classes ::: The Ladder of Divine Ascent, Saint John of Climacus, chapter,
children :::
branches :::
see also :::

bookmarks: Instances - Definitions - Quotes - Chapters - Wordnet - Webgen


object:1.10 - On slander or calumny.
book class:The Ladder of Divine Ascent
subject:Christianity
author class:Saint John of Climacus
class:chapter


Step 10

On slander or calumny.

No sensible person, I think, will dispute that slander is born of hatred and malice. Therefore it comes next in order after its forebears.
Slander is an offspring of hatred, a subtle yet coarse disease, a leech lurking unfelt, wasting and draining the blood of charity. It is simulation of love, the patron of a heavy and unclean heart, the ruin of chastity.
Some girls do wrong without shame, and there are others who secretly and with apparently great modesty behave still worse than the former; and it is the same with shameful passions.4 There are many insincere maidens, such as: hypocrisy, vice, melancholy, the remembrance of injuries, disparagement of others in ones heart. They appear to propose one thing, but they have something else in view.
I have heard people slandering, and I have rebuked them. And these doers of evil replied in self-defence that they were doing so out of love and care for the person whom they were slandering. I said




to them: Stop that kind of love, otherwise you will be condemning as a liar him who said: Him who secretly slanders his neighbour, him I drove away.1 If you say you love, then pray secretly, and do not mock the man. For this is the kind of love that is acceptable to the Lord. But I will not hide this from you (and of course think about it, and do not judge the offender): Judas was in the company of Christs disciples, and the Robber was in the company of murderers. And what a reversal when the crisis came!

He who wants to overcome the spirit of slander, should not ascribe the blame to the person who falls, but to the demon who suggests it. For no one really wants to sin against God, even though we do all sin without being forced to do so.
I have known a man who sinned openly and repented secretly. I condemned him as a profligate, but he was chaste before God, having propitiated Him by a genuine conversion.
Do not regard the feelings of a person who speaks to you about his neighbour disparagingly, but rather say to him: Stop, brother! I fall into graver sins every day, so how can I criticize him? In this way you will achieve two things: you will heal yourself and your neighbour with one plaster. This is one of the shortest ways to the forgiveness of sins; I mean, not to judge. Judge not, that you be not judged.2
Fire and water are incompatible; and so is judging others in one who wants to repent. If you see someone falling into sin at the very moment of his death, even then do not judge him, because the Divine judgment is hidden from men. Some have fallen openly into great sins, but they have done greater good deeds in secret; so their critics were tricked, getting smoke instead of the sun.
Listen to me, listen, all you malicious reckoners of other mens accounts! If it is true (as it really is true) that with what judgment ye judge, ye shall be judged,3 then whatever sins we blame our neighbour for, whether bodily or spiritual, we shall fall into them ourselves. That is certain.
Hasty and severe judges of the sins of their neighbour fall into this predicament because they have not yet attained to a thorough and constant remembrance and concern for their own sins. For if anyone could see his own vices accurately without the veil of self-love, he would worry about nothing else in this life, considering that he would not have time enough for mourning for himself even though he were to live a hundred years, and even though he were to see a whole river Jordan of tears streaming from his eyes. I have observed that mourning, and I did not find in it even a trace of calumny or criticism.
The demons, murderers as they are, push us into sin. Or if they fail to do this, they get us to pass judgment on those who are sinning, so that they may smear us with the stain which we our selves are condemning in another.
This is one of the marks by which we can recognize malicious and slanderous people: they are plunged in the spirit of hatred, and with pleasure and without a qualm they slander the teaching or affairs or achievements of their neighbour.
I have seen some committing the gravest sins in secret and without exposure, and in their supposed purity they have harshly inveighed against persons who have had a petty fall in public.
To judge others is a shameless arrogation of the Divine prerogative; to condemn is the ruin of ones soul.
Self-esteem without any other passion can ruin a man, and in the same way, if we have formed the habit of judging, we can be utterly ruined by this alone, for indeed the Pharisee was condemned for this very thing.


1 Psalm c, 5.

2 St. Luke vi, 37.

3 St. Matthew vii, 2.



A good grape-picker, who eats the ripe grapes, will not start gathering unripe ones. A charitable and sensible mind takes careful note of whatever virtues it sees in anyone. But a fool looks for faults and defects. And of such it is said: They have searched out iniquity and expired in the search.1
Do not condemn, even if you see with your eyes, for they are often deceived.


1 Psalm lxiii, 7.

2 Psalm xxxviii, 1.

3 Ecclesiasticus xx, iS.

The tenth ascent. He who has mastered it is one who practises love or mourning.



questions, comments, suggestions/feedback, take-down requests, contribute, etc
contact me @ integralyogin@gmail.com or
join the integral discord server (chatrooms)
if the page you visited was empty, it may be noted and I will try to fill it out. cheers


OBJECT INSTANCES [0] - TOPICS - AUTHORS - BOOKS - CHAPTERS - CLASSES - SEE ALSO - SIMILAR TITLES

TOPICS
SEE ALSO


AUTH

BOOKS

IN CHAPTERS TITLE
1.10_-_On_slander_or_calumny.

IN CHAPTERS CLASSNAME

IN CHAPTERS TEXT
1.10_-_On_slander_or_calumny.

PRIMARY CLASS

chapter
SIMILAR TITLES

DEFINITIONS



QUOTES [0 / 0 - 0 / 0]


KEYS (10k)


NEW FULL DB (2.4M)


*** NEWFULLDB 2.4M ***


IN CHAPTERS [0/0]









WORDNET


































IN WEBGEN [10000/3601]

