(common criteria for information technology security evaluation)

  • 101biblical literature — Introduction       four bodies of written works: the Old Testament writings according to the Hebrew canon; intertestamental works, including the Old Testament Apocrypha; the New Testament writings; and the New Testament Apocrypha.       The Old… …

    Universalium

  • 102Department of Defense Whistleblower Program — Aircraft procurement whistleblowing launched the modern Defense whistleblower program. The Department of Defense Whistleblower Program enables, in part, the federal mission of protecting whistleblowers by committing the Inspector General of the U …

    Wikipedia

  • 103Government contract — Contracting with the U.S. Government is based on many of the same principles as commercial contracting andcan be very profitable, but is sufficiently different from commercial contracting to require special care.Persons entering into commercial… …

    Wikipedia

  • 104Protection Profile — A Protection Profile (PP) is a document used as part of the certification process according to the Common Criteria (CC). As the generic form of a Security Target (ST), it is typically created by a user or user community and provides is an… …

    Wikipedia

  • 105Industrial and organizational psychology — Psychology …

    Wikipedia

  • 106India — /in dee euh/, n. 1. Hindi, Bharat. a republic in S Asia: a union comprising 25 states and 7 union territories; formerly a British colony; gained independence Aug. 15, 1947; became a republic within the Commonwealth of Nations Jan. 26, 1950.… …

    Universalium

  • 107arts, East Asian — Introduction       music and visual and performing arts of China, Korea, and Japan. The literatures of these countries are covered in the articles Chinese literature, Korean literature, and Japanese literature.       Some studies of East Asia… …

    Universalium

  • 108Trusted system — In the security engineering subspecialty of computer science, a trusted system is a system that is relied upon to a specified extent to enforce a specified security policy. As such, a trusted system is one whose failure may break a specified… …

    Wikipedia

  • 109police — /peuh lees /, n., v., policed, policing. n. 1. Also called police force. an organized civil force for maintaining order, preventing and detecting crime, and enforcing the laws. 2. (used with a pl. v.) members of such a force: Several police are… …

    Universalium

  • 110Military Affairs — ▪ 2009 Introduction        Russia and Georgia fought a short, intense war in 2008, fueling global fears of a new Cold War. On August 7 Georgia launched an aerial bombardment and ground attacks against its breakaway province of South Ossetia.… …

    Universalium