hybrid security
21Security token — Several types of security tokens with a penny for scale …
22hybrid locking system — n. a locking system which derives its security from two or more different technologies operated by the same key in one device, e.g. mechanical/electronic, mechanical/magnetic, etc …
23hybrid securities — Securities that have some of the attributes of both debt securities and equity securities. Type of security which, in the form of a debenture, contains elements of indebtedness and elements of equity stock. J.S. Biritz Const. Co. v. C.I.R.,… …
24hybrid securities — Securities that have some of the attributes of both debt securities and equity securities. Type of security which, in the form of a debenture, contains elements of indebtedness and elements of equity stock. J.S. Biritz Const. Co. v. C.I.R.,… …
25Trust-preferred security — A trust preferred security is a security possessing characteristics of both equity and debt issues. A company creates trust preferred securities by creating a trust and issuing debt to the new entity, while the trust issues the trust preferred… …
26Mortgage-backed security — Securities Securities Bond Stock Investment fund Derivative Structured finance Agency security …
27Commercial mortgage-backed security — Securities Securities Bond Stock Investment fund Derivative Structured finance Agency security …
28Plug-in hybrid — The Chevrolet Volt is the first mass production plug in hybrid available in the United States. A plug in hybrid electric vehicle (PHEV), plug in hybrid vehicle (PHV), or plug in hybrid is a hybrid vehicle which utilizes rechargeable batteries, or …
29Norton Internet Security — The main, simplified graphical user interface of Norton Internet Security 2012 …
30Computer security policy — A computer security policy defines the goals and elements of an organization s computer systems. The definition can be highly formal or informal. Security policies are enforced by organizational policies or security mechanisms. A technical… …