Get full text
    Article