Search results

From Self-sufficiency
Jump to: navigation, search
  • In both instances my invention contemplates the full communication to the remainder of a mass of absorbent liquid or other absorbent, which ab Having thus described my invention, what I claim as new and desire to secure by Letters Patent, is:-
    10 KB (1,722 words) - 21:09, 19 June 2010
  • ...rentice bookseller, who had been involved in its publication from 1788. To secure the copyrights for the 3rd edition supplement, Constable gave Bonar a one-t ...968" /> After failing to win over [[Oxford University]], Hooper managed to secure [[Cambridge University]] as a new sponsor; thus, the 11th edition was publi
    61 KB (8,890 words) - 12:32, 19 September 2010
  • *Verbal-passive-direct ("silent treatment", failure to return communication, i.e. phone calls, e-mails) * They underpin a process that creates a safe, secure and welcoming environment, which is likely to enhance corporate image as we
    13 KB (1,825 words) - 20:30, 20 September 2010
  • [[Category:Secure communication]]
    2 KB (218 words) - 20:36, 20 September 2010
  • ...track=1&cset=true |accessdate = 2006-08-08 }}</ref> Recent revelations of "secure" data breaches at centralized data repositories, in banking and other finan ...ivacy of the U.S. network for electronic health records is the strategy to secure the privacy of patients. Former US president Bush called for the creation o
    57 KB (8,295 words) - 20:37, 20 September 2010
  • ...erckhoffs' principle]] of secure cryptography — A cryptosystem should be secure even if everything about the system, except the key, is public knowledge. * [[Metcalfe's law]] — In [[communication]]s and [[network theory]], states that the value of a system grows as appro
    35 KB (5,195 words) - 20:06, 21 September 2010
  • ...rapid and ‘always on’ flow of information, the low cost, anonymity of communication and a multimedia environment. The following is a breakdown of the main purp ...until personal indoctrination occurs which is often through the use of the secure software [[Paltalk]].<ref name="technologyreview1"/><ref>{{cite web|url=htt
    13 KB (1,972 words) - 20:56, 26 September 2010
  • :*Other states can be counted on to keep information secure, and use it to mutual advantage. :*International institutions are secure and trustworthy.
    43 KB (6,255 words) - 20:56, 26 September 2010
  • .../ Report of the High Level Panel on Threats, Challenges and Change "A more secure world: Our shared responsibility"] (2004) para. 164.</ref>}} # The communication of fear to an audience beyond the immediate victim, and;
    70 KB (10,299 words) - 20:56, 26 September 2010
  • ...ief delay on the telephone companies hearing to give him an opportunity to secure the Administration's approval of the bill which he thought could be done. W ...ncouraged rather than avoided. Indeed, recognizing the importance of such communication, the first step the Administration took, when it learned that you might pur
    103 KB (16,549 words) - 16:28, 27 September 2010
  • ...y believed by the NSA to be outside the U.S., even if the other end of the communication lies within the U.S., without [[Search warrant|warrants]]. ...e the government "has a reasonable basis to conclude that one party to the communication is a member of al Qaeda, affiliated with al Qaeda, or a member of an organi
    147 KB (21,761 words) - 16:31, 27 September 2010
  • ...gnals could be understood directly by trained operators. Largely to allow secure communications between Roosevelt and Churchill, the [[SIGSALY]] system of d ...are easily decrypted using simple techniques and are no longer regarded as secure.
    17 KB (2,658 words) - 13:51, 10 December 2011