Search results

From Self-sufficiency
Jump to: navigation, search
  • ...ed, making the strength of the door jambs vitally important to the overall security of the door. [[Category:Physical Security]]
    2 KB (288 words) - 17:16, 18 May 2010
  • ...tory drawings of the system show how it works, but are wildly different in physical appearance from the actual internal mechanisms, perhaps intentionally so. H ...ings for the weapon include the [[United States Coast Guard]]'s [[National Security Cutter]], the upcoming [[Zumwalt class|''Zumwalt''-class]] destroyer (close
    54 KB (8,488 words) - 20:31, 2 July 2010
  • The paper may then undergo [[sizing]] to alter its physical properties for use in various applications. ...value:''' [[paper money]], [[bank note]], [[cheque]], [[security]] (see [[Security paper]]), [[voucher]] and [[ticket]]
    21 KB (3,131 words) - 09:08, 20 September 2010
  • ...Each petroleum variety has a unique mix of [[molecule]]s, which define its physical and chemical properties, like color and [[viscosity]]. ...editor=Akiner, Shirin; Aldis, Anne|title=The Caspian: Politics, Energy and Security|publisher=Routledge|year=2004|location=New York|isbn=978-0-7007-0501-6}}
    69 KB (9,885 words) - 09:12, 20 September 2010
  • .../> It is weakly radioactive and remains so because of its long [[half-life|physical half-life]] (4.468 billion years for [[uranium-238]]), but has a considerab {{quotation|Annex II to the [[Convention on the Physical Protection of Nuclear Material]] 1980 (which became operative on 8 February
    80 KB (11,721 words) - 09:13, 20 September 2010
  • ...sed on both panes but special applications such as acoustic attenuation or security may require wide ranges of thicknesses to be incorporated in the same unit. * Physical properties of the gas used in between the gap (such as density, heat capaci
    28 KB (4,352 words) - 09:14, 20 September 2010
  • * Non-physical violence (intimidation, abuse, threats etc) * Physical violence (punching, kicking, pushing etc)
    13 KB (1,825 words) - 20:30, 20 September 2010
  • ...monstrations, and outdoor festivals. Event organizers, venue managers, and security personnel use barricades as part of their crowd management planning. Crowd control barriers act as a physical and psychological barrier, used to demarcate "no access" zones, and to desi
    6 KB (895 words) - 20:30, 20 September 2010
  • Some of the risks associated with the presence of chemical or physical hazards in confined spaces include: • the soundness and security of the space, such as whether the space could be moved inadvertently;
    59 KB (9,427 words) - 20:30, 20 September 2010
  • ...ckground and Possible Options to Address the Threat to Aviation Safety and Security ...tripping over cables. Finally, the weight, fit, and ventilation may cause physical discomfort.
    40 KB (6,222 words) - 20:31, 20 September 2010
  • ...occurring [[silicate minerals]] exploited commercially for their desirable physical properties. They all have in common their asbestiform habit, long, (1:20) t ...té des Ouvriers dans les Filatures et Tissages d'Amianté (On hygiene and security of the workers in the spinning and weaving of asbestos)" in Le Bulletin de
    77 KB (11,403 words) - 20:32, 20 September 2010
  • Another aspect of safety is protection from attack currently known as ''Security'' (as the ISO definition of safety encompasses non-intentional (safety_safe The ultimate form of [[Turbine engine failure|engine failure]], physical separation, occurred in 1979 when a complete engine detached from [[America
    53 KB (7,764 words) - 20:33, 20 September 2010
  • ...culture that expects more and more from their employees yet offers little security in return. ...practices and policies that take into account the work environment—both physical and organizational—while also addressing the personal health risks of ind
    28 KB (4,087 words) - 20:33, 20 September 2010
  • ...ay allow for automation of tasks which were previously inaccessible due to physical restrictions, which in turn may reduce labor, land, or maintenance requirem ...the society as a whole, on human health and the environment, on trade, on security, on food systems and even on the definition of "human", have not been chara
    38 KB (5,196 words) - 20:33, 20 September 2010
  • ...le Examinetics nurses and technicians to carry out medical tests including physical examinations, vision screening and [[tonometry]] and operate bio-instrument ...ening undertaken in the mobile units and was developed, in accordance with security and privacy of health data, to be fully compliant with the US [[Health Insu
    19 KB (2,585 words) - 20:33, 20 September 2010
  • ...ways present) and requirements related to compliance with the [[rule]]s ([[Security]] of [[management]], technical, administrative ...). The [[Observer]] of th ...ement of production requires more and more not only to compromise with the security (which is never written) but also with its [[afraid]], its [[Stress (biolog
    9 KB (1,320 words) - 20:33, 20 September 2010
  • ...n EU countries the term [[Crisis Management]] emphasises the political and security dimension rather than measures to satisfy the immediate needs of the civili A precursor activity to the mitigation is the identification of risks. Physical [[risk assessment]] refers to the process of identifying and evaluating haz
    50 KB (7,069 words) - 20:33, 20 September 2010
  • ===Physical characteristics=== ...ed in the atmosphere by the blast. The Iraqi authorities have tightened up security for chlorine, which is essential for providing safe drinking water for the
    36 KB (5,155 words) - 20:35, 20 September 2010
  • ...to locate, update, and share with others. Paper-based PHRs are subject to physical loss and damage, such as can occur during a natural disaster. Paper records PC-based PHRs are subject to physical loss and damage of the personal computer and the data that it contains.
    45 KB (6,263 words) - 20:37, 20 September 2010
  • ...r model of healthcare data has been poorly received. Issues of privacy and security in such a model have been of concern.<ref>{{cite web|url=http://www.e-healt .../ref> Records that are exchanged over the Internet are subject to the same security concerns as any other type of data transaction over the Internet.
    57 KB (8,295 words) - 20:37, 20 September 2010

View (previous 20 | next 20) (20 | 50 | 100 | 250 | 500)