Wikipedia - 1987 Mecca incident -- July 1987 clash between Shia pilgrims and Saudi Arabian security forces during the Islamic Hajj season
Wikipedia - 2017 Equifax data breach -- Major cybersecurity incident
Wikipedia - 2019 Internet blackout in Iran -- A week-long total internet blackout ordered by Supreme National Security Council
Wikipedia - 2020 boogaloo killings -- Killings of security personnel and law enforcement officers in California
Wikipedia - 2020 General Directorate of Security Super King Air 350 crash -- Aircraft crash in Van, Turkey
Wikipedia - 2nd Security Force Assistance Brigade -- Brigade in the US Army (e. 2018)
Wikipedia - 32 ft Transportable Port Security Boat (TPSB) -- US Coast Guard boats
Wikipedia - Abdallah ibn al-Musayyab al-Dabbi -- Provincial Abbasid governor, security chief
Wikipedia - Abdullah Laghmani -- Former Afghan deputy chief of security
Wikipedia - Abdussalam Ashour -- Libyan security officer
Wikipedia - Active measures -- Term for the actions of political warfare conducted by the Soviet and Russian security services
Wikipedia - Adirondack Correctional Facility -- Medium-security state prison, located in New York, US
Wikipedia - Administration for Security and Counterintelligence
Wikipedia - ADT Inc. -- American security systems firm
Wikipedia - Adversarial machine learning -- Research field that lies at the intersection of machine learning and computer security
Wikipedia - African Security Congress -- South African political party
Wikipedia - Air Canada Flight 018 Stowaway incident -- Hong Kong airport security breach
Wikipedia - Air gap (networking) -- Network security measure
Wikipedia - Airline security
Wikipedia - Airport security
Wikipedia - Akihiko Saito -- Japanese security contractor and terrorism casualty
Wikipedia - Alarm.com -- American security company
Wikipedia - Albion Correctional Facility -- Medium-security state prison for female prisoners, located in New York, US
Wikipedia - Alec Muffett -- Software engineer, security expert
Wikipedia - Alexander Heid -- American computer security consultant
Wikipedia - Alexandra Phelan -- International law and global health security researcher
Wikipedia - Alex Holden -- Owner of Hold Security
Wikipedia - Alliance for Securing Democracy -- American national security advocacy group
Wikipedia - Altona Correctional Facility -- Medium-security state prison, located in New York, US
Wikipedia - Altor Networks -- Computer security company
Wikipedia - American Civil Liberties Union v. National Security Agency
Wikipedia - American depositary receipt -- Security representing ownership of an underlying number of shares of a foreign company
Wikipedia - American Security and Trust Company Building -- Historic building in Washington, D.C
Wikipedia - Angela Sasse -- Computer scientist and information security expert
Wikipedia - Ann Z. Caracristi -- Cryptanalyst, former Deputy Director of the National Security Agency
Wikipedia - AppArmor -- Linux kernel security module
Wikipedia - Application firewall -- Layer 7/application layer network security system
Wikipedia - Application-level gateway -- Security component that augments a firewall or NAT employed in a computer network
Wikipedia - Application security
Wikipedia - Arizona SB 1070 -- 2010 border security legislation in Arizona
Wikipedia - Arkhangelsk FSB office bombing -- 2018 terrorist attack against the Russian security service
Wikipedia - Armoured One -- U.S. security company
Wikipedia - ARPANET encryption devices -- Security tools used on ARPANET
Wikipedia - ARX (Algorithmic Research Ltd.) -- digital security company
Wikipedia - Assa Abloy -- Swedish conglomerate, manufacturer of locks and security systems
Wikipedia - Asset (computer security) -- Data, device, or other component of a computing environment
Wikipedia - Attica Correctional Facility -- Maximum-security state prison for male prisoners, located in New York, US
Wikipedia - Auction rate security -- Debt instrument with a long-term nominal maturity with a regularly reset interest rate
Wikipedia - Australian Security Intelligence Organisation
Wikipedia - Automotive security
Wikipedia - Avast -- Czech security software company
Wikipedia - BackBox -- security-oriented Linux distribution
Wikipedia - Badaber uprising -- Armed rebellion by captured and imprisoned Soviet and Afghan security forces against Pakistani- and American-backed Afghan mujahideen forces
Wikipedia - BAE Systems -- Defence, security, and aerospace company
Wikipedia - Bangladesh Institute of Peace & Security Studies -- Research institute in Bangladesh
Wikipedia - Bare Hill Correctional Facility -- Medium security state prison in Franklin County, New York
Wikipedia - Barricade tape -- Security item to mark hazardous areas
Wikipedia - Beacon Correctional Facility -- Former female minimum security state prison in New York
Wikipedia - Bearer bond -- a debt security not registered to any specific investor
Wikipedia - Belgian General Information and Security Service
Wikipedia - Berrimah Prison -- Former maximum security prison in Australia
Wikipedia - BeyondCorp -- Security framework
Wikipedia - Beyond Fear: Thinking Sensibly About Security in an Uncertain World
Wikipedia - Biosecurity Act 2015 -- Australian law
Wikipedia - Biosecurity
Wikipedia - Bitdefender -- Romanian cybersecurity technology company
Wikipedia - Black hat (computer security) -- Computer hacker with malicious intent
Wikipedia - BlackNurse (Computer Security)
Wikipedia - BlueKeep (security vulnerability)
Wikipedia - BlueKeep -- Windows security hole
Wikipedia - Boeing Defense, Space & Security -- Business unit of Boeing responsible for defense and aerospace products and services
Wikipedia - Border Guards Bangladesh -- Border security agency of the Bangladesh government
Wikipedia - Border guard -- Government service concerned with security of national borders
Wikipedia - Border Security Force (Water Wing) -- Special units of Border Security Force of India.
Wikipedia - Border Security Force -- Indian para-military Force
Wikipedia - Border Service of the Federal Security Service of the Russian Federation -- Border guard branch of the Federal Security Service of Russia
Wikipedia - Borlaug Dialogue -- Annual symposium on global food security
Wikipedia - Bouncer (doorman) -- Type of security guard
Wikipedia - Brandon Wales -- American national security official
Wikipedia - Brent Scowcroft -- US National Security Advisor
Wikipedia - Brinks Home Security -- Security company
Wikipedia - Browser security
Wikipedia - BT Managed Security Solutions
Wikipedia - Buffer overflow -- Anomaly in computer security and programming
Wikipedia - Bulletin of the Atomic Scientists -- nonprofit organization concerning science and global security issues
Wikipedia - Butana Almond Nofomela -- South African security policeman convicted of murder
Wikipedia - Cabinet Committee on National Security (Pakistan)
Wikipedia - Canadian Security Intelligence Service
Wikipedia - Capability-based security -- Computer safety concept
Wikipedia - Carbon Black (company) -- U.S.-based cybersecurity company
Wikipedia - Card security code -- Security feature on payment cards
Wikipedia - Category:Center for a New American Security
Wikipedia - Category:Computer network security
Wikipedia - Category:Computer security academics
Wikipedia - Category:Computer security organizations
Wikipedia - Category:Computer security qualifications
Wikipedia - Category:Computer security standards
Wikipedia - Category:Computer security
Wikipedia - Category:Free security software
Wikipedia - Category:Hacking (computer security)
Wikipedia - Category:National Security Agency people
Wikipedia - Category:National Security Agency
Wikipedia - Category:Operating system security
Wikipedia - Category:People associated with computer security
Wikipedia - Category:Security breaches
Wikipedia - Category:Security
Wikipedia - Category:Writers about computer security
Wikipedia - Cayuga Correctional Facility -- Medium-security state prison in Moravia, New York, US
Wikipedia - Center for International Security and Cooperation
Wikipedia - Center for Research in Security and Privacy
Wikipedia - Center for Research in Security Prices -- Research center of the University of Chicago
Wikipedia - Center for Security and Emerging Technology -- American technology think tank
Wikipedia - Central European Journal of International and Security Studies -- Academic journal
Wikipedia - Central Industrial Security Force Act -- Act of the Indian Parliament
Wikipedia - Central Leading Group for Internet Security and Informatization
Wikipedia - Central Office for Information Technology in the Security Sector -- German federal agency
Wikipedia - Central Security Service -- United States Department of Defense government agency
Wikipedia - Centrelink -- federal social security program of the Australian Government
Wikipedia - Certificate Transparency -- Internet security standard for auditing digital certificates by creating public logs recording certificates issued by publicly trusted certificate authorities
Wikipedia - Certified Information Security Manager
Wikipedia - Certified Information Systems Security Professional
Wikipedia - Certified Penetration Testing Engineer -- Cyber security certification
Wikipedia - Certified Wireless Security Professional -- Certification
Wikipedia - Chad Wolf -- De facto acting United States Secretary of Homeland Security (unlawfully serving)
Wikipedia - Chantal Kabore-Zoungrana -- Burkinese animal nutritionist and biosecurity expert
Wikipedia - Charlie Miller (security researcher)
Wikipedia - Checkmarx -- Israeli software security company
Wikipedia - Check Point -- Israeli security company
Wikipedia - Chief information security officer
Wikipedia - Chillicothe Correctional Institution -- American medium security prison
Wikipedia - Chris Krebs -- Cybersecurity and infrastructure security expert
Wikipedia - Chris Kubecka -- American computer programmer and computer security researcher
Wikipedia - Christopher Boyd (IT security) -- Computer Security researcher
Wikipedia - Chronicle Security
Wikipedia - CIC (Nintendo) -- Security lockout chip used in Nintendo game consoles
Wikipedia - CipherCloud -- Cloud security software company
Wikipedia - Cipher security summary
Wikipedia - Clinton Correctional Facility -- Maximum-security state prison for men in New York, US
Wikipedia - C-list (computer security)
Wikipedia - Cloud access security broker -- Cloud security software
Wikipedia - Cloud computing security
Wikipedia - Coast Guard of Georgia -- maritime warfare and security branch of GeorgiaM-bM-^@M-^Ys military and border police
Wikipedia - Coast guard -- Maritime security organization of a particular country
Wikipedia - Code Access Security
Wikipedia - Cold boot attack -- a means of compromising computer security by restarting the computer
Wikipedia - Collective Security Treaty Organization
Wikipedia - Collective security
Wikipedia - Collins Correctional Facility -- Medium security prison in Collins, New York, US
Wikipedia - Columbia Correctional Institution (Wisconsin) -- Maximum-security prison in Portage, Wisconsin, United States
Wikipedia - Comando Interforze per le Operazioni Cibernetiche -- Italian government agency for cybersecurity
Wikipedia - Command Consulting Group -- International security and intelligence consulting firm
Wikipedia - Command Control (event) -- Cybersecurity conference hosted in Munich, Germany
Wikipedia - Committee for Safeguarding National Security of the Hong Kong Special Administrative Region -- An organ of the Central People's Government (State Council) of China in Hong Kong
Wikipedia - Committee of General Security
Wikipedia - Common Vulnerabilities and Exposures -- Catalogue of information security vulnerabilities
Wikipedia - Communications protection -- Application of communications security measures to telecommunications systems
Wikipedia - Communications Security Establishment Canada
Wikipedia - Communications Security Establishment
Wikipedia - Communications security
Wikipedia - Comodo Cybersecurity -- American technology company
Wikipedia - Compartmentalization (information security)
Wikipedia - Comprehensive National Cybersecurity Initiative
Wikipedia - Comprehensive Social Security Assistance -- Hong Kong welfare programme
Wikipedia - Computer emergency response team -- Organisation which responds to computer security incidents
Wikipedia - Computer security audit
Wikipedia - Computer security compromised by hardware failure
Wikipedia - Computer security conference
Wikipedia - Computer security model -- Plan for specifying and enforcing security policies
Wikipedia - Computer security software -- Computer program for information security
Wikipedia - Computer Security
Wikipedia - Computer security -- The protection of computer systems from theft or damage
Wikipedia - Congressional Biodefense Caucus -- Caucus dedicated to biodefense enterprise and national security
Wikipedia - Connecticut Four -- Librarians who challenged the constitutional validity of National Security Letters
Wikipedia - Content Security Policy -- Computer security standard to prevent cross-site scripting and related attacks
Wikipedia - Control-Alt-Delete -- Computer keyboard shortcut that triggers a reboot or system security function
Wikipedia - Coordinating Ministry for Political, Legal, and Security Affairs (Indonesia) -- Indonesian government ministry
Wikipedia - CopperheadOS -- Mobile operating system focused on privacy and security
Wikipedia - Coronavirus Aid, Relief, and Economic Security Act
Wikipedia - Corporate security
Wikipedia - Corps of Commissionaires (United Kingdom) -- The oldest security company in the world.
Wikipedia - Corps of Gendarmerie of Vatican City -- Police and security force of Vatican City
Wikipedia - Council for National Defense and Security (Vietnam)
Wikipedia - Counterintelligence state -- Form of government where state security services permeate society
Wikipedia - Counterpane Internet Security
Wikipedia - Counter-Terrorism and Security Act 2015 -- United Kingdom act
Wikipedia - Covert channel -- Computer security attack that creates a capability to transfer information between processes that are not supposed to be allowed to communicate
Wikipedia - Coxsackie Correctional Facility -- Maximum security state prison in New York, US
Wikipedia - Critical security studies
Wikipedia - Cross-site scripting -- Computer security vulnerability
Wikipedia - Cross-site tracing -- Network security vulnerability exploiting the HTTP TRACE method
Wikipedia - CrowdStrike -- American cybersecurity technology company
Wikipedia - Cryptek -- US information security company
Wikipedia - Cryptlib -- Open source software security toolkit library
Wikipedia - Crypto AG -- Swiss company specialising in communications and information security
Wikipedia - Cryptographic Module Validation Program -- Joint American-Canadian security accreditation program for cryptographic modules
Wikipedia - Cryptosystem -- Suite of cryptographic algorithms needed to implement a particular security service
Wikipedia - CUSIP -- Nine-character alphanumeric code that identifies a North American financial security
Wikipedia - Cyberbiosecurity
Wikipedia - Cyberoam -- Computer security company
Wikipedia - Cyber Peace Foundation -- Indian Cyber Security Nonprofit organization
Wikipedia - Cyber Security and Crime Division -- Branch of Bangladesh Police
Wikipedia - Cybersecurity and Infrastructure Security Agency -- United States federal agency
Wikipedia - Cybersecurity information technology list -- Wikimedia list article
Wikipedia - Cybersecurity Law of the People's Republic of China
Wikipedia - Cyber-security regulation
Wikipedia - Cyber security standards
Wikipedia - Cybersecurity standards
Wikipedia - Cyber Security
Wikipedia - Cyber security
Wikipedia - Cybersecurity
Wikipedia - Cynet (company) -- Cyber security company from Israel
Wikipedia - Danish Security and Intelligence Service
Wikipedia - DarkMatter (Emirati company) -- Cybersecurity company
Wikipedia - Database security
Wikipedia - Data center security -- Set of policies, precautions and practices to avoid unauthorized access and manipulation of a data center's resources
Wikipedia - Data-centric security
Wikipedia - Datagram Transport Layer Security -- Communications protocol; lets datagram-based applications communicate in a way designed to prevent eavesdropping, tampering, or message forgery
Wikipedia - Data security
Wikipedia - Datto (company) -- American cybersecurity and data backup company
Wikipedia - Dave Chalk (entrepreneur) -- Canadian technology entrepreneur, cyber security specialist, and media personality
Wikipedia - David Venable -- Cyber security professional
Wikipedia - DEA Office of National Security Intelligence
Wikipedia - Debt bondage -- Person's pledge of their labor or services as security for the repayment for a debt or other obligation
Wikipedia - Defense Counterintelligence and Security Agency
Wikipedia - Defense Security Cooperation Agency
Wikipedia - Defense Security Service
Wikipedia - Department for Protection and Security -- Security branch of the National Rally
Wikipedia - Department of Defense Information Assurance Certification and Accreditation Process -- Computer security process
Wikipedia - Department of Health and Social Security
Wikipedia - Department of Homeland Security appointments by Donald Trump -- Wikimedia list article
Wikipedia - Department of Homeland Security
Wikipedia - Department of State Security (South Africa)
Wikipedia - Department of the Navy Central Adjudication Facility -- U.S. armed forces information security organization
Wikipedia - Deputy Director of the National Security Agency
Wikipedia - DHS Office of Strategy, Policy, and Plans -- Department of homeland security for policy plan
Wikipedia - Directorate-General for External Security
Wikipedia - Directorate of Defence Intelligence and Security
Wikipedia - Director of the National Security Agency
Wikipedia - Dirty COW -- Computer security vulnerability
Wikipedia - Dodge Correctional Institution -- Maximum security prison in Wisconsin
Wikipedia - Domain Name System Security Extensions -- Suite of IETF specifications for securing certain kinds of information provided by DNS
Wikipedia - Dorothy E. Denning -- American information security researcher
Wikipedia - Downstate Correctional Facility -- A maximum-security prison in the Town of Fishkill in the Hudson Valley region of New York
Wikipedia - Draft:Brett Buerhaus -- American computer security researcher
Wikipedia - Draft:Cyber Secure Central -- International cybersecurity company
Wikipedia - Draft:Dr. Ananth Prabhu G -- Author | Cyber Law & Security Expert | Motivational Speaker
Wikipedia - Draft:Jacob Helberg -- American national security author, political philanthropist
Wikipedia - Draft:Verkada -- Cloud-based physical security startup
Wikipedia - Draft:Vincent Troia -- Computer security professional
Wikipedia - DSMA-Notice -- official request not to publish information for reasons of national security
Wikipedia - Dutch Military Intelligence and Security Service
Wikipedia - Eastern Sabah Security Zone -- Security zone in the Malaysian state of Sabah
Wikipedia - East Jersey State Prison -- Maximum-security prison in New Jersey
Wikipedia - Economic security
Wikipedia - Edward Snowden -- American whistleblower, former National Security Agency contractor
Wikipedia - EFAIL -- email security vulnerability
Wikipedia - ELearnSecurity Certified Professional Penetration Tester
Wikipedia - ELearnSecurity
Wikipedia - Elizabeth Neumann -- American security expert
Wikipedia - Elmira Correctional Facility -- Maximum security state prison in New York, US
Wikipedia - Emmanuel Yao Adzator -- Ghanaian security expert
Wikipedia - Emotional insecurity
Wikipedia - Emotional security
Wikipedia - Employees' State Insurance -- Self-financing social security and health insurance scheme for Indian workers
Wikipedia - Employment and Support Allowance -- British social security benefit
Wikipedia - Encyclopedia of Cryptography and Security -- Book by Technische Universiteit Eindhoven
Wikipedia - Endpoint security
Wikipedia - Energy Independence and Security Act of 2007 -- United States law
Wikipedia - Energy security and renewable technology
Wikipedia - Energy security -- National security considerations of energy availability
Wikipedia - Enterprise information security architecture
Wikipedia - Entity List -- List published by the Bureau of Industry and Security of businesses, research institutions, government and private organizations, individuals, and other types of legal persons subject to specific license requirements for the export, reexport and/or transfer of specified items
Wikipedia - Entropic security -- Concept in cryptography
Wikipedia - Erie County Holding Center -- Pre-trial, maximum security detention facility in New York, US
Wikipedia - Ernst Kaltenbrunner -- Austrian SS and chief of the Reich Main Security Office
Wikipedia - Estonian Internal Security Service
Wikipedia - EternalBlue -- Computer security exploit
Wikipedia - European Network and Information Security Agency
Wikipedia - European Union Agency for Cybersecurity -- Agency of the European Union
Wikipedia - European Union Maritime Security Strategy -- A maritime security strategy
Wikipedia - Evil maid attack -- Type of computer security breach
Wikipedia - Exploit (computer security)
Wikipedia - Exploit kit -- Collection of security exploit tools
Wikipedia - External Security Organisation
Wikipedia - Fabrizio Quattrocchi -- Italian security officer
Wikipedia - Fake security camera -- Empty
Wikipedia - Falih Al-Fayyadh -- Advisor of National Security Council
Wikipedia - FBI National Security Branch -- US FBI national security unit
Wikipedia - Federal Correctional Institution, Englewood -- Low-security United States federal prison for male inmates
Wikipedia - Federal Correctional Institution, Otisville -- Medium-security federal prison for male inmates located near Otisville, New York
Wikipedia - Federal Correctional Institution, Ray Brook -- Medium-security federal prison in New York, US
Wikipedia - Federal Office for Information Security
Wikipedia - Federal Security Service
Wikipedia - Felix von Leitner -- German IT security expert
Wikipedia - Finnish Security Intelligence Service
Wikipedia - Firewall (computing) -- Software or hardware-based network security system
Wikipedia - Firewalls and Internet Security
Wikipedia - Fishkill Correctional Facility -- Multi-security level prison in New York, US
Wikipedia - Five Points Correctional Facility -- Maximum security men's prison located in Romulus, New York
Wikipedia - Food insecurity among college students in the United States -- Hunger among American college students
Wikipedia - Food security during the COVID-19 pandemic -- Famines related to the pandemic caused by coronavirus disease 2019.
Wikipedia - Food security in Mozambique -- Security of food in the East African nation of Mozambique
Wikipedia - Food security in the Central Valley, California -- Widespread issue where most of the nation's agriculture is produced
Wikipedia - Food security -- Measure of availability and accessibility of food
Wikipedia - Foreign language anxiety -- feeling of unease and insecurity experienced in learning or using a foreign language
Wikipedia - Fortune Brands Home & Security -- American industrial company
Wikipedia - Frank Abagnale -- American security consultant, former confidence trickster, check forger, impostor, and escape artist
Wikipedia - Frank Garner -- American Chief of Police, security consultant, politician from Montana
Wikipedia - Franklin Correctional Facility -- Medium security state prison in New York, US
Wikipedia - F-Secure -- Finnish cyber security company
Wikipedia - Full disclosure (computer security) -- Policy in computer security
Wikipedia - G4S -- British multinational security services company
Wikipedia - Galveston National Laboratory -- High security National Biocontainment Laboratory
Wikipedia - Garda Crime and Security Branch
Wikipedia - Gemalto -- International digital security company
Wikipedia - General Directorate of General Security -- Lebanese intelligence agency
Wikipedia - General Intelligence and Security Service
Wikipedia - General Security Directorate (Iraq)
Wikipedia - General Security Directorate (Syria)
Wikipedia - Generic Security Services Application Program Interface
Wikipedia - German Aerospace Center -- Research center of the Federal Republic of Germany for aerospace and power engineering, transport and security
Wikipedia - Ghidra -- Free reverse engineering tool developed by the National Security Agency
Wikipedia - Ghost Security
Wikipedia - Global Health Security Index -- |Preparedness rating
Wikipedia - GlobalSecurity.org -- Think tank website focused on security issues
Wikipedia - Goatse Security -- Hacker group
Wikipedia - Gouverneur Correctional Facility -- Medium-security state prison for men located in New York, US
Wikipedia - Government Communications Security Bureau
Wikipedia - Gowanda Correctional Facility -- Medium-security state prison for men located in New York, US
Wikipedia - Great Meadow Correctional Facility -- Maximum-security state prison for men located in New York, US
Wikipedia - Green Haven Correctional Facility -- Maximum-security state prison for men located in New York, US
Wikipedia - Grid Security Infrastructure
Wikipedia - Groveland Correctional Facility -- Medium-security state prison for men located in New York, US
Wikipedia - Guardly -- Canadian security company
Wikipedia - Hacker (computer security)
Wikipedia - Halogen Group Nigeria -- Nigerian security company
Wikipedia - Hanwha Techwin -- South Korean electronics and security camera company
Wikipedia - Hardware security module
Wikipedia - Hardware security
Wikipedia - Hash function security summary -- Publicly known attacks against cryptographic hash functions
Wikipedia - Have I Been Pwned? -- Consumer security website and email alert system
Wikipedia - HBGary -- American cybersecurity company
Wikipedia - Heartbleed -- Security bug in OpenSSL
Wikipedia - High Tech Gays v. Defense Industrial Security Clearance Office -- U.S. legal case
Wikipedia - HM Prison Barwon -- Maximum security prison in Lara, Victoria, Australia
Wikipedia - Homeland Security Act
Wikipedia - Homeland Security Advisor
Wikipedia - Homeland Security Cybersecurity Boots-on-the-Ground Act -- Bill of the 113th United States Congress
Wikipedia - Homeland Security Distinguished Service Medal -- United States Homeland Security Department distinguished service medal
Wikipedia - Homeland Security (Egypt)
Wikipedia - Homeland security -- United States notion of safety from terrorism
Wikipedia - Home security -- Set of practices to protect homes against crime
Wikipedia - Hong Kong national security law -- Chinese legislation on national security in Hong Kong
Wikipedia - Howard Schmidt -- American computer security expert
Wikipedia - H. R. McMaster -- 26th United States National Security Advisor
Wikipedia - HTTP parameter pollution -- Web security vulnerability
Wikipedia - HTTP request smuggling -- Web security vulnerability
Wikipedia - HTTP Strict Transport Security -- HTTP response header field and associated policy
Wikipedia - Icelandic Coast Guard -- Maritime security branch of Iceland's military
Wikipedia - Identity-based security
Wikipedia - IEEE 802.11w-2009 -- Security amendment to IEEE 802.11 standard
Wikipedia - Imperva -- Provider of cyber and data security products
Wikipedia - Income Support -- British social security benefit
Wikipedia - Independent National Security Legislation Monitor -- Independent oversight body of the Australian Government
Wikipedia - Indian Coast Guard -- Maritime security agency of India's military
Wikipedia - Industrial espionage -- Use of espionage for commercial purposes rather than security
Wikipedia - Information and Security Service of the Republic of Moldova
Wikipedia - Information security awareness
Wikipedia - Information Security Group
Wikipedia - Information security operations center -- Facility where enterprise information systems are monitored, assessed, and defended
Wikipedia - Information Security Oversight Office
Wikipedia - Information Security
Wikipedia - Information security
Wikipedia - Information Systems Security Architecture Professional
Wikipedia - Information Systems Security Engineering Professional
Wikipedia - Information Systems Security Management Professional
Wikipedia - Information technology security audit
Wikipedia - Information theoretic security
Wikipedia - Information-theoretic security
Wikipedia - Institute for Science and International Security
Wikipedia - Institute for Social Security and Services for State Workers -- Mexican public health system
Wikipedia - Intelligence and Security Committee Russia report -- UK government investigation into allegations of Russian interference in British politics
Wikipedia - Intelligence and Security Service of the Ministry of Defence (Slovenia)
Wikipedia - Intelligence cycle security
Wikipedia - Intelligence-Security Agency of Bosnia and Herzegovina
Wikipedia - Intel Security
Wikipedia - Interagency Security Classification Appeals Panel
Wikipedia - Internal Security Act, 1982
Wikipedia - Internal Security Act (Singapore) -- Statute of the Parliament of Singapore
Wikipedia - Internal Security Agency
Wikipedia - Internal Security Department (Brunei)
Wikipedia - Internal Security Department (Singapore)
Wikipedia - Internal Security Forces
Wikipedia - Internal Security Operations Command
Wikipedia - Internal Security Organisation
Wikipedia - Internal Security Service
Wikipedia - International Criminal Tribunal for Rwanda -- International court established by the United Nations Security Council in Resolution 955
Wikipedia - International Maritime Security Construct -- Consortium
Wikipedia - International Peace and Security Institute -- Nonprofit organization
Wikipedia - International Securities Identification Number -- Identifier for a security
Wikipedia - International Security Assistance Force -- NATO-led security mission in Afghanistan, 2001-14
Wikipedia - International Security
Wikipedia - Internet Resource Locator -- Bank layers of security
Wikipedia - Internet safety -- Being aware of safety and security risks on the Internet
Wikipedia - Internet Security Research Group -- Californian public-benefit corporation which focuses on Internet security
Wikipedia - Internet Security Systems
Wikipedia - Internet security -- Branch of computer security specifically related to Internet, often involving browser security and the World Wide Web
Wikipedia - Invention Secrecy Act -- United States national security law
Wikipedia - Iranian Security Police
Wikipedia - Ishaq ibn Ibrahim al-Mus'abi -- Chief of security in Baghdad
Wikipedia - ISO 22322 -- International security standard
Wikipedia - ISO 22398 -- Security exercise standards
Wikipedia - ISO/IEC 27001 -- Information security standard
Wikipedia - ITF Enhancing Human Security -- Non profit humanitarian organization
Wikipedia - IT security
Wikipedia - Itzhak Ilan -- Israeli security official
Wikipedia - Jacob Appelbaum -- American computer security researcher and journalist (born 1 April 1983)
Wikipedia - James Dolan (computer security expert) -- American computer security expert, co-developed SecureDrop
Wikipedia - James Giermanski -- American security specialist
Wikipedia - James Kennedy (security guard) -- Scottish security guard posthumously awarded the George Cross
Wikipedia - James L. Jones -- US Marines Commandant and National Security Advisor
Wikipedia - James Loy -- Commandant of the U.S. Coast Guard and Deputy Secretary of Homeland Security
Wikipedia - Jamie Foxx: I Might Need Security -- 2002 stand-up comedy television special
Wikipedia - Janet Napolitano -- Third United States Secretary of Homeland Security
Wikipedia - Jason Harrington -- American writer and former Transportation Security Administration employee
Wikipedia - Jaya Baloo -- Dutch cybersecurity expert
Wikipedia - Jealousy -- Emotion referring to the thoughts and feelings of insecurity, fear, and envy over relative lack of possessions, status or something of great personal value
Wikipedia - Joanna Rutkowska -- Polish hacker and computer security expert
Wikipedia - Job security -- An assurance that an individual is likely to retain employment, with relatively low chance of becoming unemployed
Wikipedia - Jobseeker's Allowance -- British social security benefit
Wikipedia - John Black (cryptographer) -- American cryptographer and security researcher
Wikipedia - John Bolton -- 27th United States National Security Advisor, lawyer, and diplomat
Wikipedia - Johnny Long -- American computer security expert
Wikipedia - Johns Hopkins Center for Health Security -- Organization
Wikipedia - Joint Security Area (film) -- 2000 South Korean mystery thriller by Park Chan-wook
Wikipedia - Joint Security Area -- Portion of the Korean Demilitarized Zone (DMZ) where North and South Korean forces stand face-to-face
Wikipedia - Jon Callas -- American computer security expert
Wikipedia - Joseph V. Cuffari -- Inspector General of the U.S. Department of Homeland Security
Wikipedia - Jump server -- A computer on a network used to access a separate security zone
Wikipedia - Kaliti Prison -- maximum security prison in Ethiopia
Wikipedia - Kaspersky Lab -- Russian multinational cybersecurity and anti-virus provider
Wikipedia - Katie Moussouris -- American computer security researcher, entrepreneur, and pioneer in vulnerability disclosure
Wikipedia - Katrina Leung -- FBI Informant and PRC Ministry of State Security (MSS) agent
Wikipedia - Kazakhstan man-in-the-middle attack -- State-actor security exploit by the government of Kazakhstan
Wikipedia - Kentucky State Penitentiary -- Maximum security prison located at Eddyville, Kentucky
Wikipedia - Kerdasa massacre -- The killing of eleven security personnel in August 2013 in a town in Giza
Wikipedia - Keren Elazari -- Cybersecurity expert
Wikipedia - Kevin Mitnick -- American computer security consultant, author, convicted criminal, and hacker
Wikipedia - KGB -- Main security agency for the Soviet Union
Wikipedia - Kingston Penitentiary -- Canadian maximum security prison
Wikipedia - Kirstjen Nielsen -- 6th United States Secretary of Homeland Security
Wikipedia - Knesset Guard -- Israeli protective security unit
Wikipedia - KOBIL Systems -- German information security company
Wikipedia - Kr00k -- Security vulnerability affecting WiFi traffic
Wikipedia - Kratos Defense & Security Solutions -- U.S. military contractor
Wikipedia - Kyle Milliken -- American computer hacker and security consultant
Wikipedia - LAN Manager -- Depreciated Microsoft networking system with broken security
Wikipedia - Lawal Musa Daura -- Nigerian security agent
Wikipedia - Lawfare (blog) -- U.S. national security blog
Wikipedia - Lawrence Ward (serjeant-at-arms) -- British security expert
Wikipedia - Lazy FP state restore -- Intel processor security vulnerability
Wikipedia - Lebanese State Security
Wikipedia - Lee S. Wolosky -- American National Security Council staffer and lawyer
Wikipedia - LetsTrack -- India-based global security service company
Wikipedia - Lightweight Portable Security
Wikipedia - Lincoln Correctional Facility -- Minimum-security state prison for men located in New York, US
Wikipedia - Linguistic insecurity -- lack of confidence about one's way of speaking
Wikipedia - Linux Security Modules
Wikipedia - List of Afghan security forces fatality reports in Afghanistan -- Wikipedia list article
Wikipedia - List of computer security certifications
Wikipedia - List of Iraqi security forces fatality reports in Iraq -- Wikipedia list article
Wikipedia - List of private security companies -- Wikipedia list article
Wikipedia - List of security assessment tools -- Wikipedia list article
Wikipedia - List of security hacking incidents -- Wikipedia list article
Wikipedia - List of United Nations Security Council resolutions on the Nagorno-Karabakh conflict
Wikipedia - List of vetoed United Nations Security Council resolutions -- Wikipedia list article
Wikipedia - Livingston Correctional Facility -- Former medium-security state prison in New York, US
Wikipedia - Load value injection -- Microprocessor security vulnerability
Wikipedia - Local Security Authority Subsystem Service
Wikipedia - Lock (security device)
Wikipedia - Louisiana State Penitentiary -- Maximum-security prison farm in Louisiana
Wikipedia - Mac Defender -- Rogue security software
Wikipedia - MAC flooding -- Technique employed to compromise the security of network switches
Wikipedia - Magic Alex -- Greek businessman, electronics engineer and security consultant
Wikipedia - Maire O'Neill -- Northern Irish academic (engineering, information security)
Wikipedia - Man-in-the-browser -- Proxy Trojan horse that infects a web browser by taking advantage of vulnerabilities in browser security to modify web pages, modify transaction content or insert additional transactions, in a covert fashion
Wikipedia - Mantrap (access control) -- Physical security access control system
Wikipedia - Marcus Hutchins -- British IT security researcher and expert
Wikipedia - Marcy Correctional Facility -- Medium-security state prison for men located in New York, US
Wikipedia - Maritime domain awareness -- The effective understanding of anything associated with the maritime domain that could impact security, safety, economy, or environment
Wikipedia - Maritime security (USCG) -- United States Coast Guard
Wikipedia - Matthew Seiyefa -- Nigerian security agent
Wikipedia - Maximum Security (horse) -- American Thoroughbred racehorse
Wikipedia - McAfee -- American global computer security software company
Wikipedia - McCarran Internal Security Act
Wikipedia - Meltdown (security vulnerability) -- Microprocessor security vulnerability
Wikipedia - Melvin Goodman -- American national security and intelligence expert
Wikipedia - Metasploit Project -- Computer security testing tool
Wikipedia - Mexican Social Security Institute -- Mexican social welfare institution
Wikipedia - Michael Patrick Mulroy -- Senior National Security Official
Wikipedia - Michael Reiter (police officer) -- American security advisor and former Palm Beach, Florida, police chief
Wikipedia - Microsoft Baseline Security Analyzer -- Computer security evaluation tool
Wikipedia - Microsoft Forefront -- Line-of-business security software by Microsoft Corporation
Wikipedia - Microsoft Security Essentials -- Free antivirus product produced by Microsoft for the Windows operating system
Wikipedia - Mid-Orange Correctional Facility -- Former medium-security state prison for men located in New York, US
Wikipedia - Military Security Agency
Wikipedia - Military Security and Intelligence Agency
Wikipedia - Military Service for Security and Intelligence
Wikipedia - Military Staff Committee -- United Nations Security Council subsidiary body
Wikipedia - Milton Smith -- American computer security application developer, researcher, and writer
Wikipedia - Minister of Justice and Public Security -- Norwegian cabinet position
Wikipedia - Minister of National Security and Intelligence (New Zealand) -- New Zealand minister of the Crown
Wikipedia - Minister of Public Security (Vietnam) -- Government minister in Vietnam
Wikipedia - Minister of Safety and Security v Luiters (SCA) -- South African Supreme Court of Appeal case
Wikipedia - Ministry for National Security (Turkmenistan)
Wikipedia - Ministry for State Security (Soviet Union)
Wikipedia - Ministry of Defence and National Security (Fiji) -- Ministry of Fiji
Wikipedia - Ministry of Defence (Brunei) -- Bruneian government ministry responsible for military and national security
Wikipedia - Ministry of Home Security -- Former British government department
Wikipedia - Ministry of Internal Affairs (Russia) -- Russian government ministry responsible for security and law enforcement within Russian borders
Wikipedia - Ministry of Justice and Public Security (Brazil) -- Justice ministry of Brazil
Wikipedia - Ministry of Justice, Immigration and National Security (Dominica) -- Government ministry of Dominica
Wikipedia - Ministry of National Security of Azerbaijan
Wikipedia - Ministry of Public Safety and Security -- Former organization of the national government of South Korea
Wikipedia - Ministry of Security and Public Administration -- Former ministry of the national government of South Korea
Wikipedia - Ministry of Social Security (North Korea) -- North Korean Law Enforcement Agency
Wikipedia - Ministry of State Security (China)
Wikipedia - Ministry of State Security (Soviet Union)
Wikipedia - Minnesota Correctional Facility - Oak Park Heights -- Maximum security prison in Minnesota, United States
Wikipedia - Mississippi State Penitentiary -- maximum-security prison farm in Mississippi, USA
Wikipedia - Mitama Security: Spirit Busters -- Japanese manga series by Tsurun Hatomune
Wikipedia - Mobile Security Deployment -- Police unit of the US State Department
Wikipedia - Mobile security -- Security risk and prevention for mobile devices
Wikipedia - Mohammed Masoom Stanekzai -- Former head of National Directorate of Security
Wikipedia - Molly O'Toole -- American immigration and security reporter
Wikipedia - Monique Marie Chouraeshkenazi -- American-Jewish author, professor, researcher, and homeland/national security expert
Wikipedia - Month of bugs -- Strategy used by security researchers
Wikipedia - Montreux Document -- Agreement between signature countries obligations regarding private military and security companies in war zones
Wikipedia - Muhammad ibn Ishaq ibn Ibrahim -- Chief of security in Baghdad
Wikipedia - Muhammad Mustapha Abdallah -- Nigerian Professional Security Officer
Wikipedia - Multilevel security
Wikipedia - Munich Security Conference -- Annual conference on international security policy
Wikipedia - MVM, Inc. -- Private security contractor
Wikipedia - MyGate -- Security software
Wikipedia - Nadia Heninger -- American cryptographer, computer security expert
Wikipedia - Naked short selling -- Practice of short-selling a tradable asset of any kind without first borrowing the security or ensuring that the security can be borrowed
Wikipedia - National Committee on Security Affairs -- Highest policy-making authority on national security of Bangladesh
Wikipedia - National Computer Security Center
Wikipedia - National Counterintelligence and Security Center -- US federal agency
Wikipedia - National Cybersecurity Authority (Saudi Arabia) -- Cybersecurity entity of the government of Saudi Arabia
Wikipedia - National Cybersecurity Center -- US non-profit organization
Wikipedia - National Cyber Security Centre (United Kingdom) -- Organisation of the UK Government
Wikipedia - National Cyber Security Division
Wikipedia - National Cyber Security Hall of Fame
Wikipedia - National Cybersecurity Hall of Fame
Wikipedia - National Cyber Security Policy 2013
Wikipedia - National Directorate of Security
Wikipedia - National Industrial Security Academy -- CISF institute
Wikipedia - National Infrastructure Security Co-ordination Centre -- Inter-departmental centre of the UK government
Wikipedia - National Intelligence and Security Agency
Wikipedia - National Intelligence and Security Service
Wikipedia - National Organization of Social Security Claimants' Representatives -- American law association
Wikipedia - National Police Agency Security Bureau (Japan)
Wikipedia - National Public Security Force -- Police in Brazil
Wikipedia - National Security (2003 film) -- 2003 film by Dennis Dugan
Wikipedia - National Security Adviser (United Kingdom) -- Official in the British government
Wikipedia - National Security Advisor (United States) -- White House advisory position
Wikipedia - National security advisor -- Wikipedia disambiguation page
Wikipedia - National Security Affairs Cell -- Government agency of Bangladesh
Wikipedia - National Security Agency (Bahrain)
Wikipedia - National Security Agency (disambiguation)
Wikipedia - National Security Agency (Egypt) -- Egyptian security service
Wikipedia - National Security Agency (Liberia)
Wikipedia - National Security Agency (Montenegro)
Wikipedia - National Security Agency -- U.S. signals intelligence organization
Wikipedia - National Security and Homeland Security Presidential Directive -- American directive
Wikipedia - National Security Archive
Wikipedia - National Security Bureau (Republic of China)
Wikipedia - National Security Bureau (Taiwan)
Wikipedia - National Security Committee of the Republic of Kazakhstan
Wikipedia - National Security Council Intelligence Directives
Wikipedia - National Security Council (Pakistan)
Wikipedia - National Security Council (United Kingdom) -- British government Cabinet committee
Wikipedia - National Security Council -- Body responsible for coordinating policy on national security issues
Wikipedia - National Security Directive
Wikipedia - National Security Education Program -- US federal government initiative
Wikipedia - National Security Guard -- Indian counter-terrorism unit
Wikipedia - National Security Intelligence
Wikipedia - National Security Law of the People's Republic of China -- Chinese law
Wikipedia - National security of China
Wikipedia - National security of the United States
Wikipedia - National Security Operations Center
Wikipedia - National Security Service (Armenia)
Wikipedia - National Security Service (Maldives)
Wikipedia - National Security Service (Uzbekistan)
Wikipedia - National Security Space Launch -- Expendable launch system program of the United States Space Force
Wikipedia - National security -- Security and defense of a nation state
Wikipedia - Naveed Jamali -- American national security commentator
Wikipedia - NetTop -- National Security Agency project
Wikipedia - Network Lateral Movement -- Cybersecurity term for attack strategies
Wikipedia - Network Security Services
Wikipedia - Network Security Toolkit
Wikipedia - Network Security
Wikipedia - Network security -- Computer network access control
Wikipedia - New Look (policy) -- US national security policy
Wikipedia - New Zealand Security Intelligence Service
Wikipedia - NIST Cybersecurity Framework
Wikipedia - Norton Internet Security -- Computer protection software
Wikipedia - Norwegian Police Security Service
Wikipedia - NT LAN Manager -- Suite of Microsoft security protocols for authentication, integrity, and confidentiality
Wikipedia - NTLMSSP -- Binary messaging protocol used by the Microsoft Security Support Provider Interface
Wikipedia - Nuctech Company -- Chinese security products company
Wikipedia - Oak Ridge gatehouses -- Historic security checkpoints in Oak Ridge, TN, US
Wikipedia - Offensive Security Certified Professional -- Ethical hacking certification by Offensive Security
Wikipedia - Offensive Security -- American international information security company
Wikipedia - Office for Safeguarding National Security of the CPG in the HKSAR -- An organ of the Central People's Government (State Council) of China in Hong Kong
Wikipedia - Office for Transportation Security -- Agency of the Philippine government
Wikipedia - Office of National Security -- South Korean ministry
Wikipedia - Ogdensburg Correctional Facility -- Medium-security state prison for male prisoners, located in New York, US
Wikipedia - Old Age Security -- Canadian pension program
Wikipedia - Olivia Troye -- American National Security expert
Wikipedia - OneSpan -- American cybersecurity technology company
Wikipedia - ONVIF -- Industry forum facilitating the development and use of standard IP-based security products
Wikipedia - OpenBSD security features
Wikipedia - OpenBSD -- Security-focused Unix-like operating system
Wikipedia - Open security
Wikipedia - Open Source Security Foundation
Wikipedia - Open-source software security
Wikipedia - Operation Amotekun -- Security outfit in South Western, Nigeria
Wikipedia - Operation Coldstore -- Covert security operation in Singapore
Wikipedia - Operation Spectrum -- Covert security operation in Singapore
Wikipedia - Operation Vaksince -- Military operation by Macedonian security forces
Wikipedia - Oppenheimer security hearing -- 1954 United States Atomic Energy Commission investigation
Wikipedia - Organization for Security and Cooperation in Europe
Wikipedia - Organization for Security and Co-operation in Europe -- Security-oriented intergovernmental organization
Wikipedia - Orleans Correctional Facility -- Medium-security state prison for male prisoners, located in New York, US
Wikipedia - Otisville Correctional Facility -- Medium-security state prison located in New York, US
Wikipedia - Outline of computer security
Wikipedia - Paladin Group (security company) -- Southeast Asian military contractor
Wikipedia - Palestinian Naval Police -- naval component of the Palestinian National Security Forces
Wikipedia - Palestinian Preventive Security -- Security apparatus of Palestine
Wikipedia - Panamanian Public Forces -- National security force of Panama
Wikipedia - Panic selling -- The sudden, widespread selling of a security based on fear rather than reasoned analysis causing its price to drop
Wikipedia - Park police -- Type of security police
Wikipedia - Parliament Security Services -- Law enforcement agency in India
Wikipedia - Paul Erasmus -- South African Security Police officer
Wikipedia - Paul Joyal -- American security analyst
Wikipedia - Payment Card Industry Data Security Standard -- Set of security requirements for credit card processors
Wikipedia - Penetration test -- Method of evaluating computer and network security by simulating a cyber attack
Wikipedia - People's Commissariat for State Security -- Soviet secret police agency
Wikipedia - Personal Internet Security 2011 -- 21st century malware
Wikipedia - Personal security
Wikipedia - Personnel Security Research Center -- Agency of the United States Department of Defense
Wikipedia - Peter J. Brown -- American homeland security advisor
Wikipedia - Phedra Clouner -- Belgian cybersecurity professional
Wikipedia - Philippine House Committee on National Defense and Security -- Standing committee of the House of Representatives of the Philippines
Wikipedia - Philippine House Special Committee on Food Security -- Special committee of the House of Representatives of the Philippines
Wikipedia - Philippine Senate Committee on National Defense and Security, Peace, Unification and Reconciliation -- Standing committee of the Senate of the Philippines
Wikipedia - Physical information security
Wikipedia - Physical security
Wikipedia - Pierlucio Tinazzi -- Italian security guard
Wikipedia - Pinkerton (detective agency) -- Private security guard and detective agency in the United States
Wikipedia - Police and Security News -- American magazine
Wikipedia - Police/Worlds: Studies in Security, Crime and Governance -- Series of monographs
Wikipedia - Political Movement for Social Security -- Political party in Colombia
Wikipedia - Pradhan Mantri Garib Kalyan Anna Yojana -- India's food security program for the poor
Wikipedia - Presidency of State Security
Wikipedia - President's Medal for Shooting (Rhodesia) -- Medal awarded to the Champion chost of the Rhodesian Security Forces
Wikipedia - Principles of Information Security -- Textbook
Wikipedia - Private military company -- company providing armed combat or security services
Wikipedia - Progressive Internationalism: A Democratic National Security Strategy -- Proposed national security policy report
Wikipedia - Prohibited airspace -- Airspace within which flight of aircraft is not allowed, usually due to security concerns
Wikipedia - Proliferation Security Initiative -- Global initiative to stop trafficking of weapons of mass destruction
Wikipedia - Protecting American Communities Task Force -- Part of the US Department of Homeland Security
Wikipedia - Protective Security Command -- Singapore counter terrorism police unit
Wikipedia - Provable security
Wikipedia - Public Facilities Privacy & Security Act -- Act passed in the U.S. state of North Carolina in 2016
Wikipedia - Public Security Directorate -- Police agency of Jordan
Wikipedia - Public Security Intelligence Agency -- Japanese intelligence agency
Wikipedia - Public Security Section 9 -- Fictional intelligence department
Wikipedia - Public transport security
Wikipedia - Qatar State Security
Wikipedia - Q clearance -- U.S. Dept. of Energy security clearance level
Wikipedia - Quadrilateral Security Dialogue -- Informal strategic forum between the US, Japan, India and Australia
Wikipedia - Qualys -- American web security company
Wikipedia - Qubes OS -- Security-focused Linux-based operating system
Wikipedia - RAF Regiment -- Force security element of Royal Air Force
Wikipedia - Railway Nirapatta Bahini -- Security force for Bangladesh Railway
Wikipedia - Railway Protection Force -- Indian security force
Wikipedia - Rajesh De -- American lawyer, former White House Staff Secretary and General Counsel to the U.S. National Security Agency.
Wikipedia - Raymond H. A. Carter -- French soldier and security consultant
Wikipedia - Rebecca Bace -- American computer security expert
Wikipedia - Rebecca Katz -- American biosecurity scientist
Wikipedia - Rebecca Mercuri -- American expert in computer security
Wikipedia - Regions and Powers: The Structure of International Security -- 2003 book by Barry Buzan and Ole Waever
Wikipedia - Republican Guard (Ethiopia) -- Protective security unit in Ethiopia
Wikipedia - Resource Access Control Facility -- Standard security product included in the z/OS operating system
Wikipedia - Reverse-path forwarding -- Multicast routing technique to minimize loops and enhance security
Wikipedia - Ring (company) -- Home security products manufacturer
Wikipedia - Ring (computer security)
Wikipedia - Riptech -- Network security company
Wikipedia - Riverview Correctional Facility -- Medium-security state prison for male prisoners, located in New York, US
Wikipedia - Rob Bertholee -- Head of the General Intelligence and Security Service (2011-2018)
Wikipedia - Robert C. O'Brien -- US National Security Advisor
Wikipedia - Robert C. Seacord -- American computer security expert
Wikipedia - Robert N. Rose -- American cybersecurity expert
Wikipedia - Rogue security software
Wikipedia - RSA Data Security
Wikipedia - RSA Security -- American computer security company
Wikipedia - Rubicon International Services -- British security company
Wikipedia - Ruger Security-Six -- American revolver
Wikipedia - Ryan Maness -- American cybersecurity expert
Wikipedia - Sadie Creese -- British cybersecurity specialist
Wikipedia - Salah Mohammed Tubaigy -- Professor in the criminal evidence department at Naif Arab University for Security Sciences; head of the Saudi Scientific Council of Forensics
Wikipedia - Sam Curry -- American computer security researcher
Wikipedia - Same-origin policy -- Security measure for client-side scripting
Wikipedia - SAML 2.0 -- XML-based protocol for exchanging authentication and authorization identities between security domains
Wikipedia - SAML-based products and services -- List of computer security products using Security Assertion Markup Language
Wikipedia - Samsung Knox -- Security features in Samsung smartphones.
Wikipedia - Sandbox (computer security) -- Computer security mechanism for isolating running programs from each other in a highly controlled environment
Wikipedia - Sarah Gordon -- Computer security researcher
Wikipedia - SAVAK -- Secret police, domestic security and intelligence service in Iran during the reign of the Pahlavi dynasty
Wikipedia - Schizoglossia -- linguistic insecurity about one's native language
Wikipedia - Secretariat of Security and Civilian Protection (Mexico) -- Mexican cabinet-level government agency
Wikipedia - Secretary of State for Social Security (Spain) -- Official of the Ministry of Inclusion, Social Security and Migration of the Government of Spain
Wikipedia - Secure Real-time Transport Protocol -- Security profile for Real-time Transport Protocol
Wikipedia - Securitas Direct -- A security company based in Malmo, Sweden
Wikipedia - Security Account Manager -- Windows database that stores users' passwords
Wikipedia - Security Accounts Manager
Wikipedia - Security Administrator Tool for Analyzing Networks -- vulnerability scanner for networks
Wikipedia - Security alarm -- A system that detects unauthorised entry
Wikipedia - Security Analysis (book) -- 1934 book by Benjamin Graham
Wikipedia - Security and Intelligence Agency
Wikipedia - Security and Intelligence Division
Wikipedia - Security and Intelligence Services (India) -- Indian private security company
Wikipedia - Security and Maintenance -- Microsoft Windows software
Wikipedia - Security and Privacy in Computer Systems
Wikipedia - Security Assertion Markup Language -- XML-based format and protocol for exchanging authentication and authorization data between parties
Wikipedia - Security Bank -- Bank in the Philippines
Wikipedia - Security blanket
Wikipedia - Security breaches
Wikipedia - Security breach notification laws
Wikipedia - Security breach
Wikipedia - Security BSides
Wikipedia - Security bugs
Wikipedia - Security bug
Wikipedia - Security camera
Wikipedia - Security clearance -- Status granted to individuals allowing them access to classified information or to restricted areas
Wikipedia - Security company
Wikipedia - Security Consultancy Wing -- Consultancy wing of the CISF
Wikipedia - Security culture
Wikipedia - Security descriptor
Wikipedia - Security detail -- Protective team assigned to an individual or group
Wikipedia - Security Development Lifecycle
Wikipedia - Security dilemma
Wikipedia - Security engineering
Wikipedia - Security-Enhanced Linux -- Linux kernel security module
Wikipedia - Security-evaluated operating system
Wikipedia - Security (finance)
Wikipedia - Security-focused operating system
Wikipedia - Security Forces Command -- Military of Northern Cyprus
Wikipedia - Security hacker -- Computer security term; someone who hacks computer systems
Wikipedia - Security Identifier
Wikipedia - Security Industry Association -- U.S. trade association
Wikipedia - Security information and event management -- Computer security
Wikipedia - Security information management
Wikipedia - Security Information Service
Wikipedia - Security Intelligence Agency
Wikipedia - Security in the Persian Gulf Region -- 2016 book by Fatemeh Shayan
Wikipedia - Security kernel -- telecommunication term
Wikipedia - Security level -- Measure of cryptographic strength
Wikipedia - Security management
Wikipedia - Security of Information Act -- An Act of the Parliament of Canada addressing national security
Wikipedia - Security of King and Government Act 1695 -- Act of the Parliament of England
Wikipedia - Security Pacific Bank -- United States bank
Wikipedia - Security Paper Mill -- Iranian government secure paper mill
Wikipedia - Security patch
Wikipedia - Security police
Wikipedia - Security Printing and Minting Organization -- Iranian mint, subsidiary of the Central Bank of Iran
Wikipedia - Security printing
Wikipedia - Security protocol
Wikipedia - Security Service of Ukraine
Wikipedia - Security service (telecommunication)
Wikipedia - Security Support Provider Interface
Wikipedia - Security switch -- Hardware device to protect computers, laptops, smartphones and similar devices from unauthorized access or operation
Wikipedia - Security testing
Wikipedia - Security theater -- Security measures that are mostly for show
Wikipedia - Security thread -- Security feature of banknotes
Wikipedia - Security through obscurity -- Reliance on design or implementation secrecy for security
Wikipedia - Security token -- Device used to access electronically restricted resource
Wikipedia - Security+
Wikipedia - Security -- Degree of resistance to, or protection from, harm
Wikipedia - Separation of protection and security
Wikipedia - Shannon security
Wikipedia - Shawangunk Correctional Facility -- Maximum-security state prison for male prisoners, located in New York, US
Wikipedia - Shellshock (software bug) -- Security bug in the Unix Bash shell discovered in 2014
Wikipedia - Shield Group Security -- Former Iraqi security company
Wikipedia - Shin Bet -- Israel's internal security service
Wikipedia - Sicherheitspolizei -- State security police of Nazi Germany
Wikipedia - SigSpoof -- Security vulnerabilities that affected GNU Privacy Guard
Wikipedia - Silovik -- Post-communist Russian politician with background in intelligence, security or military forces
Wikipedia - Silvio Cesare -- Australian security researcher
Wikipedia - Simon (cipher) -- Family of lightweight block ciphers publicly released by the National Security Agency (NSA) in June 2013
Wikipedia - Simple Authentication and Security Layer -- Framework for authentication and data security in Internet protocols
Wikipedia - SimpliSafe -- American home security company
Wikipedia - Single-tranche CDO -- Complex derivative financial security
Wikipedia - Sing Sing -- US maximum security prison
Wikipedia - Situation Room (photograph) -- Photo of U.S. national security officials during Operation Neptune Spear
Wikipedia - Slovenian Intelligence and Security Agency
Wikipedia - Slowloris (computer security)
Wikipedia - Smack (Linux security module)
Wikipedia - SMBGhost (security vulnerability) -- security vulnerability
Wikipedia - Social Affairs and Social Security Committee (Iceland) -- Standing committee of the Icelandic parliament
Wikipedia - Social engineering (computer security)
Wikipedia - Social engineering (security) -- Psychological manipulation of people into performing actions or divulging confidential information
Wikipedia - Social Security Administration -- Independent agency of the U.S. federal government
Wikipedia - Social Security Contributions and Benefits Act 1992 -- United Kingdom legislation
Wikipedia - Social Security Death Index -- Database of American death records
Wikipedia - Social Security Disability Insurance
Wikipedia - Social security in Australia -- Welfare payments provided by the Australian Government
Wikipedia - Social security in Germany -- Includes all statutory insurance in Germany
Wikipedia - Social security in Spain
Wikipedia - Social Security Number
Wikipedia - Social security number
Wikipedia - Social Security number -- Nine-digit number issued to U.S. citizens and permanent residents
Wikipedia - Social Security Tribunal of Canada -- Canadian tribunal
Wikipedia - Social Security (United States) -- American system of social security
Wikipedia - Social security
Wikipedia - Software development security
Wikipedia - Software Guard Extensions -- Security-related instruction code processor extension
Wikipedia - Software security
Wikipedia - Solange Ghernaouti -- Swiss academic, international expert in cybersecurity and cyber defence
Wikipedia - Southern Ohio Correctional Facility -- Maximum security prison in Scioto County, Ohio, U.S.
Wikipedia - Soviet security services
Wikipedia - Special Security Directorate -- Anti-communist division of the Hellenic Gendarmerie (1929-1944)
Wikipedia - Special Security Unit -- Pakistani counter-terrorism agency
Wikipedia - Spectra Cyber Security Solutions Trophy Handicap Chase -- Steeplechase horse race in Britain
Wikipedia - Spectre (security vulnerability) -- processor security vulnerability
Wikipedia - Speculative Store Bypass -- processor security vulnerability
Wikipedia - Spoiler (security vulnerability) -- Security vulnerability on CPUs that use speculative execution
Wikipedia - Spot contract -- Contract to buy or sell a commodity, security or currency for immediate settlement
Wikipedia - Sri Lanka Civil Security Force -- National Home Guard Service
Wikipedia - Standish Maximum Correctional Facility -- Closed Michigan Department of Corrections maximum security prison in Standish, MI
Wikipedia - Stasi -- State security service of East Germany
Wikipedia - Stateful firewall -- Connection tracking network security system
Wikipedia - State Security Administration (Yugoslavia) -- Secret police organization of Yugoslavia
Wikipedia - State Security Agency (South Africa)
Wikipedia - State Security Committee of the Republic of Belarus
Wikipedia - State Security Council
Wikipedia - State Security Department of Lithuania
Wikipedia - State Security Department
Wikipedia - State Security Investigations Service -- Former security agency in Egypt
Wikipedia - State Security Service (Azerbaijan)
Wikipedia - State Security Service (Belgium)
Wikipedia - State Security Service (Nigeria)
Wikipedia - State Special Communications Service of Ukraine -- Technical security and intelligence service of Ukraine
Wikipedia - Stateville Correctional Center -- Maximum security prison near Joliet, IL
Wikipedia - Stealth Key -- 3D metal printed security key
Wikipedia - Stefano Fratepietro -- Italian IT Security Expert
Wikipedia - Stephen Kent (network security)
Wikipedia - Steve Gibson (computer programmer) -- Computer enthusiast, software engineer and security researcher
Wikipedia - Stig Bergling -- Swedish Security Service officer
Wikipedia - Sullivan Correctional Facility -- Maximum-security state prison for male prisoners, located in New York, US
Wikipedia - Supplemental Security Income -- United States government program that provides stipends to low-income people who are either aged 65 or older, blind, or disabled
Wikipedia - Surajit Kar Purkayastha -- State Security Advisor of West Bengal and former Indian police officer
Wikipedia - Susan Rice -- 24th United States National Security Advisor
Wikipedia - Swedish Military Intelligence and Security Service
Wikipedia - Swedish Security Service
Wikipedia - Systems Security Certified Practitioner
Wikipedia - Taconic Correctional Facility -- Medium-security state prison for female prisoners, located in New York, US
Wikipedia - Tahnoun bin Zayed Al Nahyan (national security advisor) -- National Security Advisor of UAE
Wikipedia - Tamperproofing -- Any technique used to hinder, deter or detect unauthorised access to a device or circumvention of a security system
Wikipedia - Tarah Wheeler -- American cybersecurity executive and diversity activist
Wikipedia - Tavis Ormandy -- English-born computer security analyst known for detecting high-risk vulnerabilities in software
Wikipedia - Template talk:Information Security Certifications
Wikipedia - Template talk:Information security
Wikipedia - Template talk:Object-capability security
Wikipedia - Tenable, Inc. -- Cybersecurity company
Wikipedia - Tennessee Department of Safety and Homeland Security -- Government agency in Tennessee, United States
Wikipedia - Terje Rod-Larsen -- Terje Rod-Larsen - Special Envoy of the Secretary-General for the implementation of Security Council resolution 1559/2004
Wikipedia - The Code On Social Security, 2020 -- Act of Indian Parliament
Wikipedia - Threat actor -- Cybersecurity term
Wikipedia - Thriller (viral video) -- 2007 viral video featuring the CPDRC Dancing Inmates of a high-security penitentiary
Wikipedia - Thunderspy -- security vulnerability
Wikipedia - Time-based One-Time Password -- Security algorithm which generates a unique value based on time
Wikipedia - Timeline of computer security hacker history
Wikipedia - Title 6 of the United States Code -- United States Code title that governs Domestic Security
Wikipedia - T. M. Jobaer -- Director General of National Security Intelligence of Bangladesh
Wikipedia - Tokenization (data security) -- Concept in data security
Wikipedia - Tokyo Metropolitan Police Department Public Security Bureau
Wikipedia - Tom Ridge -- American politician, Pennsylvania governor and first Secretary of Homeland Security
Wikipedia - Transportation Security Administration -- United States federal government agency
Wikipedia - Transport Layer Security -- Cryptographic protocols for securing data in transit
Wikipedia - Trend Micro Internet Security
Wikipedia - Trend Micro -- International cyber security company
Wikipedia - Troy Hunt -- Australian web security expert
Wikipedia - Truman National Security Project -- Left-leaning national security and leadership development organization based in Washington, D.C.
Wikipedia - Trusted computing base -- Set of all computer components critical to its security
Wikipedia - Trusty system (prison) -- Penal security system
Wikipedia - Ubong King -- Business consultant, security expert and motivational speaker
Wikipedia - UK Cyber Security Forum
Wikipedia - Ultra Electronics -- British defence, security, transport and energy company
Wikipedia - Undersecretariat of Public Order and Security -- Former governmental intelligence organization of Turkey
Wikipedia - Union security agreement -- Contractual agreement between a trade union and an employer
Wikipedia - United Nations Security Council Resolution 1002 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 1030 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 1035 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 10 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 11 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 1203 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 1244 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 12 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 133 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 134 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 135 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 136 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 137 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 138 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 139 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 13 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 140 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 1419 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 141 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 142 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 143 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 1448 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 144 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 145 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 146 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 147 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 148 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 149 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 14 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 150 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 151 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 152 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 153 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 1541 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 154 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 155 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 156 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 1574 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 157 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 158 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 159 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 15 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 160 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 1651 -- UN Security Council resolution on Sudan
Wikipedia - United Nations Security Council Resolution 16 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 1784 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 17 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 181
Wikipedia - United Nations Security Council Resolution 1846 -- 2008 resolution relating to piracy off the coast of Somalia
Wikipedia - United Nations Security Council Resolution 18 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 1911 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 1918 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 191
Wikipedia - United Nations Security Council Resolution 1921 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 195 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 19 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 1 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 20 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 21 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 22 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 2334 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 23 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 24 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 25 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 26 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 27 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 282
Wikipedia - United Nations Security Council Resolution 28 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 292 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 298 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 29 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 2 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 30 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 314 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 31 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 32 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 338 -- 1973 UN Security Council resolution calling for a ceasefire in the Yom Kippur War
Wikipedia - United Nations Security Council Resolution 34 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 36 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 37 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 392
Wikipedia - United Nations Security Council Resolution 3 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 418
Wikipedia - United Nations Security Council Resolution 435
Wikipedia - United Nations Security Council Resolution 458 -- 1979 United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 482 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 4 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 537 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 550 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 590 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 591
Wikipedia - United Nations Security Council Resolution 5 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 6 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 781 -- October 1992 resolution establishing a no-fly zone in Bosnia and Herzegovina
Wikipedia - United Nations Security Council Resolution 786 -- November 1992 resolution increasing UNPROFOR monitoring of a no-fly zone in Bosnia and Herzegovina
Wikipedia - United Nations Security Council Resolution 7 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 80 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 815 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 816 -- March 1993 resolution extending and allowing UNPROFOR enforcement of a no-fly zone in Bosnia and Herzegovina
Wikipedia - United Nations Security Council Resolution 822 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 836 -- June 1993 resolution allowing UNPROFOR force to protect "safe areas" in Bosnia and Herzegovina
Wikipedia - United Nations Security Council Resolution 856 -- 1993 UN Security Council resolution on Liberia
Wikipedia - United Nations Security Council Resolution 862 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 881 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 8 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 914 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 989 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council Resolution 9 -- United Nations Security Council resolution
Wikipedia - United Nations Security Council resolution -- UN resolution adopted by the 15 members of the Security Council
Wikipedia - United Nations Security Council -- One of the six principal organs of the UN, charged with the maintenance of international security
Wikipedia - United States Army Security Agency
Wikipedia - United States Department of Homeland Security -- United States federal department
Wikipedia - United States Department of Justice National Security Division
Wikipedia - United States Homeland Security Council -- U.S. federal executive public safety, immigration and disaster relief forum
Wikipedia - United States House Committee on Homeland Security -- Standing committee of the United States House of Representatives
Wikipedia - United States National Security Council -- U.S. federal executive national security and intelligence forum
Wikipedia - United States Penitentiary, Big Sandy -- High-security federal prison in Kentucky
Wikipedia - United States Penitentiary, Coleman -- High-security United States federal prison in Florida
Wikipedia - United States Penitentiary, Lee -- US high-security federal prison in Virginia
Wikipedia - United States Penitentiary, Lewisburg -- High-security US federal prison for male inmates
Wikipedia - United States Penitentiary, Terre Haute -- High-security, federal prison in Indiana, US
Wikipedia - United States Penitentiary, Thomson -- Maximum security federal prison in Illinois
Wikipedia - United States Secretary of Homeland Security -- head of the United States Department of Homeland Security
Wikipedia - United States Senate Committee on Homeland Security and Governmental Affairs -- Standing committee of the United States Senate
Wikipedia - United States Senate Subcommittee on Internal Security -- Former U.S. Senate subcommittee
Wikipedia - Uniting for Consensus -- Group of countries opposing UN Security Council expansion
Wikipedia - Universal basic services -- Social-Security system
Wikipedia - Universal Credit -- British social security benefit
Wikipedia - University of Belgrade Faculty of Security Studies -- Independent faculty of the University of Belgrade
Wikipedia - Unix security
Wikipedia - UN Security Council
Wikipedia - Upstate Correctional Facility -- Maximum-security state prison for male prisoners, located in New York, US
Wikipedia - Upstream collection -- Term used by the National Security Agency (NSA) of the United States
Wikipedia - Uptane -- Software security framework
Wikipedia - US Department of Homeland Security
Wikipedia - Vappala Balachandran -- Indian national security intelligence specialist (born 1937)
Wikipedia - Veracode -- Application security company
Wikipedia - Vietnam People's Public Security
Wikipedia - Vigipirate -- French national security alert system
Wikipedia - Viktor Cherkesov -- Russian security services official
Wikipedia - Village guard system -- Paramilitary security guards in Turkey
Wikipedia - Virtual security switch
Wikipedia - VirusTotal -- Cybersecurity website owned by Alphabet Inc.
Wikipedia - Vulnerability database -- Computer security vulnerabilities
Wikipedia - Wallkill Correctional Facility -- Medium-security state prison, located in New York, US
Wikipedia - Walt Whitman Rostow -- American economist, political theorist and National Security Advisor (1916-2003)
Wikipedia - War bond -- Government debt security issued to finance military operations and other wartime expenditure
Wikipedia - Wardialing -- Computer security attack via dial-up modems
Wikipedia - Warshipping -- Computer security attack via package delivery
Wikipedia - Washington Correctional Facility -- Medium-security state prison for male prisoners, located in New York, US
Wikipedia - Water security
Wikipedia - Web API security
Wikipedia - Web application firewall -- HTTP specific network security system
Wikipedia - Web application security
Wikipedia - Weighted average cost of capital -- Rate that a company is expected to pay on average to all its security holders to finance its assets; firmM-bM-^@M-^Ys cost of capital
Wikipedia - Wende Correctional Facility -- Maximum-security state prison, located in New York, US
Wikipedia - White hat (computer security) -- Computer hacker who hacks ethically (white hat hacker)
Wikipedia - White House Police Force -- Defunct American security police force
Wikipedia - Wi-Fi Protected Access -- Security protocol to secure wireless computer networks
Wikipedia - Wikimedia Foundation v. NSA -- Lawsuit against the U.S. National Security Agency
Wikipedia - William Evanina -- Director of the National Counterintelligence and Security Center
Wikipedia - William L. Uanna -- United States security expert
Wikipedia - Windows Live OneCare -- Discontinued Microsoft security software
Wikipedia - Window Snyder -- Computer security expert
Wikipedia - Wired Equivalent Privacy -- Deprecated security algorithm for wireless networks
Wikipedia - Wireless security
Wikipedia - Wissam Eid -- Lebanese security official
Wikipedia - Woodbourne Correctional Facility -- Medium-security state prison, located in New York, US
Wikipedia - Worshipful Company of Security Professionals -- Livery company of the City of London
Wikipedia - Wyoming Correctional Facility -- Medium-security state prison for male prisoners, located in New York, US
Wikipedia - Xavier's Security Enforcers -- Fictional comic book group
Wikipedia - XSS worm -- Malicious payload that breaches browser security
Wikipedia - Xtralis -- Fire safety and physical security equipment manufacturer
Wikipedia - Xu Yongyue -- Chinese politician and Minister of State Security
Wikipedia - Y-12 National Security Complex -- US Energy Dept facility in Oak Ridge, Tennessee
Wikipedia - Yosemite bowline -- Loop knot often perceived as having better security than a bowline
Wikipedia - Yusuf Magaji Bichi -- Nigerian security agent head
Janet Napolitano ::: Born: November 29, 1957; Occupation: Former United States Secretary of Homeland Security;
Brent Scowcroft ::: Born: March 19, 1925; Occupation: Former National Security Advisor;
Zbigniew Brzezinski ::: Born: March 28, 1928; Occupation: Former National Security Advisor;
Michael Chertoff ::: Born: November 28, 1953; Occupation: Former United States Secretary of Homeland Security;
James L. Jones ::: Born: December 19, 1943; Occupation: Former United States National Security Advisor;
Sandy Berger ::: Born: October 28, 1945; Died: December 2, 2015; Occupation: Former United States National Security Advisor;
Stephen Hadley ::: Born: February 13, 1947; Occupation: Former National Security Advisor;
Jeh Johnson ::: Born: September 11, 1957; Occupation: United States Secretary of Homeland Security;
Henry A. Kissinger ::: Born: May 27, 1923; Occupation: Former National Security Advisor;
https://www.goodreads.com/book/show/1072633.Mastering_SQL_Server_2000_Security
https://www.goodreads.com/book/show/1085874.Safety_And_Security_For_Women_Who_Travel
https://www.goodreads.com/book/show/10915491-the-search-for-financial-security
https://www.goodreads.com/book/show/11044896-applied-cryptography-and-network-security
https://www.goodreads.com/book/show/11044899-applied-cryptography-and-network-security
https://www.goodreads.com/book/show/113638.Homeland_Insecurity
https://www.goodreads.com/book/show/1227169.Regional_Security_In_The_Middle_East
https://www.goodreads.com/book/show/1268272.The_New_Challenges_to_International_National_and_Human_Security_Policy
https://www.goodreads.com/book/show/12735669-german-military-reform-and-european-security
https://www.goodreads.com/book/show/12827518-national-security
https://www.goodreads.com/book/show/1284342.Social_Security_and_Medicare
https://www.goodreads.com/book/show/1303564.Maximum_Security
https://www.goodreads.com/book/show/13124510-the-wisdom-of-insecurity
https://www.goodreads.com/book/show/13510071-her-personal-security
https://www.goodreads.com/book/show/13688624-social-security-reform
https://www.goodreads.com/book/show/1376155.Issues_in_Privatizing_Social_Security
https://www.goodreads.com/book/show/1412956.The_Social_Security_Swindle
https://www.goodreads.com/book/show/141381.Administrating_Web_Servers_Security_Maintenance_Interactive_Workbook
https://www.goodreads.com/book/show/14611427-who-watches-the-watchmen-the-conflict-between-national-security-and-fre
https://www.goodreads.com/book/show/15864492-promoting-international-energy-security
https://www.goodreads.com/book/show/16010271-browser-security-handbook
https://www.goodreads.com/book/show/16182409-cybersecurity-and-cyberwar
https://www.goodreads.com/book/show/17349435-social-security-made-simple
https://www.goodreads.com/book/show/17628197-modern-security-analysis
https://www.goodreads.com/book/show/17716318-security
https://www.goodreads.com/book/show/17723970-quality-reliability-security-and-robustness-in-heterogeneous-networks
https://www.goodreads.com/book/show/17946215-national-security-and-free-speech
https://www.goodreads.com/book/show/17978391-russian-security-and-paramilitary-forces-since-1991
https://www.goodreads.com/book/show/18210740-national-insecurity
https://www.goodreads.com/book/show/18270185-monster-security-services
https://www.goodreads.com/book/show/19035718-modern-security-analysis
https://www.goodreads.com/book/show/19075285-the-journal-of-international-security-affairs-spring-2010
https://www.goodreads.com/book/show/192218.Paul_H_Nitze_On_National_Security_And_Arms_Control
https://www.goodreads.com/book/show/19247148-cybersecurity-and-cyberwar
https://www.goodreads.com/book/show/19292351-a-traveler-s-guide-to-cyber-security
https://www.goodreads.com/book/show/19513855-maximum-insecurity
https://www.goodreads.com/book/show/20310066-false-security
https://www.goodreads.com/book/show/203409.Security_Analysis
https://www.goodreads.com/book/show/20488957-the-cloud-security-rules
https://www.goodreads.com/book/show/20609832-basic-politics-of-movement-security
https://www.goodreads.com/book/show/20665848-emergency-as-security
https://www.goodreads.com/book/show/20868014-the-security-of-water-food-energy-and-liveability-of-cities
https://www.goodreads.com/book/show/21342827-the-journal-of-international-security-affairs-fall-winter-2012
https://www.goodreads.com/book/show/21413220-engineering-security
https://www.goodreads.com/book/show/2169145.Cryptographic_Security_Architecture
https://www.goodreads.com/book/show/21864633-offender-motivation-and-values-in-international-security
https://www.goodreads.com/book/show/22402620-in-security-2-1
https://www.goodreads.com/book/show/23461132-china-and-cybersecurity
https://www.goodreads.com/book/show/23461770-comptia-security
https://www.goodreads.com/book/show/2380307.Security_Without_War
https://www.goodreads.com/book/show/23822295-access-denied-for-reasons-of-national-security
https://www.goodreads.com/book/show/23967329-security
https://www.goodreads.com/book/show/24179027-healthcare-information-security-and-privacy
https://www.goodreads.com/book/show/24426675-social-security-works
https://www.goodreads.com/book/show/26083308.The_DevOps_Handbook_How_to_Create_World_Class_Agility__Reliability__and_Security_in_Technology_Organizations
https://www.goodreads.com/book/show/26457475-security-and-privacy-in-social-networks
https://www.goodreads.com/book/show/26795350-the-maximum-security-book-club
https://www.goodreads.com/book/show/27112550-human-security-and-philanthropy
https://www.goodreads.com/book/show/2719573-social-security-and-the-golden-age
https://www.goodreads.com/book/show/276808.Essential_PHP_Security
https://www.goodreads.com/book/show/2792182-information-security
https://www.goodreads.com/book/show/28021615-india-s-naval-strategy-and-asian-security
https://www.goodreads.com/book/show/28198102-international-security-40
https://www.goodreads.com/book/show/28433.Surprise_Security_and_the_American_Experience
https://www.goodreads.com/book/show/29369848-ccie-security-written-exam-guide
https://www.goodreads.com/book/show/29895091-agile-application-security
https://www.goodreads.com/book/show/30171770-international-security-40
https://www.goodreads.com/book/show/30245539-the-prepper-s-guide-to-disaster-water-security
https://www.goodreads.com/book/show/30354093-security-operations-center-analyst-guide
https://www.goodreads.com/book/show/30386597-cybersecurity-in-the-european-union
https://www.goodreads.com/book/show/30416847-security-operations-center---analyst-guide
https://www.goodreads.com/book/show/30537669-racy-rocket-adventures-short-security-level-2
https://www.goodreads.com/book/show/30821483-harry-the-information-security-hero
https://www.goodreads.com/book/show/3135001-the-rise-and-falling-out-of-saint-leslie-of-security
https://www.goodreads.com/book/show/31748904-applied-cryptography-and-network-security
https://www.goodreads.com/book/show/31868076-false-security
https://www.goodreads.com/book/show/32056020-cracking-security-misconceptions
https://www.goodreads.com/book/show/32062692.Bring_It__Sabel_Security__2__Trench_Coats__1_6_
https://www.goodreads.com/book/show/32178989-aws-security-best-practices
https://www.goodreads.com/book/show/3268675-security-engineering
https://www.goodreads.com/book/show/32955504-security-operations-center-guidebook
https://www.goodreads.com/book/show/33245246.Elizabeth_I_A_Study_in_Insecurity
https://www.goodreads.com/book/show/3346158-schneier-on-security
https://www.goodreads.com/book/show/3425426-visible-ops-security
https://www.goodreads.com/book/show/34395490-social-security-made-simple
https://www.goodreads.com/book/show/345074.Body_of_Secrets_Anatomy_of_the_Ultra_Secret_National_Security_Agency_from_the_Cold_War_Through_the_Dawn_of_a_New_Century
https://www.goodreads.com/book/show/34802097-science-fiction-futures-marine-corps-security-environment-forecast
https://www.goodreads.com/book/show/35294023-false-security-and-false-hope
https://www.goodreads.com/book/show/355186.Security_Warrior
https://www.goodreads.com/book/show/35585306.Beyond_Scarcity_Water_Security_in_the_Middle_East_and_North_Africa
https://www.goodreads.com/book/show/35703663.Element_42__Sabel_Security__3_
https://www.goodreads.com/book/show/36409874-use-of-cyber-threat-intelligence-in-security-operation-center
https://www.goodreads.com/book/show/38479271-financial-decision-making-and-retirement-security-in-an-aging-world
https://www.goodreads.com/book/show/38731621-white-hat-security-series---boxed-set
https://www.goodreads.com/book/show/3967971-encyclopedia-of-united-states-national-security
https://www.goodreads.com/book/show/39732639-security-operations-center---siem-use-cases-and-cyber-threat-intelligenc
https://www.goodreads.com/book/show/39830518-security-operations-center---siem-use-cases-and-cyber-threat-intelligenc
https://www.goodreads.com/book/show/40092288-use-of-cyber-threat-intelligence-in-security-operations-center
https://www.goodreads.com/book/show/40146997-windows-server-2016-security-certificates-and-remote-access-cookbook
https://www.goodreads.com/book/show/40203719-windows-server-2016-security-certificates-and-remote-access-cookbook
https://www.goodreads.com/book/show/40233349-dc-security
https://www.goodreads.com/book/show/40969203-shards-of-love-a-safe-security-trilogy
https://www.goodreads.com/book/show/41827850-mac-security-boxset
https://www.goodreads.com/book/show/43464864.Overture__North_Security___1_
https://www.goodreads.com/book/show/4371438-access-denied-for-reasons-of-national-security
https://www.goodreads.com/book/show/43832227-technology-and-national-security
https://www.goodreads.com/book/show/44166651-technology-and-national-security
https://www.goodreads.com/book/show/44491834-exam-ref-ms-500-microsoft-365-security-administration
https://www.goodreads.com/book/show/4477532-social-security
https://www.goodreads.com/book/show/45420191-international-security-43
https://www.goodreads.com/book/show/45486680-1080p-fhd-wifi-ip-camera-wireless-2-4-g-wifi-security-panoramic-viewing
https://www.goodreads.com/book/show/45712718-security-operations-in-practice
https://www.goodreads.com/book/show/4735754-global-insecurity
https://www.goodreads.com/book/show/4873951-environment-and-security
https://www.goodreads.com/book/show/4935169-the-essence-of-security
https://www.goodreads.com/book/show/551520.The_Wisdom_of_Insecurity
https://www.goodreads.com/book/show/6515342-security
https://www.goodreads.com/book/show/6817610-so-long-insecurity
https://www.goodreads.com/book/show/6818096-ufos-and-the-national-security-state-2
https://www.goodreads.com/book/show/6854774-computer-security-esorics-2009
https://www.goodreads.com/book/show/7400142-corruption-global-security-and-world-order
https://www.goodreads.com/book/show/745668.Saving_Social_Security
https://www.goodreads.com/book/show/7930544-the-future-of-transatlantic-security-relations-colloquium-report
https://www.goodreads.com/book/show/8085736-security-analysis-part-vii---additional-aspects-of-security-analysis-d
https://www.goodreads.com/book/show/8220181-security-analysis-part-i---survey-and-approach
https://www.goodreads.com/book/show/8224907-security-analysis-part-iv---theory-of-common-stock-investment-the-divi
https://www.goodreads.com/book/show/8230173-taxation-incomplete-markets-and-social-security
https://www.goodreads.com/book/show/8238560-security-analysis-part-iii---senior-securities-with-speculative-feature
https://www.goodreads.com/book/show/8256199-security-analysis-part-vi---balance-sheet-analysis-implications-of-ass
https://www.goodreads.com/book/show/8396109-security-analysis-part-ii---fixed-value-investments
https://www.goodreads.com/book/show/8396111-security-analysis-part-v---analysis-of-the-income-account-the-earnings
https://www.goodreads.com/book/show/8454578-preparing-the-u-s-army-for-homeland-security
https://www.goodreads.com/book/show/8548281-the-wisdom-of-insecurity
https://www.goodreads.com/book/show/875977.Environmental_Scarcity_And_Global_Security
https://www.goodreads.com/book/show/8777674-security-analysis
https://www.goodreads.com/book/show/8939563-alternative-security
https://www.goodreads.com/book/show/9025002-the-physics-of-space-security
https://www.goodreads.com/book/show/904656.Uncle_Eric_Talks_About_Personal_Career_And_Financial_Security
https://www.goodreads.com/book/show/9247661-modern-personal-security-solutions
https://www.goodreads.com/book/show/951969.Social_Security
https://www.goodreads.com/book/show/98887.UFOs_and_the_National_Security_State_1
https://www.goodreads.com/book/show/990721.Security_First
https://www.goodreads.com/author/show/14907028.Homeland_Security_Committee_Homeland_Security_Committee
https://familypedia.wikia.org/wiki/Forum:Social_Security_Numbers
https://familypedia.wikia.org/wiki/Social_Security_number
https://familypedia.wikia.org/wiki/Template:UN_Security_Council
https://itlaw.wikia.org/wiki/Category:Cybersecurity
https://itlaw.wikia.org/wiki/Category:Legislation-Australia-Security
https://itlaw.wikia.org/wiki/Category:Legislation-EU-Security
https://itlaw.wikia.org/wiki/Category:Legislation-U.K.-Security
https://itlaw.wikia.org/wiki/Category:Security
https://itlaw.wikia.org/wiki/Computer_Security:_Hackers_Penetrate_DOD_Computer_Systems
https://itlaw.wikia.org/wiki/Hackers_Wanted:_An_Examination_of_the_Cybersecurity_Labor_Market
https://itlaw.wikia.org/wiki/Information_Security:_Computer_Hacker_Information_Available_on_the_Internet
https://itlaw.wikia.org/wiki/Security
https://military.wikia.org/wiki/Anti-terrorism,_Crime_and_Security_Act_2001
https://military.wikia.org/wiki/Boeing_Defense,_Space_&_Security
https://military.wikia.org/wiki/Collective_security
https://military.wikia.org/wiki/Communications_Security_Establishment_Canada
https://military.wikia.org/wiki/Federal_Security_Service
https://military.wikia.org/wiki/File:Pentagon_Security_Camera_1.ogv
https://military.wikia.org/wiki/International_Security_Assistance_Force
https://military.wikia.org/wiki/Kosovo_Security_Force
https://military.wikia.org/wiki/List_of_Afghan_security_forces_fatality_reports_in_Afghanistan
https://military.wikia.org/wiki/Minister_for_International_Security_Strategy
https://military.wikia.org/wiki/National_security
https://military.wikia.org/wiki/National_Security_Act_of_1947
https://military.wikia.org/wiki/Palestinian_National_Security_Forces
https://military.wikia.org/wiki/Strategic_Defence_and_Security_Review_2015
https://military.wikia.org/wiki/United_Nations_Security_Council
https://military.wikia.org/wiki/United_Nations_Security_Council_Resolution_1368
https://military.wikia.org/wiki/United_States_National_Security_Council
https://religion.wikia.org/wiki/Community_Security_Trust
https://religion.wikia.org/wiki/Hyperdispensationalism#Security_of_Salvation
https://religion.wikia.org/wiki/United_Nations_Security_Council_Resolution_271
dedroidify.blogspot - obama-calls-for-domestic-security-force
dedroidify.blogspot - daily-conspiracy-security
wiki.auroville - Auroville_Safety_and_Security_Team
Psychology Wiki - National_security
https://tvtropes.org/pmwiki/pmwiki.php/ComicStrip/InSecurity
https://tvtropes.org/pmwiki/pmwiki.php/Fanfic/Security
https://tvtropes.org/pmwiki/pmwiki.php/Film/JointSecurityArea
https://tvtropes.org/pmwiki/pmwiki.php/Film/NationalSecurity
https://tvtropes.org/pmwiki/pmwiki.php/Literature/MagicalSecurityTaskforce
https://tvtropes.org/pmwiki/pmwiki.php/Literature/TheStrangestSecurityTapeIveEverSeen
https://tvtropes.org/pmwiki/pmwiki.php/Main/ClairvoyantSecurityForce
https://tvtropes.org/pmwiki/pmwiki.php/Main/DestroyTheSecurityCamera
https://tvtropes.org/pmwiki/pmwiki.php/Main/GeorgeJetsonJobSecurity
https://tvtropes.org/pmwiki/pmwiki.php/Main/InnSecurity
https://tvtropes.org/pmwiki/pmwiki.php/Main/InsecurityCamera
https://tvtropes.org/pmwiki/pmwiki.php/Main/InsecuritySystem
https://tvtropes.org/pmwiki/pmwiki.php/Main/MagicalSecurityCam
https://tvtropes.org/pmwiki/pmwiki.php/Main/OddlyOvertrainedSecurity
https://tvtropes.org/pmwiki/pmwiki.php/Main/OverreactingAirportSecurity
https://tvtropes.org/pmwiki/pmwiki.php/Main/SecurityBlanket
https://tvtropes.org/pmwiki/pmwiki.php/Main/SecurityCling
https://tvtropes.org/pmwiki/pmwiki.php/Main/SelfDestructingSecurity
https://tvtropes.org/pmwiki/pmwiki.php/Main/SwissCheeseSecurity
https://tvtropes.org/pmwiki/pmwiki.php/Main/UltimateJobSecurity
https://tvtropes.org/pmwiki/pmwiki.php/Main/UselessSecurityCamera
https://tvtropes.org/pmwiki/pmwiki.php/Main/VetinariJobSecurity
https://tvtropes.org/pmwiki/pmwiki.php/Manga/MitamaSecuritySpiritBusters
https://tvtropes.org/pmwiki/pmwiki.php/Music/Security
https://tvtropes.org/pmwiki/pmwiki.php/Pantheon/MaximumSecurity
https://tvtropes.org/pmwiki/pmwiki.php/Series/BorderSecurity
https://tvtropes.org/pmwiki/pmwiki.php/Series/Insecurity
https://tvtropes.org/pmwiki/pmwiki.php/VideoGame/FiveNightsAtFreddysSecurityBreach
http://tvtropes.org/pmwiki/pmwiki.php/Tropers/HairSecuritySchool
https://en.wikiquote.org/wiki/File:20031025_Palestinian_at_Israeli_security_fence_by_Olivia_Heussler.jpg
https://en.wikiquote.org/wiki/File:Signing_Of_The_Social_Security_Act.jpg
https://en.wikiquote.org/wiki/File:UN_security_council_2005.jpg
https://en.wikiquote.org/wiki/Insecurity
https://en.wikiquote.org/wiki/Job_security
https://en.wikiquote.org/wiki/National_security
https://en.wikiquote.org/wiki/Security
https://en.wikiquote.org/wiki/Security_alarm
https://en.wikiquote.org/wiki/Social_security
https://en.wikiquote.org/wiki/Social_Security_(United_States)
https://en.wikiquote.org/wiki/The_Production_of_Security
The A-Team (1983 - 1987) - In 1972, a crack commando unit was sent to prison by a military court for a crime they didnt commit. These men promptly escaped from a maximum-security stockade to the Los Angeles underground. Today, still wanted by the government, they survive as soldiers of fortune. If you have a problem, if no o...
Magnum, P.I. (1980 - 1988) - After leaving Naval Intelligence, the laid back Thomas Magnum III, struck a deal with the millionaire play boy author Robin Masters. Robin owned a rather large estate in Hawaii and Magnum moved into the guest house for free in exchange for running a series of security checks on the estate, property...
Yo Yogi! (1991 - 1992) - Yo Yogi! featured the gang as young teenagers (Yogi, Boo Boo, Huck, Snagglepuss & Cindy). They worked for the LAF (Lost & Found) detective agency which was run by head security agent John Smith (later the park ranger), over @ Jellystone Mall (owned by Doggie Daddy & Augie Doggie).
It Takes a Thief (1968 - 1970) - It Takes A Thief was an intrigue TV series about an international cat burglar who got caught but was given his freedom provided he worked with a government security agency to steal from those who would threaten our nation's security.
Half Nelson (1985 - 1985) - Joe Pesci plays Rocky Nelson who was a former NY cop and now works as a security guard.
Karneval (2013 - 2013) - Nai searches for someone important to him, with only an abandoned bracelet as a clue. Gareki steals and pick-pockets to get by from day to day. The two meet in a strange mansion where they are set-up, and soon become wanted criminals by military security operatives. When Nai and Gareki find themselv...
Lauras Stern (Laura's Star) (2002 - 2011) - German animated television series. One day Laura helped a fallen star and since that day, the star has been her own special friend. In a witty and poetic fashion, he shows her how to dream with your eyes open, and how to overcome fear and insecurity.
Elfen Lied (2004 - 2004) - Diclonious are a breed of artificial superhumans. They look identical to most humans, except for their horns sticking out of their heads, pink hair in females...and an extremely deadly telekinetic power. One of them, Lucy, breaks free from a research lab and escapes her security compound. After...
Palace Guard (1991 - 1992) - After three years in prison, legendary jewel thief Tommy Logan (played by D.W. Moffett) is released on parole and hired, because of his criminal expertise, as a security expert by Arturo Taft (Tony LoBianco), owner of the world wide ultra luxurious Palace Hotel chain.
Lost (2004 - 2010) - The survivors of Oceanic Flight 815 were 1,000 miles off course when they crashed on a lush, mysterious island. Each person possesses a shocking secret, but they've got nothing on the island itself, which harbors a monstrous security system, a series of underground bunkers and a group of violent sur...
Inspector Gadget(1999) - Matthew Broderick stars in this live-action adaptation of the popular animated series. When a well-meaning but overly trusting security guard is wounded in an explosion created by the evil Dr. Claw, a beautiful scientist named Brenda (Joely Fisher) takes him under her wing and turns him into a crime...
Chopping Mall(1986) - A group of teenagers that work at the mall all get together for a late night party in one of the stores. When the mall accidently goes on lock down before they can get out, The robot security system activates after a malfunction and goes on a killing spree. One by one the three bots try to rid the m...
Escape from New York(1981) - In the year 1997 New York city has been turned into a maximum security prison. The President of the States plane has crashed in the Manhattan area. It's up to US veteran & bank robber Snake Plissken to get him back t
First Kid(1996) - Some say that to be the leader of a country is one of the loneliest jobs in the world. But being the child of a world leader can be doubly so. Constantly surrounded by security officers, restricted in movements and having almost every waking moment carefully monitored makes normalcy an impossibility...
The Silence of the Lambs(1991) - FBI trainee Clarice Starling ventures into a maximum-security asylum to pick the diseased brain of Hannibal Lecter, a psychiatrist turned homicidal cannibal. Starling needs clues to help her capture a serial killer. Unfortunately, her Faustian relationship with Lecter soon leads to his escape, and n...
U.S. Marshals(1998) - Tommy Lee Jones returns as United States Marshall Sam Gerard, the role that earned him an Academy Award, in this sequel to the 1993 blockbuster The Fugitive. Gerard has been assigned to escort a federal prisoner to a maximum security prison in Missouri. On the same flight is Mark Sheridan (Wesley Sn...
Armed and Dangerous(1986) - Frank Dooley is an ex-cop, thrown out of the force after being framed by corrupt colleagues. Herman Kane is an out of work attorney who quit because he lost his nerve. Both men turn to a private security firm to find employment, but everything goes quickly wrong when the first warehouse they guard g...
Sneakers(1992) - Martin Bishop is the head of a group of experts who specialise in testing security systems. When he is blackmailed by Government agents into stealing a top secret black box, the team find themselves embroiled in a game of danger and intrigue. After they recover the box, they discover that it has the...
Private Resort(1985) - Jack (Depp) and his buddy ben (Morrow) check in at a posh Florida resort, planning to spend every hour in hot pursuit of gorgeous babes. But their plans hit a major detour when they try to bed the wife of a conniving jewel theif (Ector Elizondo). They'll have to outsmart him, a nasty security guard...
Passenger 57(1992) - John Cutter is a security expert, who is presently still mourning the death of his wife. His friend, who works for an airline, offers him the job of chief of security, which he accepts. He is then being flown to L.A. for the company's annual meeting, where he will be introduced as the new Chief of S...
Shampoo(1975) - George Roundy is a Beverly Hills hairstylist whose uncontrolled libido stands between him and his ambitions. He wants the security of a relationship. He wants to be a hairdressing "star" and open his own salon. But the fact that he beds down with the wife, daughter and mistress of a potential backer...
Club Fed(1990) - A beautiful,yet clumsy,murder suspect(Judy Landers) is sent to a posh,minimum security resort/prison where she gets framed for embezzlement.It is up to an, equally clumsy, FBI agent(Lance Kinsey)to prove her innocence.
Virus(1996) - Former football player Brian Bosworth headlines this ecologically conscious direct-to-video actioner. He plays a member of the presidential security staff who with his lovely lady partner has been dispatched to Yellowstone Park to save the planet from deadly biological weapons that were accidentally...
Bloodfist IV: Die Trying(1992) - In this martial arts thriller, a repo man accidentally brings back the wrong car and finds himself in deep trouble with the LAPD, both national security organizations, and a ring of international gun runners. When someone kidnaps the repo man's daughter, he uses his fists of fury to get bloody reven...
Bloodfist III: Forced to Fight(1992) - Action hero Don "The Dragon" Wilson appears in this third, quickie sequel to Bloodfist. Wilson plays Jimmy Boland, who has been sentenced to a California maximum-security prison for a murder that he didn't commit. When he sees some black prison inmates sodomizing his friend, he flies into a rage and...
Tapeheads(1988) - In this high-energy satire of the music biz, Ivan Alexov (John Cusack) and Josh Tager (Tim Robbins) lose their jobs as security guards, and they decide to start their own video production company. Their first gigs are less than inspiring, including a rappin' commercial for a chicken-and-waffle place...
New World Disorder(1999) - In this high-tech thriller, David Marx (Rutger Hauer), a take-no-prisoners homicide detective, is teamed with computer expert Kris Paddock (Tara Fitzgerald) to track down Kurt Bishop (Andrew McCarthy), a software pirate who has been trying to steal a valuable encryption security program. Bishop will...
The Set Up(1995) - When Charlie Thorpe, an MIT-educated security systems expert and convicted cat-burglar, gets out of prison, he promises himself to go straight. Yet when a psycho he knew from prison kidnaps his girlfriend, he is forced back into the crime game.
Sniper(1993) - In this fast-paced military thriller, Tom Berenger is Thomas Beckett, a tough, grizzled, U.S. Marine Corps veteran sharpshooter who goes through target-spotter partners faster than bullets on his ultra-dangerous missions. The National Security Council secretly assigns Beckett to assassinate a Panama...
Fear of a Black Hat(1994) - Basically a rap version of "This is Spinal Tap." It is set around a fictitious rap group called NWH. The main characters in this moc-umentary include Tone Def, Tasty Taste, and Ice Cold. Hilarity ensues as they battle security guards, and a rap group call R.A.V, or Rappers Against Violence, in a sch...
Stir Crazy(1980) - Two guys:Skip Donahue(Gene Wilder) and Harry Monroe (Richard Pryor) are framed for a bank robbery they did not commit and are sentenced to 125 years in prison.Now they must learn to survive in the harsh world of a maximum-security prison while their lawyers try to get them off.
Man Trouble(1992) - Actor Jack Nicholson, writer Carole Eastman, and director Bob Rafelson re-team 22 years after their classic Five Easy Pieces, for this romantic comedy. Nicholson plays Harry Bliss, a small potatoes security expert unhappily married to a Japanese woman (he sarcastically calls her Iwo Jima during ther...
Crimewave(1985) - Two crazy exterminators(Paul Smith and Brion James)kill the owners of security company,and a loser(Reed Birney)takes the blame for it.
The Stud(1978) - Fontaine Khaled is the wife of a wealthy but boring businessman. She spends his money on her nightclub, the hobo, and partying. She hires a manager, Tony, to run her club, but it is understood that his job security is dependent on him satisfying her nymphomaniac demands. Tony loses interest in Fonta...
13 Hours: The Secret Soldiers of Benghazi(2016) - It is September 11, 2012. The Islamic militants are attacking the U.S Consultate located in Benghazi, Libya, causing the fatalities of J. Christopher Stevens and Sean Smith, an officer for the Foreign Service. Nearly under a mile away, members of the Annex Security Team (James Badge Dale, John Krasi...
Ghost in the Shell: The New Movie(2015) - In the year 2027, a year following the end of the non-nuclear World War IV, a bomb has gone off in Newport City, killing a major arms dealer who may have ties with the mysterious 501 Organization. Public Security official Daisuke Aramaki hires full-body cyber prosthesis user and hacker extraordinair...
Looney Tunes: Back In Action(2003) - Tired of playing Bugs Bunny's second fiddle, Daffy Duck demands his own movie only to be fired from Warner Bros. Studios. Security guard DJ Drake, son of an action movie star, is fired when trying to banish him from the studio. Later, Bugs' director Kate Houghton is fired for removing Daffy Duck. Th...
Fit To Kill(1993) - Chinese businessman Chang owns the fabulous Alexa diamond, stolen from Russia during WWII. He intends to return it to Russia during a gala dinner, but the diamond is stolen by Kane, assisted by his lethal and seductive partner Blu Steele. The Agency, in charge of security at the event, go into high...
Bad Santa(2003) - Willie T. Stokes and Marcus are professional heistmen, that take on the Santa Claus routine for the children at a different shopping mall every year as a front for the opportunity to disable the mall security system, clean out the safe, and then flee on Christmas Eve. Willie is an alcoholic, a sex a...
The Osterman Weekend(1983) - The host of an investigative news show is convinced by the CIA that the friends he has invited to a weekend in the country are engaged in a conspiracy that threatens national security in this adaptation of the Robert Ludlum novel.
Two Hands(1999) - A security guard who is employed at a Sydney strip club is offered a job as a courier by a local gangster in which he is to deliver $10,000 to a woman, only to have the money stolen from him by two street children while he is at the beach. He must then somehow find a way to get the money back.
The Protector(1985) - Billy Wong is a New York City cop whose partner is gunned down during a robbery. Billy and his new partner, Danny Garoni, are working security at a fashion show when a wealthy man's daughter, Laura Shapiro, is kidnapped. The Federal authorities suspect that Laura's father is involved with Mr. Ko, a...
Night at the Museum: Battle of the Smithsonian(2009) - Three years after the events of the previous film, Larry Daley is now the CEO of Daley Devices, a direct response television company that sells inventions based on his night security guard job. His rich new job has prevented him from seeing his museum friends for a while, but when he returns he find...
Night at the Museum(2006) - Larry Daley is divorced, unable to keep a steady job, and has failed at many business ventures including his dream job of being an inventor. His ex-wife fears his lifestyle is a bad influence on his eleven-year-old son Nick. One day, an elderly nigh security guard at the American Museum of Natural H...
Paul Blart: Mall Cop(2009) - Single dad Paul Blart is a mild-mannered but overweight man who takes his job of security guard at the Orange Pavilion Mall very seriously. He wants to become a member of the New Jersey State Police but his hypoglycemic condition prevents him. He also becomes acquainted with Amy, the owner of a new...
Paranormal Activity 2(2010) - After experiencing what they think are a series of "break-ins", a family sets up security cameras around their home, only to realize that the events unfolding before them are more sinister than they seem.
They Went That-A-Way And That-A-Way(1978) - Two inept cops(Tim Conway and Chuck McCann) go undercover,posing as criminals,to retrieve stolen money from a maximum security prison.
Da Wan(2001) - Yankie director Don Tyler faces mounting insecurity and declining health while on location in Beijing, so his assistant hires down-and-out camerman YoYo to take the reins. Scrambling, studio boss sells the sagging picture to a Japanese media company. But YoYo is determined to upstage the whole produ...
Tenacious D in The Pick Of Destiny(2006) - To become the greatest band of all time, two slacker, wannabe-rockers set out on a quest to steal a legendary guitar pick that gives its holders incredible guitar skills, from a maximum security Rock and Roll museum.
Night at the Museum: Secret of the Tomb(2014) - Security guard Larry Daley must travel to London to return the tablet of Ahkmenrah, an Egyptian artifact which causes the exhibits to come to life, before the magic disappears. The last film ever starring Robin Williams before his death.
Night Eyes(1990) - A security guard is hired to gather evidence of adultery against the wife of the rock star and ends up getting involved with her.
Night Eyes II(1991) - Security expert Will Griffith has been hired to secure the mansion of South American expatriate Hector Mejenes, who has had attempts made on his life, upon the insistance of his American wife, Marilyn. Now the neglected wife finds herself attracted to the security guard and vice versa.
Night Eyes III(1993) - A security guard falls for a famous TV actress he is hired to protect while dealing with mobsters who want him to sell out his business to them.
13 Hours (2016) ::: 7.3/10 -- R | 2h 24min | Action, Drama, History | 15 January 2016 (USA) -- During an attack on a U.S. compound in Libya, a security team struggles to make sense out of the chaos. Director: Michael Bay Writers: Chuck Hogan (screenplay), Mitchell Zuckoff (book)
Above the Rim (1994) ::: 6.7/10 -- R | 1h 36min | Crime, Drama, Sport | 23 March 1994 (USA) -- Story of a promising high school basketball star and his relationships with two brothers, one a drug dealer and the other a former basketball star fallen on hard times and now employed as a security guard. Director: Jeff Pollack Writers:
Alien (1992) ::: 6.5/10 -- R | 1h 54min | Action, Horror, Sci-Fi | 22 May 1992 (USA) -- After her last encounter, Ellen Ripley crash-lands on Fiorina 161, a maximum security prison. When a series of strange and deadly events occur shortly after her arrival, Ripley realizes that she has brought along an unwelcome visitor. Director: David Fincher Writers:
Beats (2019) ::: 6.4/10 -- TV-MA | 1h 49min | Drama | 19 June 2019 (USA) -- A reclusive teenage musical prodigy forms an unlikely friendship with a down-on-his-luck high school security guard. United by their mutual love of hiphop, they confront the demons of their past and try to break into Chicago's music scene. Director: Chris Robinson Writer:
Born to Kill (1947) ::: 7.2/10 -- Approved | 1h 32min | Crime, Drama, Film-Noir | 3 May 1947 (USA) -- A calculating divorce risks her chances at wealth and security with a man she doesn't love by getting involved with the hotheaded murderer romancing her foster sister. Director: Robert Wise Writers: Eve Greene (screen play), Richard Macaulay (screen play) | 1 more credit
Breaking In ::: TV-14 | 30min | Comedy, Crime | TV Series (20112012) -- A high-tech security firm takes extreme, and often questionable, measures to sell their protection services. Creators: Adam F. Goldberg, Seth Gordon
City of Life and Death (2009) ::: 7.7/10 -- Nanjing! Nanjing! (original title) -- City of Life and Death Poster -- In 1937, Japan occupied Nanjing, the Chinese capital. There was a battle and subsequent atrocities against the inhabitants, especially those who took refuge in the International Security Zone. Director: Chuan Lu Writer:
Escape from New York (1981) ::: 7.2/10 -- R | 1h 39min | Action, Adventure, Sci-Fi | 10 July 1981 (USA) -- In 1997, when the U.S. president crashes into Manhattan, now a giant maximum security prison, a convicted bank robber is sent in to rescue him. Director: John Carpenter Writers:
Escape Plan (2013) ::: 6.7/10 -- R | 1h 55min | Action, Sci-Fi, Thriller | 18 October 2013 (USA) -- When a structural-security authority finds himself set up and incarcerated in the world's most secret and secure prison, he has to use his skills to escape with help from the inside. Director: Mikael Hfstrm Writers:
Flawless (1999) ::: 6.5/10 -- R | 1h 52min | Comedy, Crime, Drama | 24 November 1999 (USA) -- An ultraconservative security guard suffers a debilitating stroke and is assigned to a rehabilitative program that includes singing lessons, with the drag queen next door. Director: Joel Schumacher Writer:
Ghost in the Shell 2: Innocence (2004) ::: 7.5/10 -- Inosensu: Innocence (original title) -- Ghost in the Shell 2: Innocence Poster -- In the year 2032, Bat, a cyborg detective for the anti-terrorist unit Public Security Section 9, investigates the case of a female robot--one created solely for sexual pleasure--who slaughtered her owner. Director: Mamoru Oshii Writers:
Ghost in the Shell Arise: Border 2 - Ghost Whisper (2013) ::: 7.3/10 -- TV-MA | 57min | Animation, Action, Sci-Fi | November 2013 (USA) -- Witness the formation of the legendary Public Security Section 9. When a clandestine organization hacks every car in the city, Kusanagi recruits a lethal team of cyber operatives to clamp down on the chaos and make the city safe again. Directors: Atsushi Takeuchi, Kazuchika Kise Writers: Shirow Masamune (manga) (as Masamune Shirow), Tow Ubukata (screenplay)
Glass (2019) ::: 6.7/10 -- PG-13 | 2h 9min | Drama, Sci-Fi, Thriller | 18 January 2019 (USA) -- Security guard David Dunn uses his supernatural abilities to track Kevin Wendell Crumb, a disturbed man who has twenty-four personalities. Director: M. Night Shyamalan Writer: M. Night Shyamalan
Import Export (2007) ::: 7.1/10 -- Not Rated | 2h 21min | Drama | 18 October 2007 (Germany) -- A nurse from Ukraine searches for a better life in the West, while an unemployed security guard from Austria heads East for the same reason. Director: Ulrich Seidl Writers: Veronika Franz, Ulrich Seidl Stars:
Intelligence -- 42min | Action, Drama, Sci-Fi | TV Series (2014) ::: A high-tech intelligence operative, enhanced with a super-computer microchip in his brain, aids an elite government cyber-security agency in special missions. Creator:
Joint Security Area (2000) ::: 7.8/10 -- Gongdong gyeongbi guyeok JSA (original title) -- (South Korea) Joint Security Area Poster After a shooting incident at the North/South Korean border/DMZ leaves 2 North Korean soldiers dead, a neutral Swiss/Swedish team investigates, what actually happened. Director: Chan-wook Park Writers: Seong-san Jeong, Hyun-seok Kim | 4 more credits
Killing Eve ::: TV-14 | 42min | Action, Adventure, Drama | TV Series (2018 ) -- After a series of events, the lives of a security operative and an assassin become inextricably linked. Creator: Phoebe Waller-Bridge
Killing Eve ::: TV-14 | 42min | Action, Adventure, Drama | TV Series (2018- ) Season 4 Premiere 2021 Episode Guide 26 episodes Killing Eve Poster -- After a series of events, the lives of a security operative and an assassin become inextricably linked. Creator:
Land of the Pharaohs (1955) ::: 6.6/10 -- Approved | 1h 46min | Adventure, Drama, History | 24 June 1955 (USA) -- A captured architect designs an ingenious plan to ensure the impregnability of the tomb of a self-absorbed Pharaoh, obsessed with the security of his next life. Director: Howard Hawks Writers: William Faulkner, Harry Kurnitz | 1 more credit Stars:
Lock Up (1989) ::: 6.4/10 -- R | 1h 49min | Action, Crime, Drama | 4 August 1989 (USA) -- With only six months left of his sentence, inmate Frank Leone is transferred from a minimum security prison to a maximum security prison by a vindictive warden. Director: John Flynn Writers:
Lovely & Amazing (2001) ::: 6.7/10 -- R | 1h 31min | Comedy, Drama, Romance | 2 August 2002 (USA) -- Self-esteem and insecurity are at the heart of this comedy about the relationship between a mother and her three confused daughters. Director: Nicole Holofcener Writer: Nicole Holofcener
LSD: Love, Sex Aur Dhokha (2010) ::: 7.1/10 -- Not Rated | 2h 35min | Comedy, Crime, Drama | 19 March 2010 (India) -- A video camcorder, a store security camera, and concealed cameras candidly expose lives in three loosely-linked tales. Director: Dibakar Banerjee Writers: Dibakar Banerjee, Kanu Behl
Mr. Robot ::: TV-MA | 49min | Crime, Drama, Thriller | TV Series (20152019) -- Elliot, a brilliant but highly unstable young cyber-security engineer and vigilante hacker, becomes a key figure in a complex game of global dominance when he and his shadowy allies try to take down the corrupt corporation he works for. Creator:
Museo (2018) ::: 6.9/10 -- 2h 8min | Crime, Drama | 26 October 2018 (Mexico) -- In 1985, a group of criminals mock the security of the National Museum of Anthropology in Mexico City to extract 140 pre-Hispanic pieces from their showcases. Directors: Alonso Ruizpalacios (as Alonso Ruiz Palacios), Alonso Ruizpalacios Writers:
Neighboring Sounds (2012) ::: 7.2/10 -- O Som ao Redor (original title) -- Neighboring Sounds Poster -- The lives of the residents of a Brazilian apartment building and the security guards who get the job guarding the surrounding streets. Director: Kleber Mendona Filho Writer:
Next ::: TV-14 | Crime, Drama, Sci-Fi | TV Series (2020) -- A former tech CEO joins an FBI Cybersecurity Agent to stop the emergence of a rogue Artificial Intelligence. Creator: Manny Coto
Night at the Museum (2006) ::: 6.4/10 -- PG | 1h 48min | Adventure, Comedy, Family | 22 December 2006 (USA) -- A newly recruited night security guard at the Museum of Natural History discovers that an ancient curse causes the animals and exhibits on display to come to life and wreak havoc. Director: Shawn Levy Writers:
Official Secrets (2019) ::: 7.3/10 -- R | 1h 52min | Biography, Crime, Drama | 30 August 2019 (USA) -- The true story of a British whistleblower who leaked information to the press about an illegal NSA spy operation designed to push the UN Security Council into sanctioning the 2003 invasion of Iraq. Director: Gavin Hood Writers:
Olympus Has Fallen (2013) ::: 6.5/10 -- R | 1h 59min | Action, Thriller | 22 March 2013 (USA) -- Secret Service agent Mike Banning finds himself trapped inside the White House in the wake of a terrorist attack and works with national security to rescue the President from his kidnappers. Director: Antoine Fuqua Writers:
Paranoid Park (2007) ::: 6.7/10 -- R | 1h 25min | Crime, Drama, Mystery | 24 October 2007 (France) -- A teenage skateboarder's life begins to fray after he is involved in the accidental death of a security guard. Director: Gus Van Sant Writers: Gus Van Sant (screenplay), Blake Nelson (novel)
Red Sparrow (2018) ::: 6.6/10 -- R | 2h 20min | Action, Drama, Thriller | 2 March 2018 (USA) -- Ballerina Dominika Egorova is recruited to 'Sparrow School,' a Russian intelligence service where she is forced to use her body as a weapon. Her first mission, targeting a C.I.A. agent, threatens to unravel the security of both nations. Director: Francis Lawrence Writers:
Richard Jewell (2019) ::: 7.5/10 -- R | 2h 11min | Biography, Crime, Drama | 13 December 2019 (USA) -- Security guard Richard Jewell is an instant hero after foiling a bomb attack at the 1996 Atlanta Olympics, but his life becomes a nightmare when the FBI leaks to the media that he is a suspect in the case. Director: Clint Eastwood Writers:
Route Irish (2010) ::: 6.4/10 -- 1h 49min | Action, Drama, Thriller | 16 March 2011 (France) -- The story of a private security contractor in Iraq who rejected the official explanation of his friend's death and sets out to discover the truth. Director: Ken Loach Writer:
Shaft (2019) ::: 6.4/10 -- R | 1h 51min | Action, Comedy, Crime | 14 June 2019 (USA) -- JJ Shaft, a cyber security expert with a degree from MIT, enlists his family's help to uncover the truth behind his best friend's untimely death. Director: Tim Story Writers:
Sherlock Holmes and the Voice of Terror (1942) ::: 6.6/10 -- Passed | 1h 5min | Crime, Mystery, Thriller | 18 September 1942 (USA) -- When a Nazi saboteur jeeringly predicts to the nation new depredations via the radio 'Voice of Terror', the Homeland Security Inner Council summons Sherlock Holmes (Basil Rathbone) to help ... S Director: John Rawlins Writers: Lynn Riggs (screenplay), John Bright (screenplay) | 2 more credits Stars:
Sneakers (1992) ::: 7.1/10 -- PG-13 | 2h 6min | Comedy, Crime, Drama | 11 September 1992 (USA) -- A security pro finds his past coming back to haunt him, when he and his unique team are tasked with retrieving a particularly important item. Director: Phil Alden Robinson Writers: Phil Alden Robinson, Lawrence Lasker | 1 more credit
Superjail! ::: TV-MA | 10min | Animation, Comedy, Crime | TV Series (20072014) In a surreal world, a large maximum security prison, which houses thousands of dangerous inmates is run by an eccentric warden and his equally odd staff. Creators: Christy Karacas, Ben Gruber, Stephen Warbrick Stars:
Tenacious D in the Pick of Destiny (2006) ::: 6.8/10 -- Tenacious D in The Pick of Destiny (original title) -- Tenacious D in the Pick of Destiny Poster -- To become the greatest band of all time, two slacker, wannabe-rockers set out on a quest to steal a legendary guitar pick that gives its holders incredible guitar skills, from a maximum security Rock and Roll museum. Director: Liam Lynch
The Great Train Robbery (1978) ::: 6.9/10 -- The First Great Train Robbery (original title) -- The Great Train Robbery Poster -- England, 1850s. A master criminal aims to rob a train of a large sum of gold. Security is incredibly tight and the task seems an impossible one. However, he has a plan and just the right people to carry it out. Director: Michael Crichton Writers:
The Informer (2019) ::: 6.6/10 -- R | 1h 53min | Action, Crime, Drama | 10 January 2020 (Canada) -- An ex-convict working undercover intentionally gets himself incarcerated again in order to infiltrate the mob at a maximum security prison. Director: Andrea Di Stefano Writers:
The Player ::: TV-14 | 1h | Action, Crime, Drama | TV Series (2015) -- A former intelligence and FBI officer, who now works as a security expert in Las Vegas, is recruited by mysterious pit boss Mr. Johnson to, based on his tips, try to prevent crimes, while the rich place bets on his chances of success. Creators:
TRON (1982) ::: 6.8/10 -- PG | 1h 36min | Action, Adventure, Sci-Fi | 9 July 1982 (USA) -- A computer hacker is abducted into the digital world and forced to participate in gladiatorial games where his only chance of escape is with the help of a heroic security program. Director: Steven Lisberger Writers:
Waar (2013) ::: 7.9/10 -- 2h 10min | Action, Crime, Drama | 16 October 2013 (Pakistan) -- The efforts of the Pakistani security forces in their fight against terrorism and how the lives of security officials are affected. A retired security officer returns to save Pakistan from a major terrorist attack. Director: Bilal Lashari Writer:
Walking and Talking (1996) ::: 6.7/10 -- R | 1h 26min | Comedy, Drama, Romance | 17 July 1996 (USA) -- Just as Amelia thinks she's over her anxiety and insecurity, her best friend announces her engagement, bringing her anxiety and insecurity right back. Director: Nicole Holofcener Writer: Nicole Holofcener Stars:
https://mitamasecurity.fandom.com
https://mitamasecurity.fandom.com/
https://ahatintime.fandom.com/wiki/Security_Breach
https://althistory.fandom.com/wiki/Collective_Security_Treaty_Organization_(1983:_Doomsday)
https://althistory.fandom.com/wiki/D.C._Security_Zone_Campaign_(American_Crisis)
https://among-us.fandom.com/wiki/Security_(ability)
https://batman.fandom.com/wiki/High_Security_Henchman
https://batman.fandom.com/wiki/Shreck_Security_Guard_no.1
https://batman.fandom.com/wiki/Shreck_Security_Guard_no.2
https://bgdcmc.fandom.com/wiki/Security_Guard
https://characters.fandom.com/wiki/Syndrome's_Security_Guards
https://choroq.fandom.com/wiki/Security_Robot
https://citiesxl.fandom.com/wiki/Security_(Police)
https://colony.fandom.com/wiki/Homeland_Security
https://colony.fandom.com/wiki/Homeland_Security_HQ
https://community-sitcom.fandom.com/wiki/Basic_Email_Security
https://computersecurity.fandom.com/wiki/
https://concord.fandom.com/wiki/Fictional_Security_Agencies
https://darkerthanblack.fandom.com/wiki/French_Department_Of_National_Security
https://databasemanagement.fandom.com/wiki/Database_Security
https://dc.fandom.com/wiki/American_Security_Agency_(New_Earth)
https://dc.fandom.com/wiki/Young_Justice_(TV_Series)_Episode:_Insecurity
https://dc.fandom.com/wiki/Young_Justice_(TV_Series)_Episode:_Private_Security
https://deusex.fandom.com/wiki/SP69/75_Aero_security_bot
https://dothack.fandom.com/wiki/Sophia_Security_System
https://dreamfiction.fandom.com/wiki/El_Kadsre_Special_Security_Committee
https://dreamfiction.fandom.com/wiki/Lethal_Security
https://dreamfiction.fandom.com/wiki/Security_and_Intelligence_Agency_of_Tseng
https://dreamfiction.fandom.com/wiki/Security_Patrol
https://dreamfiction.fandom.com/wiki/Special_Security_Committee_of_the_Vlokozu_Union
https://dreamfiction.fandom.com/wiki/Total_Security_(1997_video_game)
https://dreamfiction.fandom.com/wiki/Vortex_Security:_War_of_the_Raiders
https://education.fandom.com/wiki/National_School_Saftey_and_Security_Services
https://elderscrolls.fandom.com/wiki/Breaching_Security
https://elderscrolls.fandom.com/wiki/Ensuring_Security
https://elderscrolls.fandom.com/wiki/Security_Details
https://elderscrolls.fandom.com/wiki/Security_(Morrowind)
https://elderscrolls.fandom.com/wiki/Security_(Oblivion)
https://eq2.fandom.com/wiki/Darkness_Ascending:_Scarstone_Security
https://eq2.fandom.com/wiki/Gnomeland_Security_Headquarters
https://finalfantasy.fandom.com/wiki/Shinra_Public_Security_Division
https://finalfantasy.fandom.com/wiki/Shinra_Public_Security_Forces
https://freddy-fazbears-pizza.fandom.com/wiki/Five_Nights_at_Freddy's:_Security_Breach
https://freeware.fandom.com/wiki/Lists_of_freeware_security_services
https://freeware.fandom.com/wiki/Lists_of_Freeware_Security_Software
https://freeware.fandom.com/wiki/SECURITY
https://gameideas.fandom.com/wiki/Artistic_Forces/Security_Defense_Alliance
https://gamicus.fandom.com/wiki/Five_Nights_at_Freddy's:_Security_Breach
https://github.com/Wikia/unified-platform/tree/master/extensions/fandom/ContentSecurityPolicy
https://harrypotter.fandom.com/wiki/DISASTROUS_OPENING_CEREMONY_LEADS_TO_QUESTIONS_ABOUT_QUIDDITCH_WORLD_CUP_SECURITY
https://honorverse.fandom.com/wiki/Office_of_State_Security
https://humanscience.fandom.com/wiki/Computer_Security_and_Viruses
https://java.fandom.com/wiki/Spring_security
https://lastmanstanding.fandom.com/wiki/Home_Security
https://logos.fandom.com/wiki/GE_Security
https://logos.fandom.com/wiki/Somali_National_Intelligence_and_Security_Agency
https://marvel.fandom.com/wiki/Maximum_Security
https://marvel.fandom.com/wiki/Maximum_Security_Vol_1_1
https://marvel.fandom.com/wiki/Maximum_Security_Vol_1_3
https://marvel.fandom.com/wiki/National_Security_Council_(Earth-616)
https://marvel.fandom.com/wiki/United_Nations_Security_Council_(Earth-616)
https://marvel.fandom.com/wiki/World_Security_Council_(Earth-616)
https://matrix.fandom.com/wiki/The_Security_Guard
https://memory-alpha.fandom.com/wiki/Akritirian_maximum_security_detention_facility
https://memory-alpha.fandom.com/wiki/Alhambra_security_officer_001
https://memory-alpha.fandom.com/wiki/Auto-initiating_security_grid
https://memory-alpha.fandom.com/wiki/Bajoran_Security
https://memory-alpha.fandom.com/wiki/Bell_(security)
https://memory-alpha.fandom.com/wiki/Bolian_DS9_ops_security_002
https://memory-alpha.fandom.com/wiki/Cardassian_Terok_Nor_security_001
https://memory-alpha.fandom.com/wiki/Casey_(security)
https://memory-alpha.fandom.com/wiki/Central_Security_(Rigel_X)
https://memory-alpha.fandom.com/wiki/Cerritos_security_001
https://memory-alpha.fandom.com/wiki/Chief_of_Security
https://memory-alpha.fandom.com/wiki/Chief_of_security
https://memory-alpha.fandom.com/wiki/Chief_of_Starfleet_Security
https://memory-alpha.fandom.com/wiki/Chief_security_officer
https://memory-alpha.fandom.com/wiki/Class_A_security
https://memory-alpha.fandom.com/wiki/Discovery_security_guard_001
https://memory-alpha.fandom.com/wiki/Discovery_security_guard_003
https://memory-alpha.fandom.com/wiki/Dominion_Security
https://memory-alpha.fandom.com/wiki/Eminian_security_001
https://memory-alpha.fandom.com/wiki/Emotional_security
https://memory-alpha.fandom.com/wiki/EnterpriseNX_engineer_security_crewman_001
https://memory-alpha.fandom.com/wiki/EnterpriseNX_operations_security_001
https://memory-alpha.fandom.com/wiki/EnterpriseNX_operations_security_002
https://memory-alpha.fandom.com/wiki/EnterpriseNX_operations_security_004
https://memory-alpha.fandom.com/wiki/EnterpriseNX_operations_security_005
https://memory-alpha.fandom.com/wiki/EnterpriseNX_operations_security_006
https://memory-alpha.fandom.com/wiki/EnterpriseNX_operations_security_007
https://memory-alpha.fandom.com/wiki/EnterpriseNX_operations_security_008
https://memory-alpha.fandom.com/wiki/EnterpriseNX_operations_security_009
https://memory-alpha.fandom.com/wiki/EnterpriseNX_operations_security_010
https://memory-alpha.fandom.com/wiki/EnterpriseNX_operations_security_011
https://memory-alpha.fandom.com/wiki/EnterpriseNX_operations_security_012
https://memory-alpha.fandom.com/wiki/Federation_Security
https://memory-alpha.fandom.com/wiki/Federation_Security_Number
https://memory-alpha.fandom.com/wiki/Franklin_(security)
https://memory-alpha.fandom.com/wiki/Global_Security_Net
https://memory-alpha.fandom.com/wiki/Grant_(security)
https://memory-alpha.fandom.com/wiki/Human_32nd_holo_security_001
https://memory-alpha.fandom.com/wiki/Human_DS9_ops_security_003
https://memory-alpha.fandom.com/wiki/Human_DS9_ops_security_004
https://memory-alpha.fandom.com/wiki/Human_DS9_ops_security_005
https://memory-alpha.fandom.com/wiki/Human_DS9_ops_security_006
https://memory-alpha.fandom.com/wiki/Human_DS9_ops_security_007
https://memory-alpha.fandom.com/wiki/Human_DS9_ops_security_008
https://memory-alpha.fandom.com/wiki/Human_DS9_ops_security_009
https://memory-alpha.fandom.com/wiki/Human_DS9_ops_security_010
https://memory-alpha.fandom.com/wiki/Human_DS9_ops_security_011
https://memory-alpha.fandom.com/wiki/Human_DS9_ops_security_013
https://memory-alpha.fandom.com/wiki/Human_DS9_ops_security_015
https://memory-alpha.fandom.com/wiki/Illusion_security_001
https://memory-alpha.fandom.com/wiki/Kelly_(security)
https://memory-alpha.fandom.com/wiki/Kes_Security_Relation_Station_One
https://memory-alpha.fandom.com/wiki/Level_1_security_clearance
https://memory-alpha.fandom.com/wiki/Level_5_security_field
https://memory-alpha.fandom.com/wiki/Level_5_security_protocol
https://memory-alpha.fandom.com/wiki/Minister_of_Security
https://memory-alpha.fandom.com/wiki/Ministry_of_Security
https://memory-alpha.fandom.com/wiki/Mirror_Discovery_security_001
https://memory-alpha.fandom.com/wiki/Mirror_Discovery_security_002
https://memory-alpha.fandom.com/wiki/Multi-regenerative_security_field
https://memory-alpha.fandom.com/wiki/Murphy_(security)
https://memory-alpha.fandom.com/wiki/National_Security_Agency
https://memory-alpha.fandom.com/wiki/Nygean_security_officers_001
https://memory-alpha.fandom.com/wiki/Nyrian_security_001
https://memory-alpha.fandom.com/wiki/Nyrian_security_003
https://memory-alpha.fandom.com/wiki/Pathfinder_security_001
https://memory-alpha.fandom.com/wiki/Planetary_security
https://memory-alpha.fandom.com/wiki/Quarren_security_001
https://memory-alpha.fandom.com/wiki/Quarren_security_002
https://memory-alpha.fandom.com/wiki/Quarren_security_003
https://memory-alpha.fandom.com/wiki/Security
https://memory-alpha.fandom.com/wiki/Security_alert
https://memory-alpha.fandom.com/wiki/Security_alert_3
https://memory-alpha.fandom.com/wiki/Security_alert,_condition_three
https://memory-alpha.fandom.com/wiki/Security_alert_yellow
https://memory-alpha.fandom.com/wiki/Security_anklet
https://memory-alpha.fandom.com/wiki/Security_authorization
https://memory-alpha.fandom.com/wiki/Security_bypass_module
https://memory-alpha.fandom.com/wiki/Security_Chief
https://memory-alpha.fandom.com/wiki/Security_chief
https://memory-alpha.fandom.com/wiki/Security_clearance
https://memory-alpha.fandom.com/wiki/Security_code
https://memory-alpha.fandom.com/wiki/Security_Condition_Four
https://memory-alpha.fandom.com/wiki/Security_Condition_Three
https://memory-alpha.fandom.com/wiki/Security_confinement
https://memory-alpha.fandom.com/wiki/Security_cover
https://memory-alpha.fandom.com/wiki/Security_detail
https://memory-alpha.fandom.com/wiki/Security_Directorate
https://memory-alpha.fandom.com/wiki/Security_field
https://memory-alpha.fandom.com/wiki/Security_force_field
https://memory-alpha.fandom.com/wiki/Security_grid
https://memory-alpha.fandom.com/wiki/Security_guard
https://memory-alpha.fandom.com/wiki/Security_lockout
https://memory-alpha.fandom.com/wiki/Security_log
https://memory-alpha.fandom.com/wiki/Security_log,_USS_Voyager
https://memory-alpha.fandom.com/wiki/Security_net
https://memory-alpha.fandom.com/wiki/Security_office
https://memory-alpha.fandom.com/wiki/Security_Officer
https://memory-alpha.fandom.com/wiki/Security_officer
https://memory-alpha.fandom.com/wiki/Security_override_code
https://memory-alpha.fandom.com/wiki/Security_protocol
https://memory-alpha.fandom.com/wiki/Security_Relay_Station_One
https://memory-alpha.fandom.com/wiki/Security_restraint
https://memory-alpha.fandom.com/wiki/Security_room
https://memory-alpha.fandom.com/wiki/Security_screen
https://memory-alpha.fandom.com/wiki/Security_seal
https://memory-alpha.fandom.com/wiki/Security_sensor
https://memory-alpha.fandom.com/wiki/Security_station
https://memory-alpha.fandom.com/wiki/Security_team
https://memory-alpha.fandom.com/wiki/Security_two_alert
https://memory-alpha.fandom.com/wiki/Shenzhou_security_officer_001
https://memory-alpha.fandom.com/wiki/Starbase_28_security_001
https://memory-alpha.fandom.com/wiki/Starfleet_22nd_NX_security_001
https://memory-alpha.fandom.com/wiki/Starfleet_22nd_security_001
https://memory-alpha.fandom.com/wiki/Starfleet_22nd_security_002
https://memory-alpha.fandom.com/wiki/Starfleet_23rd_Federation_Council_security_001
https://memory-alpha.fandom.com/wiki/Starfleet_24th_alt_security_001
https://memory-alpha.fandom.com/wiki/Starfleet_24th_alt_security_002
https://memory-alpha.fandom.com/wiki/Starfleet_24th_alt_security_003
https://memory-alpha.fandom.com/wiki/Starfleet_24th_alt_security_004
https://memory-alpha.fandom.com/wiki/Starfleet_24th_Earth_security_001
https://memory-alpha.fandom.com/wiki/Starfleet_24th_Earth_security_003
https://memory-alpha.fandom.com/wiki/Starfleet_24th_Earth_security_004
https://memory-alpha.fandom.com/wiki/Starfleet_24th_Earth_security_005
https://memory-alpha.fandom.com/wiki/Starfleet_24th_head_of_security_001
https://memory-alpha.fandom.com/wiki/Starfleet_24th_security_officer_001
https://memory-alpha.fandom.com/wiki/Starfleet_alt_security_001
https://memory-alpha.fandom.com/wiki/Starfleet_Security
https://memory-alpha.fandom.com/wiki/Starfleet_security_personnel
https://memory-alpha.fandom.com/wiki/Straleb_security_vessel
https://memory-alpha.fandom.com/wiki/USS_Enterprise_alternate_operations_security_lieutenant_1
https://memory-alpha.fandom.com/wiki/USS_Enterprise_alternate_operations_security_officer_1
https://memory-alpha.fandom.com/wiki/USS_Enterprise_alternate_operations_security_officer_2
https://memory-alpha.fandom.com/wiki/USS_Enterprise_alternate_operations_security_officer_3
https://memory-alpha.fandom.com/wiki/USS_Enterprise_alternate_operations_security_officer_4
https://memory-alpha.fandom.com/wiki/USS_Enterprise_alternate_operations_security_team
https://memory-alpha.fandom.com/wiki/USS_Enterprise_alternate_operations_security_team_002
https://memory-alpha.fandom.com/wiki/USS_Enterprise-A_security_crewman_1
https://memory-alpha.fandom.com/wiki/USS_Enterprise-A_security_team
https://memory-alpha.fandom.com/wiki/USS_Enterprise-D_Bajoran_security_001
https://memory-alpha.fandom.com/wiki/USS_Enterprise-D_security_ensign_001
https://memory-alpha.fandom.com/wiki/USS_Enterprise-D_security_ensign_002
https://memory-alpha.fandom.com/wiki/USS_Enterprise-D_security_guard_001
https://memory-alpha.fandom.com/wiki/USS_Enterprise-D_security_guard_002
https://memory-alpha.fandom.com/wiki/USS_Enterprise-D_security_guard_003
https://memory-alpha.fandom.com/wiki/USS_Enterprise-D_security_guard_004
https://memory-alpha.fandom.com/wiki/USS_Enterprise-D_security_guard_005
https://memory-alpha.fandom.com/wiki/USS_Enterprise-D_security_guard_006
https://memory-alpha.fandom.com/wiki/USS_Enterprise-D_security_guard_007
https://memory-alpha.fandom.com/wiki/USS_Enterprise-D_security_guard_009
https://memory-alpha.fandom.com/wiki/USS_Enterprise-D_security_guard_015
https://memory-alpha.fandom.com/wiki/USS_Enterprise-D_security_guard_017
https://memory-alpha.fandom.com/wiki/USS_Enterprise-D_security_guard_019
https://memory-alpha.fandom.com/wiki/USS_Enterprise-D_security_guard_021
https://memory-alpha.fandom.com/wiki/USS_Enterprise-D_security_guard_022
https://memory-alpha.fandom.com/wiki/USS_Enterprise-D_security_guard_027
https://memory-alpha.fandom.com/wiki/USS_Enterprise-D_security_guard_028
https://memory-alpha.fandom.com/wiki/USS_Enterprise-D_security_guard_030
https://memory-alpha.fandom.com/wiki/USS_Enterprise-D_security_guards_001
https://memory-alpha.fandom.com/wiki/USS_Enterprise-D_security_lieutenant_001
https://memory-alpha.fandom.com/wiki/USS_Enterprise-E_operations_security_001
https://memory-alpha.fandom.com/wiki/USS_Enterprise-E_operations_security_002
https://memory-alpha.fandom.com/wiki/USS_Enterprise-E_operations_security_003
https://memory-alpha.fandom.com/wiki/USS_Enterprise-E_operations_security_004
https://memory-alpha.fandom.com/wiki/USS_Enterprise-E_operations_security_005
https://memory-alpha.fandom.com/wiki/USS_Enterprise-E_operations_security_006
https://memory-alpha.fandom.com/wiki/USS_Enterprise-E_operations_security_007
https://memory-alpha.fandom.com/wiki/USS_Enterprise-E_operations_security_008
https://memory-alpha.fandom.com/wiki/USS_Enterprise-E_operations_security_009
https://memory-alpha.fandom.com/wiki/USS_Enterprise-E_operations_security_010
https://memory-alpha.fandom.com/wiki/USS_Enterprise-E_operations_security_011
https://memory-alpha.fandom.com/wiki/USS_Enterprise-E_operations_security_012
https://memory-alpha.fandom.com/wiki/USS_Enterprise-E_operations_security_013
https://memory-alpha.fandom.com/wiki/USS_Enterprise_operations_security_crewman_1
https://memory-alpha.fandom.com/wiki/USS_Enterprise_operations_security_crewman_2
https://memory-alpha.fandom.com/wiki/USS_Enterprise_operations_security_guard_1
https://memory-alpha.fandom.com/wiki/USS_Enterprise_operations_security_guard_10
https://memory-alpha.fandom.com/wiki/USS_Enterprise_operations_security_guard_11
https://memory-alpha.fandom.com/wiki/USS_Enterprise_operations_security_guard_18
https://memory-alpha.fandom.com/wiki/USS_Enterprise_operations_security_guard_19
https://memory-alpha.fandom.com/wiki/USS_Enterprise_operations_security_guard_2
https://memory-alpha.fandom.com/wiki/USS_Enterprise_operations_security_guard_20
https://memory-alpha.fandom.com/wiki/USS_Enterprise_operations_security_guard_21
https://memory-alpha.fandom.com/wiki/USS_Enterprise_operations_security_guard_22
https://memory-alpha.fandom.com/wiki/USS_Enterprise_operations_security_guard_23
https://memory-alpha.fandom.com/wiki/USS_Enterprise_operations_security_guard_24
https://memory-alpha.fandom.com/wiki/USS_Enterprise_operations_security_guard_25
https://memory-alpha.fandom.com/wiki/USS_Enterprise_operations_security_guard_27
https://memory-alpha.fandom.com/wiki/USS_Enterprise_operations_security_guard_28
https://memory-alpha.fandom.com/wiki/USS_Enterprise_operations_security_guard_29
https://memory-alpha.fandom.com/wiki/USS_Enterprise_operations_security_guard_3
https://memory-alpha.fandom.com/wiki/USS_Enterprise_operations_security_guard_30
https://memory-alpha.fandom.com/wiki/USS_Enterprise_operations_security_guard_4
https://memory-alpha.fandom.com/wiki/USS_Enterprise_operations_security_guard_5
https://memory-alpha.fandom.com/wiki/USS_Enterprise_operations_security_guard_6
https://memory-alpha.fandom.com/wiki/USS_Enterprise_operations_security_guard_7
https://memory-alpha.fandom.com/wiki/USS_Enterprise_operations_security_guard_8
https://memory-alpha.fandom.com/wiki/USS_Enterprise_operations_security_guard_9
https://memory-alpha.fandom.com/wiki/USS_Enterprise_operations_security_landing_party
https://memory-alpha.fandom.com/wiki/USS_Enterprise_operations_security_lieutenant_1
https://memory-alpha.fandom.com/wiki/USS_Enterprise_operations_security_lieutenant_11
https://memory-alpha.fandom.com/wiki/USS_Enterprise_operations_security_lieutenant_13
https://memory-alpha.fandom.com/wiki/USS_Enterprise_operations_security_lieutenant_2
https://memory-alpha.fandom.com/wiki/USS_Enterprise_operations_security_lieutenant_4
https://memory-alpha.fandom.com/wiki/USS_Enterprise_operations_security_lieutenant_5
https://memory-alpha.fandom.com/wiki/USS_Enterprise_operations_security_lieutenant_6
https://memory-alpha.fandom.com/wiki/USS_Enterprise_operations_security_lieutenant_9
https://memory-alpha.fandom.com/wiki/USS_Excelsior_security_001
https://memory-alpha.fandom.com/wiki/USS_Excelsior_security_002
https://memory-alpha.fandom.com/wiki/USS_Excelsior_security_003
https://memory-alpha.fandom.com/wiki/USS_Excelsior_security_004
https://memory-alpha.fandom.com/wiki/Vengeance_security_001
https://memory-alpha.fandom.com/wiki/Yorktown_security_001
https://memory-beta.fandom.com/wiki/Chief_of_Security
https://memory-beta.fandom.com/wiki/Chief_of_security
https://memory-beta.fandom.com/wiki/Coalition_of_Planets_Security_Council
https://memory-beta.fandom.com/wiki/Federation_Security
https://memory-beta.fandom.com/wiki/Federation_Security_Advisor
https://memory-beta.fandom.com/wiki/Federation_Security_Agency
https://memory-beta.fandom.com/wiki/Federation_Security_Council
https://memory-beta.fandom.com/wiki/Federation_Security_Office
https://memory-beta.fandom.com/wiki/Richardson_(Security_Chief)
https://memory-beta.fandom.com/wiki/Security
https://memory-beta.fandom.com/wiki/Security_Chief
https://memory-beta.fandom.com/wiki/Security_chief
https://memory-beta.fandom.com/wiki/Security_division
https://memory-beta.fandom.com/wiki/Security_(eBook)
https://memory-beta.fandom.com/wiki/Security_Officer
https://memory-beta.fandom.com/wiki/Security_officer
https://memory-beta.fandom.com/wiki/Special_Security_Division
https://memory-beta.fandom.com/wiki/Starfleet_Security
https://memory-beta.fandom.com/wiki/Tarsus_IV_Security_Force
https://metalgear.fandom.com/wiki/Maverick_Security_Consulting,_Inc.
https://mirrorsedge.fandom.com/wiki/Silvine_Security_Systems
https://mitamasecurity.fandom.com/wiki/
https://mitamasecurity.fandom.com/wiki/Blog:Recent_posts
https://mitamasecurity.fandom.com/wiki/Chapter_1
https://mitamasecurity.fandom.com/wiki/Chapter_20
https://mitamasecurity.fandom.com/wiki/Chapter_21
https://mitamasecurity.fandom.com/wiki/Chapter_22
https://mitamasecurity.fandom.com/wiki/Chapter_23
https://mitamasecurity.fandom.com/wiki/Chapter_24
https://mitamasecurity.fandom.com/wiki/Joh_Mitama
https://mitamasecurity.fandom.com/wiki/Local_Sitemap
https://mitamasecurity.fandom.com/wiki/Main_Page
https://mitamasecurity.fandom.com/wiki/Mitama_Security
https://mitamasecurity.fandom.com/wiki/Mitama_Security_Wiki
https://mitamasecurity.fandom.com/wiki/Mitama_Wiki
https://mitamasecurity.fandom.com/wiki/Rena_Haze
https://mitamasecurity.fandom.com/wiki/Tsurun_Hatomune
https://newlooneytunes.fandom.com/wiki/Airpork_Security
https://ninjago.fandom.com/wiki/Security_guards
https://ninjago.fandom.com/wiki/Security_guards_(Borg_Industries)
https://ninjago.fandom.com/wiki/Security_guards_(Explorers_Club)
https://omikron.fandom.com/wiki/Security_HQ
https://orville.fandom.com/wiki/Chief_Security_Officer
https://overwatch.fandom.com/wiki/Helix_Security_International
https://peanuts.fandom.com/wiki/Linus'_security_blanket
https://peanuts.fandom.com/wiki/Security_Is_an_Eye_Patch
https://powerless.fandom.com/wiki/Wayne_Security
https://quake.fandom.com/wiki/Data_Networking_Security
https://quantumbreak.fandom.com/wiki/Monarch_Security_Station
https://rageofbahamut.fandom.com/wiki/Account_Security
https://rebeccaparham.fandom.com/wiki/Disney_security_guard
https://rebeccaparham.fandom.com/wiki/The_Curious_Disney_Security_Guard_(animation)
https://rebeccaparham.fandom.com/wiki/The_curious_Disney_security_guard_(character)
https://residentevil.fandom.com/wiki/Bioterrorism_Security_Assessment_Alliance
https://robocop.fandom.com/wiki/Security_Concepts
https://shodan.fandom.com/wiki/Level_8_-_Security
https://sidekicks.fandom.com/wiki/Humankind_Security_Committee
https://sleepingdogs.fandom.com/wiki/Security_Cameras
https://small-town-security.fandom.com/wiki/
https://starwarscardtrader.fandom.com/wiki/Captain_Panaka_-_Naboo_Security_-_Base_Series_1
https://starwarscardtrader.fandom.com/wiki/Captain_Tarpals_-_Gungan_Security_-_Base_Series_1
https://starwarscardtrader.fandom.com/wiki/Captain_Typho_-_Naboo_Security_-_Base_Series_1
https://starwars.fandom.com/wiki/Alderaanian_consular_security
https://starwars.fandom.com/wiki/Bastatha_security_forces
https://starwars.fandom.com/wiki/Casino_Security_(Canto_Casino)
https://starwars.fandom.com/wiki/Chief_of_Security
https://starwars.fandom.com/wiki/Cloud_City_Security_Tower
https://starwars.fandom.com/wiki/Commerce_Guild_Punitive_Security_Forces
https://starwars.fandom.com/wiki/Corellian_Security_Forces
https://starwars.fandom.com/wiki/Coruscant_Security_Force
https://starwars.fandom.com/wiki/Coruscant_Security_Force_Divisional_Headquarters_(ISB_technology_center)
https://starwars.fandom.com/wiki/Coruscant_Security_Force_Divisional_Headquarters_(Quadrant_A-89)
https://starwars.fandom.com/wiki/Coruscant_Security_Force_Headquarters
https://starwars.fandom.com/wiki/Coruscant_Security_Force_incident_support_vessel
https://starwars.fandom.com/wiki/Coruscant_Security_Force/Legends
https://starwars.fandom.com/wiki/Coruscant_Security_Force_Senior_Command
https://starwars.fandom.com/wiki/Coruscant_Security_Force_Staff_and_Social_Club
https://starwars.fandom.com/wiki/Coruscant_Security_Special_Investigation_Panel
https://starwars.fandom.com/wiki/First_Order_Security_Bureau
https://starwars.fandom.com/wiki/Goddess_of_security_and_safekeeping
https://starwars.fandom.com/wiki/Guavian_Death_Gang_security_soldier_armor
https://starwars.fandom.com/wiki/Guavian_security_soldier
https://starwars.fandom.com/wiki/Head_of_Security
https://starwars.fandom.com/wiki/Hetzal's_security_division
https://starwars.fandom.com/wiki/Homeworld_Security_Command
https://starwars.fandom.com/wiki/Imperial_Intelligence_and_Security_Bureau_offices
https://starwars.fandom.com/wiki/Imperial_Office_of_Security
https://starwars.fandom.com/wiki/Imperial_Security_Bureau
https://starwars.fandom.com/wiki/Imperial_Security_Bureau_headquarters
https://starwars.fandom.com/wiki/Imperial_Security_Bureau/Legends
https://starwars.fandom.com/wiki/Imperial_security_complex
https://starwars.fandom.com/wiki/InterGalactic_Banking_Clan_Collections_and_Security_Division
https://starwars.fandom.com/wiki/Internal_Security_Bureau
https://starwars.fandom.com/wiki/Jedi_Temple_central_security_station
https://starwars.fandom.com/wiki/Jinata_Security
https://starwars.fandom.com/wiki/Kamino_security
https://starwars.fandom.com/wiki/KPR_security_droid
https://starwars.fandom.com/wiki/KX-series_security_droid
https://starwars.fandom.com/wiki/Ogden's_Hope_security
https://starwars.fandom.com/wiki/Ogden's_Hope_security_station
https://starwars.fandom.com/wiki/OOM_security_battle_droid
https://starwars.fandom.com/wiki/Orbital_Security_Station_Six
https://starwars.fandom.com/wiki/Orto_Plutonia_clone_security_force
https://starwars.fandom.com/wiki/Outland_Regions_Security_Force
https://starwars.fandom.com/wiki/Peace_and_Security_Headquarters
https://starwars.fandom.com/wiki/Planetary_Security_Forces
https://starwars.fandom.com/wiki/Republic_Domestic_Security
https://starwars.fandom.com/wiki/Royal_Naboo_Security_Forces
https://starwars.fandom.com/wiki/Royal_Naboo_Security_Forces/Legends
https://starwars.fandom.com/wiki/Security_camera
https://starwars.fandom.com/wiki/Security_collar
https://starwars.fandom.com/wiki/Security_Council
https://starwars.fandom.com/wiki/Security_council
https://starwars.fandom.com/wiki/Security_droid
https://starwars.fandom.com/wiki/Security_Guard
https://starwars.fandom.com/wiki/Security_Guard/Legends
https://starwars.fandom.com/wiki/Security_guard/Legends
https://starwars.fandom.com/wiki/Security_officer
https://starwars.fandom.com/wiki/Unidentified_Bothan_(Coruscant_Security_Force)
https://starwars.fandom.com/wiki/Unidentified_Coruscant_Security_officer_(akk_handler)
https://starwars.fandom.com/wiki/Unidentified_Coruscant_Security_officer_(Organa_staffer's_sister)
https://starwars.fandom.com/wiki/Unidentified_Imperial_Security_Bureau_major
https://starwars.fandom.com/wiki/Unidentified_OOM_security_battle_droid_(Saak'ak;_corporal)
https://starwars.fandom.com/wiki/Unidentified_orbital_security_station
https://starwars.fandom.com/wiki/Unidentified_Security_Battle_Droid
https://starwars.fandom.com/wiki/Unidentified_security_guard
https://starwars.fandom.com/wiki/Utapaun_Security_Forces
https://starwars.fandom.com/wiki/Vault_security_contingent
https://starwars.fandom.com/wiki/Vil_(Coruscant_Security_Force)
https://swfanon.fandom.com/wiki/Imperial_State_Security_Committee
https://swfanon.fandom.com/wiki/Ombaria_Security
https://swfanon.fandom.com/wiki/Unidentified_Fallline_security_officer
https://swg.fandom.com/wiki/Royal_Security_Forces
https://tardis.fandom.com/wiki/Interstitial_Insecurity_(short_story)
https://tardis.fandom.com/wiki/Lord_President's_personal_security_sidearm
https://tardis.fandom.com/wiki/Maximum_security_facility
https://tardis.fandom.com/wiki/Republican_Security_Forces
https://tardis.fandom.com/wiki/Sara_Kingdom:_Space_Security_Agent_(comic_story)
https://tardis.fandom.com/wiki/Security
https://tardis.fandom.com/wiki/Security_Bot_(video_game)
https://tardis.fandom.com/wiki/Security_guard_(Day_Zero)
https://tardis.fandom.com/wiki/Security_Protocol_712
https://tardis.fandom.com/wiki/Space_Security_Service
https://tardis.fandom.com/wiki/Unispace_Security
https://terraformars.fandom.com/wiki/Ichi_Security
https://twit.fandom.com/wiki/Security_Now
https://twit.fandom.com/wiki/Security_Now_121:_Is_Privacy_Dead?
https://twit.fandom.com/wiki/Security_Now_133:_TrueCrypt_5
https://typemoon.fandom.com/wiki/Chaldea_Security_Organization
https://warriorscharacters.fandom.com/wiki/Warriors_Characters_Wiki:Project_Security
https://whitewolf.fandom.com/wiki/Adam_(security_officer)
https://whitewolf.fandom.com/wiki/National_Security_Agency
https://wowwiki-archive.fandom.com/wiki/Peacekeeper_Security_Suit
https://youngjustice.fandom.com/wiki/Insecurity
https://youngjustice.fandom.com/wiki/Private_Security
Active Raid: Kidou Kyoushuushitsu Dai Hachi Gakari 2nd -- -- Production IMS -- 12 eps -- Original -- Sci-Fi Comedy Police Mecha -- Active Raid: Kidou Kyoushuushitsu Dai Hachi Gakari 2nd Active Raid: Kidou Kyoushuushitsu Dai Hachi Gakari 2nd -- Set in a part of Tokyo that has descended into a quagmire, the story follows Unit 8 of the 5th Special Public Security Section's 3rd Mobile Assault Division, popularly called "The Eighth," who don powered armor "Willwear" exoskeletons to counter the rise in crime. -- -- (Source: ANN) -- 18,434 6.37
Angel Cop -- -- D.A.S.T. -- 6 eps -- Original -- Action Sci-Fi Police -- Angel Cop Angel Cop -- Sometime in the future, terrorism in Japan has become commonplace, and the police have become almost as brutal as criminals. A member of the Special Security Force known as Angel, is the best of the best, stopping at nothing in her fight for justice. -- -- Things get interesting for Angel and her partner, Raiden, when they begin investigating a series of murders in which the victims were known criminals, killed in very unpleasant ways. This trio of killers known as Hunters, is a group of psychics that have banded together to hunt down the lowest scum in the city and bring them to justice. -- -- After a couple of encounters between the cops and the psychics, two of the psychics begin to think that maybe they're not the good guys after all; but the third prefers killing to morality. Augmented by cybernetics from a mysterious source, this third hunter heads out on a killing spree, with the Special Security Force as the first target. -- -- Even with help from the other two psychics and her newly cyborged partner (after an unfortunate accident), Angel is going to have her work cut out trying to find the rogue psychic and the organization behind the Hunters. -- -- Licensor: -- Discotek Media, Manga Entertainment -- OVA - Sep 1, 1989 -- 13,655 5.94
Baldr Force Exe Resolution -- -- Satelight -- 4 eps -- Visual novel -- Action Drama Mecha Sci-Fi -- Baldr Force Exe Resolution Baldr Force Exe Resolution -- Any network runs all over the world, and the development of the information network reaches its acme. In this age, there are two developed worlds; "the real world" and "wired", or the virtual network world. -- -- Soma Toru belongs to a hacking group, Steppen Wolf, which runs around the network world freely. They attack the database of the UN forces as their last work. During this attack, he loses Nonomura Yuya, his friend as well as the team leader. Toru is arrested by the army. In exchange for letting him free, he has to work for an anti-hacker organization, the first squad of the UN Security Force Information Administration Bureau. -- -- Working for them, he is looking for the person who killed his friend, while the other members also have their own reason to fight. -- -- The three-way fights of the terrorist group, the security enterprise, and the army, continue every day. The various events occurred during the fight seem to be independent of each other at the first glance, but they're converging on one event as if they were attracted by something. -- -- Based on the game by GIGA. -- -- (Source: ANN) -- -- Licensor: -- Funimation -- OVA - Nov 10, 2006 -- 15,668 6.46
Black Bullet -- -- Kinema Citrus, Orange -- 13 eps -- Light novel -- Action Sci-Fi Mystery Seinen -- Black Bullet Black Bullet -- In the year 2021, a parasitic virus known as "Gastrea" infects humans and turns them into monsters. What is left of mankind now lives within the Monolith walls, walls that are made of Varanium, the only material that can hurt Gastrea. -- -- To counter the threat that the Gastrea pose, "Cursed Children"—female children whose bodies contain trace amounts of the virus which grant them superhuman abilities—officially called Initiators by the Tendo Civil Security, are given partners called Promoters, people who work to guide and protect the young Initiators. These teams of two are sent out on missions to fight the monsters created by the Gastrea virus and keep them at bay. -- -- Black Bullet revolves around the team of Enju Aihara, an Initiator, and Satomi Rentaro, a Promoter, as they go on missions to fight the growing threat of Gastrea in their hometown of Tokyo. -- -- -- Licensor: -- Sentai Filmworks -- 740,190 7.15
Burn Up Excess -- -- Magic Bus -- 13 eps -- Original -- Action Adventure Comedy Ecchi Police Sci-Fi Shounen -- Burn Up Excess Burn Up Excess -- Follows the exploits of Team Warrior, a special anti-terror wing of the Neo-Tokyo Police force. Team Warrior is comprised of the habitually broke Rio, gun-crazy Maya, computer specialist Lillica, tech-expert Nanvel, piliot/voyeur Yuji, and is led by the enigmatic Maki. The team faces a number of missions, ranging from bodyguard duty, breaking up robbery and arms rackets, and providing security for a very powerful tank. Rio and company continually thwart the terrorist aims of Ruby, an operative for a shadowy cabal of powerful men. Before the final showdown, the circumstances behind the formation of Team Warrior, how the precocious Rio came to join it, and Maki's painful past will be revealed. -- -- (Source: ANN) -- -- Licensor: -- ADV Films -- TV - Dec 12, 1997 -- 9,423 6.54
Burn Up Scramble -- -- AIC -- 12 eps -- Original -- Action Comedy Drama Ecchi Police Sci-Fi Shounen -- Burn Up Scramble Burn Up Scramble -- AD. 2023, Tokyo. Because of the change of the society such as internationalization and enlargement of the trading, the dark side of the society also continues changing. The criminals are getting deep, and their organizations are increasing its size, then the peace and security is getting worse. -- -- The government takes it seriously, and decides to introduce an innovative system. In order to cope with the special criminals, an extralegal police is founded. -- -- It is a special criminal team, Warriors, which consists of a few elite members. -- -- (Source: AnimeNfo) -- -- Licensor: -- Geneon Entertainment USA -- TV - Jan 12, 2004 -- 8,302 6.18
Chikyuu Bouei Kigyou Dai-Guard -- -- Xebec -- 26 eps -- Original -- Military Sci-Fi Adventure Comedy Mecha -- Chikyuu Bouei Kigyou Dai-Guard Chikyuu Bouei Kigyou Dai-Guard -- Thirteen years after their sudden disappearance, an alien race known as the Heterodyne resurface without warning. To combat the Heterodyne, three office workers from the 21st Century Security Corporation operate Dai-Guard - a giant robot no longer regarded as an oversized paperweight. Unfortunately, Dai-Guard is somewhat obsolete and in disrepair. It's a tough job, but salarymen can also save the world. -- -- (Source: ANN) -- -- Licensor: -- ADV Films, Discotek Media -- 7,817 7.12
Danganronpa 3: The End of Kibougamine Gakuen - Mirai-hen -- -- Lerche -- 12 eps -- Game -- Action Mystery Horror Psychological -- Danganronpa 3: The End of Kibougamine Gakuen - Mirai-hen Danganronpa 3: The End of Kibougamine Gakuen - Mirai-hen -- After Makoto Naegi and his fellow survivors escaped Hope's Peak Academy to the world beyond, they soon join the Future Foundation, an organization dedicated to combating despair. Just when all seems to be looking up, Naegi is arrested and tried for betrayal due to defending a malicious group of Remnants of Despair. Standing before all of the Future Foundation executives, he finds himself, along with Kyouko Kirigiri and Aoi Asahina, facing an unknown fate. -- -- The matter at hand only escalates when the organization's supposedly impenetrable security is hacked into by a -- familiar face: Monokuma. Much to Naegi's horror, the mechanical bear immediately announces the beginning of a new killing game, as moments later, the first victim appears as a signal for despair to resume its brutal conquest. -- -- In the conclusion to Danganronpa's gripping tale of hope and despair, Naegi, the Super High School-Level Lucky Student, must once again unravel the mystery as his colleagues and friends begin falling around him. However, there are no more class trials; among the 16 desperate participants, there is only one killer—and their death means the end of this infernal game. -- -- -- Licensor: -- Funimation -- 269,450 7.33
Detective Conan Movie 14: The Lost Ship in the Sky -- -- Tokyo Movie Shinsha -- 1 ep -- Manga -- Action Mystery Police Shounen -- Detective Conan Movie 14: The Lost Ship in the Sky Detective Conan Movie 14: The Lost Ship in the Sky -- One night, the Tokyo National Institute of Microorganisms is attacked by a mysterious organization calling themselves the "Red Siamese Cats." The group causes the explosion of a high-security lab storing a virus—said to have a mortality rate of 80% with no known cure. This act of terror dominates the headlines, overshadowing the unveiling of the world's biggest airship developed under Jirokichi Suzuki. Peculiarly, the unveiling has a note attached for Kaito "Kaitou Kid" Kuroba, challenging him to steal the jewel on display—the illustrious Lady Sky. -- -- Conan Edogawa is permitted to board the airship along with Kogorou Mouri, Ran Mouri, Sonoko Suzuki, Professor Agasa, and the Detective Boys. However, their fun comes to a halt when an unknown caller contacts Jirokichi and declares that they have released a certain virus in the smoking room. Soon after, symptoms begin to appear among the passengers and chaos ensues. Seizing the opportunity, the Red Siamese Cats suddenly appear and hijack the airship! -- -- To stop the assailants, Conan and Kaitou Kid, along with their allies, must work together to decipher the clues and discover the Red Siamese Cats' real objective before time runs out. -- -- Movie - Apr 17, 2010 -- 44,019 8.14
Detective Conan Movie 22: Zero the Enforcer -- -- TMS Entertainment -- 1 ep -- Manga -- Action Mystery Police Drama -- Detective Conan Movie 22: Zero the Enforcer Detective Conan Movie 22: Zero the Enforcer -- In the film's story, there is a sudden explosion at Tokyo Summit's giant Edge of Ocean facility. The shadow of Tooru Amuro, who works for the National Police Agency Security Bureau as Zero, appears at the site. In addition, the "triple-face" character is known as Rei Furuya as a detective and Kogorou Mouri's apprentice, and he is also known as Bourbon as a Black Organization member. Kogorou is arrested as a suspect in the case of the explosion. Conan conducts an investigation to prove Kogorou's innocence, but Amuro gets in his way. -- -- (Source: ANN) -- -- Licensor: -- Discotek Media -- Movie - Apr 13, 2018 -- 19,320 7.81
Detective Conan: The Magician of Starlight -- -- D & D Pictures -- 1 ep -- Manga -- Space -- Detective Conan: The Magician of Starlight Detective Conan: The Magician of Starlight -- The Japan Aerospace Exploration Agency (JAXA) has planned a huge exhibition to present current progress in space exploration, as well as showcase a set of large, beautiful celestial jewels. But then, a message arrives from infamous Kaitou Kid, who plans to steal the treasure. Conan and the Detective Boys are brought in as added security. Everything is going well... until the power cuts out. With limited time, Conan and company must protect the jewels from Kaitou Kid. -- Movie - ??? ??, 2012 -- 2,088 6.53
Fate/Grand Order: First Order -- -- Lay-duce -- 1 ep -- Game -- Action Supernatural Magic Fantasy -- Fate/Grand Order: First Order Fate/Grand Order: First Order -- In 2015, the Chaldea Security Organization draws on experts of both the magical and mundane fields to observe the future of mankind for possible extinction events. Humanity's survival seems assured for the next century—until the verdict suddenly changes, and now eradication of the species awaits at the end of 2016. The cause is unknown, but appears to be linked with the Japanese town of Fuyuki and the events of 2004 during the Fifth Holy Grail War. -- -- In response, Chaldea harnesses an experimental means of time travel, the Rayshift technology. With it, Ritsuka Fujimaru, a young man newly recruited to the organization, and the mysterious girl Mash Kyrielight, can travel back to 2004 and discover how to save humanity. A grand order to fight fate has been declared—an order to change the past and restore the future. -- -- -- Licensor: -- Aniplex of America -- Special - Dec 31, 2016 -- 144,880 6.77
Fate/Grand Order: First Order -- -- Lay-duce -- 1 ep -- Game -- Action Supernatural Magic Fantasy -- Fate/Grand Order: First Order Fate/Grand Order: First Order -- In 2015, the Chaldea Security Organization draws on experts of both the magical and mundane fields to observe the future of mankind for possible extinction events. Humanity's survival seems assured for the next century—until the verdict suddenly changes, and now eradication of the species awaits at the end of 2016. The cause is unknown, but appears to be linked with the Japanese town of Fuyuki and the events of 2004 during the Fifth Holy Grail War. -- -- In response, Chaldea harnesses an experimental means of time travel, the Rayshift technology. With it, Ritsuka Fujimaru, a young man newly recruited to the organization, and the mysterious girl Mash Kyrielight, can travel back to 2004 and discover how to save humanity. A grand order to fight fate has been declared—an order to change the past and restore the future. -- -- Special - Dec 31, 2016 -- 144,880 6.77
Heppoko Jikken Animation Excel♥Saga -- -- J.C.Staff -- 26 eps -- Manga -- Comedy Parody Sci-Fi Shounen -- Heppoko Jikken Animation Excel♥Saga Heppoko Jikken Animation Excel♥Saga -- It's hard to take over the world, and the enigmatic Il Palazzo, head of the ACROSS organization, knows this, so he aims to start small by conquering the city of Fukuoka. Two young officers, the Excel and her partner Hyatt, are tasked with executing this plan, but standing in their way are the City Security workers, a group consisting of three (mostly) normal guys, a very severe girl, and some robots. Regardless of simplicity, Excel and Hyatt always manage to screw up their missions, which usually result in death and lots of destruction. -- -- Heppoko Jikken Animation Excel♥Saga chronicles the elaborate troubles that the ACROSS officers get themselves into, as Excel and Hyatt never fail to do their jobs improperly. -- -- 94,521 7.50
Heppoko Jikken Animation Excel♥Saga -- -- J.C.Staff -- 26 eps -- Manga -- Comedy Parody Sci-Fi Shounen -- Heppoko Jikken Animation Excel♥Saga Heppoko Jikken Animation Excel♥Saga -- It's hard to take over the world, and the enigmatic Il Palazzo, head of the ACROSS organization, knows this, so he aims to start small by conquering the city of Fukuoka. Two young officers, the Excel and her partner Hyatt, are tasked with executing this plan, but standing in their way are the City Security workers, a group consisting of three (mostly) normal guys, a very severe girl, and some robots. Regardless of simplicity, Excel and Hyatt always manage to screw up their missions, which usually result in death and lots of destruction. -- -- Heppoko Jikken Animation Excel♥Saga chronicles the elaborate troubles that the ACROSS officers get themselves into, as Excel and Hyatt never fail to do their jobs improperly. -- -- -- Licensor: -- ADV Films, Funimation -- 94,521 7.50
Inu x Boku SS -- -- David Production -- 12 eps -- Manga -- Comedy Supernatural Romance Shounen -- Inu x Boku SS Inu x Boku SS -- Ririchiyo Shirakiin is the sheltered daughter of a renowned family. With her petite build and wealthy status, Ririchiyo has been a protected and dependent girl her entire life, but now she has decided to change all that. However, there is just one problem—the young girl has a sharp tongue she can't control, and terrible communication skills. -- -- With some help from a childhood friend, Ririchiyo takes up residence in Maison de Ayakashi, a secluded high-security apartment complex that, as the unsociable 15-year-old soon discovers, is home to a host of bizarre individuals. Furthermore, their quirky personalities are not the strangest things about them: each inhabitant of the Maison de Ayakashi, including Ririchiyo, is actually half-human, half-youkai. -- -- But Ririchiyo's troubles have only just begun. As a requirement of staying in her new home, she must be accompanied by a Secret Service agent. Ririchiyo's new partner, Soushi Miketsukami, is handsome, quiet... but ridiculously clingy and creepily submissive. With Soushi, her new supernatural neighbors, and the beginning of high school, Ririchiyo definitely seems to have a difficult path ahead of her. -- -- -- Licensor: -- Sentai Filmworks -- TV - Jan 13, 2012 -- 416,781 7.45
Inu x Boku SS -- -- David Production -- 12 eps -- Manga -- Comedy Supernatural Romance Shounen -- Inu x Boku SS Inu x Boku SS -- Ririchiyo Shirakiin is the sheltered daughter of a renowned family. With her petite build and wealthy status, Ririchiyo has been a protected and dependent girl her entire life, but now she has decided to change all that. However, there is just one problem—the young girl has a sharp tongue she can't control, and terrible communication skills. -- -- With some help from a childhood friend, Ririchiyo takes up residence in Maison de Ayakashi, a secluded high-security apartment complex that, as the unsociable 15-year-old soon discovers, is home to a host of bizarre individuals. Furthermore, their quirky personalities are not the strangest things about them: each inhabitant of the Maison de Ayakashi, including Ririchiyo, is actually half-human, half-youkai. -- -- But Ririchiyo's troubles have only just begun. As a requirement of staying in her new home, she must be accompanied by a Secret Service agent. Ririchiyo's new partner, Soushi Miketsukami, is handsome, quiet... but ridiculously clingy and creepily submissive. With Soushi, her new supernatural neighbors, and the beginning of high school, Ririchiyo definitely seems to have a difficult path ahead of her. -- -- TV - Jan 13, 2012 -- 416,781 7.45
Joukamachi no Dandelion -- -- Production IMS -- 12 eps -- 4-koma manga -- Slice of Life Comedy Super Power Seinen -- Joukamachi no Dandelion Joukamachi no Dandelion -- The Sakurada siblings live a normal life in a typical Japanese household. Well, that's what their father, the king, wants for them at least. As members of the royal family, each sibling possesses a unique ability, and over two thousand security cameras have been placed around town to make sure the children are safe and sound. Moreover, all nine of them have been designated as a potential successor to the throne with the decision that the next ruler will be selected through an election. -- -- However, for the timid Akane Sakurada, the third eldest daughter who wields the power to manipulate gravity, all of this attention is a complete nightmare. With all the cameras constantly monitoring the candidates and even broadcasting their actions on the Sakurada-dedicated news channel, she decides that if she becomes king, the cameras have got to go. But just how will she convince the public that she is the most suited to rule if she can't even overcome her own shyness?! Election season is in full swing as the search for the next king begins in Joukamachi no Dandelion. -- -- 136,789 7.20
Joukamachi no Dandelion -- -- Production IMS -- 12 eps -- 4-koma manga -- Slice of Life Comedy Super Power Seinen -- Joukamachi no Dandelion Joukamachi no Dandelion -- The Sakurada siblings live a normal life in a typical Japanese household. Well, that's what their father, the king, wants for them at least. As members of the royal family, each sibling possesses a unique ability, and over two thousand security cameras have been placed around town to make sure the children are safe and sound. Moreover, all nine of them have been designated as a potential successor to the throne with the decision that the next ruler will be selected through an election. -- -- However, for the timid Akane Sakurada, the third eldest daughter who wields the power to manipulate gravity, all of this attention is a complete nightmare. With all the cameras constantly monitoring the candidates and even broadcasting their actions on the Sakurada-dedicated news channel, she decides that if she becomes king, the cameras have got to go. But just how will she convince the public that she is the most suited to rule if she can't even overcome her own shyness?! Election season is in full swing as the search for the next king begins in Joukamachi no Dandelion. -- -- -- Licensor: -- Funimation -- 136,789 7.20
Kimera -- -- animate Film -- 1 ep -- Manga -- Action Horror Sci-Fi Shounen Ai Supernatural Vampire -- Kimera Kimera -- Osamu and Jay are two cereal salesmen traveling for work when they encounter a barricade. Curious as to what is going on, they step out of their car and enter into a government secret. Two mysterious demon-like men have been terrorizing the military, who came to respond to a car crash involving a vehicle carrying government research material. Inside the car wreckage, Osamu finds a beautiful hermaphrodite with gold and crimson eyes trapped in a frozen chamber. Osamu shares a kiss with them through the glass before he is forced to flee the scene. -- -- Osamu and Jay interrogate Jay's father, a top researcher at a government laboratory, who reveals that what Osamu and Jay saw was top-secret, and they would likely be sitting in prison if it weren't for his influence. While Jay is ready to forget everything that happened, Osamu cannot let it go that easily. After stealing a security badge, Osamu finds where the person he kissed is being kept, and learns that their name is Kimera. Osamu wants to run away with the beautiful Kimera, though he does not know why Kimera is being held captive or what a relationship with them means for the future of humanity. -- -- -- Licensor: -- ADV Films -- OVA - Jul 31, 1996 -- 6,184 5.12
Kimera -- -- animate Film -- 1 ep -- Manga -- Action Horror Sci-Fi Shounen Ai Supernatural Vampire -- Kimera Kimera -- Osamu and Jay are two cereal salesmen traveling for work when they encounter a barricade. Curious as to what is going on, they step out of their car and enter into a government secret. Two mysterious demon-like men have been terrorizing the military, who came to respond to a car crash involving a vehicle carrying government research material. Inside the car wreckage, Osamu finds a beautiful hermaphrodite with gold and crimson eyes trapped in a frozen chamber. Osamu shares a kiss with them through the glass before he is forced to flee the scene. -- -- Osamu and Jay interrogate Jay's father, a top researcher at a government laboratory, who reveals that what Osamu and Jay saw was top-secret, and they would likely be sitting in prison if it weren't for his influence. While Jay is ready to forget everything that happened, Osamu cannot let it go that easily. After stealing a security badge, Osamu finds where the person he kissed is being kept, and learns that their name is Kimera. Osamu wants to run away with the beautiful Kimera, though he does not know why Kimera is being held captive or what a relationship with them means for the future of humanity. -- -- OVA - Jul 31, 1996 -- 6,184 5.12
Koukaku Kidoutai Arise: Ghost in the Shell - Border:1 Ghost Pain -- -- Production I.G -- 1 ep -- Manga -- Sci-Fi Police Psychological Mecha -- Koukaku Kidoutai Arise: Ghost in the Shell - Border:1 Ghost Pain Koukaku Kidoutai Arise: Ghost in the Shell - Border:1 Ghost Pain -- The anime's story is set in 2027, one year after the end of the fourth non-nuclear war. New Port City is still reeling from the war's aftermath when it suffers a bombing caused by a self-propelled mine. Then, a military member implicated in arms-dealing bribes is gunned down. -- -- During the investigation, Public Security Section's Daisuke Aramaki encounters Motoko Kusanagi, the cyborg wizard-level hacker assigned to the military's 501st Secret Unit. Batou, a man with the "eye that does not sleep," suspects that Kusanagi is the one behind the bombing. The Niihama Prefectural Police detective Togusa is pursuing his own dual cases of the shooting death and a prostitute's murder. Motoko herself is being watched by the 501st Secret Unit's head Kurutsu and cyborg agents. -- -- (Source: ANN) -- -- Licensor: -- Funimation -- Movie - Jun 22, 2013 -- 53,787 7.46
Koukaku Kidoutai Arise: Ghost in the Shell - Border:2 Ghost Whispers -- -- Production I.G -- 1 ep -- Manga -- Sci-Fi Police Psychological Mecha -- Koukaku Kidoutai Arise: Ghost in the Shell - Border:2 Ghost Whispers Koukaku Kidoutai Arise: Ghost in the Shell - Border:2 Ghost Whispers -- Second movie of Ghost in the Shell: Arise. -- -- Freed of her responsibilities with the 501 Organization, Motoko Kusanagi must now learn how to take orders from Aramaki. Someone hacks the Logicomas, and Batou enlists the help of former army intelligence officer Ishikawa and former air artillery expert Borma. Kusanagi also seeks to enlist ace sniper Saito and undercover cop Paz into the new Public Security Section 9. The two groups rival each other in a case involving a man who receives false memories of a refugee transport operation. -- -- (Source: Wikipedia) -- -- Licensor: -- Funimation -- