Big Chemical Encyclopedia

Chemical substances, components, reactions, process design ...

Articles Figures Tables About

Security needs

Security needs shelter, secure sources of the existence needs, freedom from fear, need for structure in life... [Pg.136]

Like all forms of asset protection, security needs to be properly designed, planned and co-ordinated if it is to be both effective and cost beneficial. From previous comments in this chapter, it will be noted that the insurance company s attention is largely focused on the security of... [Pg.166]

The scientific community is indebted to Alexey Yablokov and Lev Fedorov for carefully examining the pesticide impact on public health and the environment. Their studies add to our knowledge and their results suggest ways that public health and environmental pesticide related problems could be avoided. Given the food security needs of the rapidly expanding world human population, a safe and a productive agriculture are vital for the future. [Pg.9]

The most common application of MMW systems to security needs is the MMW radiometric imager. Systems of this type are very useful because of their ability to detect a variety of concealed weapons hidden by clothing. Millivision Technologies of South Deerfield, MA has been a leader in this field by developing a family of imagers that operate in the 94 GHz atmospheric window and that use a superheterodyne receiver... [Pg.256]

This feature establishes the expectation that chemical industrial facilities should, through their annual capital, operations, maintenance, and staff resources plans, identify and set aside resources consistent with their specific identified security needs. Security priorities should be clearly documented and should be reviewed with utility executives at least once per year as part of the traditional budgeting process. [Pg.218]

Facility management must assess its unique security needs and establish an appropriate level of security protection service. [Pg.50]

Confidence in government also characterized the time after World War II and during the Cold War. Over the history of our country it has been seen that one of the legitimate roles for the federal government is to provide for the national defense. There s been a lot of disagreement about many other tasks but not over this one. Military and security needs carried a lot of development throughout the post-World War II period. Of course, the Vietnam War led to less confidence in the government and caused the termination of classified research projects at universities. [Pg.74]

The first main development stage is establishing the TOE security environment. Its purpose is to define the nature and scope of the security needs, to be addressed by the TOE [1], For this stage it is very important to provide the trade-off between its elements, especially between threats and policies, albeit generally the threat specification has higher priority. [Pg.16]

The security objectives elaboration is also aided by the implemented generics library. The objectives provide a concise statement of the intended response to the security problem [1], indicating the extent to which the security needs, defined by the security environment, are addressed by the... [Pg.16]

Semiconductors and Their Application to Nationai Security Needs... [Pg.1]

Now that these organic/inorganic heterostructure semiconductors can be made, we can use them to increase the range of potentially harmful materials that can be detected in time to prevent a dangerous incident. I ll briefly discuss the applications of these semiconductor materials to national security needs, including devices such as infrared (IR) detectors and sources, gamma-ray detectors, and chemical/biological sensors. [Pg.4]

IPCs rely heavily on the security provided by the supporting computer network infrastructure and need to comply with the regulations. EirewaUs, daily virus updates, and operating system upgrades in response to security notification from vendors are typical methods of responding to security needs. [Pg.617]

LOVE AND BELONGINGNESS SAFETY AND SECURITY NEEDS BASIC PHYSIOLOGICAL NEEDS... [Pg.173]

One of the safety and security needs we all have is a need for stability things seem safer if only the anticipated happens. There are no surprises, no changes. Indeed, we will often put up with unpleasant things for long periods of time (sometimes a lifetime) rather than take a chance on the unknown. This conservative safety need is often coupled with specific fears of what might happen, or with semiconscious or unconscious traumas associated with change. [Pg.252]

Preferred uses Networks Medium-size networks with high security needs Networks of any size requiring high speed and data security WANs and radio/TV communications... [Pg.328]

Chemical companies have scrambled to secure needed raw materials, and this also accounts for some of the large capital expenditures. An example was Du Font s purchase of Conoco for the oil, gas, and coal raw material the latter had. Other companies integrated backward and produced their own raw materials. Still others spent heavily to convert crude oil to petrochemical feedstocks. [Pg.431]

GM President Charles Wilson, became Secretary of Defense in 1953, and proclaimed that a new road system was vital to U.S. security needs. Congress approved the 25 billion Interstate Highway Act of 1956 and the highways expanded. [Pg.150]

Maslow s hierarchy appears also to have a developmental component. Lower level needs will be of less concern if they have been habitually satisfied for some time. Thus, the lower levels of physiological and safety and security needs of the average American adult were satisfied in childhood, and have little influence on the adult s motivation (Harbaugh, 1972). Love needs for Americans are often satisfied in adolescence, and estean needs are thought to be satisfied sometime in early adult life. Self-actualization as a motivational factor may only be important when approaching later life. [Pg.460]

Women s privacy need is relevant to their security need. According to Islamic jurispradence, privacy rales are based on the notion that women arouse men s sexual appetite, which exposes the women to danger. Thus, privacy rules, according to Islam, are precaution mechanisms that decrease women s exposirre to men and contribute to their protection. Although the Islamic perspective may not comply with other Muslim or cultural perspectives, particularly as such an issue is dependent on the nature of both women and men, it is relevant to women s security in urban public spaces. Several studies about women s use of cities show that among the major problems which women face in public spaces in the USA and Europe are the fear of harm and sexual attack (Worpole 1992 Karp et al. 1991). In general, results of these studies comply with the concept of women s privacy in Islam. [Pg.215]


See other pages where Security needs is mentioned: [Pg.526]    [Pg.1039]    [Pg.133]    [Pg.255]    [Pg.47]    [Pg.177]    [Pg.307]    [Pg.74]    [Pg.26]    [Pg.72]    [Pg.526]    [Pg.19]    [Pg.28]    [Pg.50]    [Pg.94]    [Pg.56]    [Pg.336]    [Pg.38]    [Pg.1]    [Pg.61]    [Pg.115]    [Pg.208]    [Pg.5]    [Pg.35]    [Pg.35]    [Pg.115]    [Pg.326]    [Pg.149]    [Pg.460]    [Pg.666]    [Pg.13]   
See also in sourсe #XX -- [ Pg.8 ]

See also in sourсe #XX -- [ Pg.8 ]




SEARCH



© 2024 chempedia.info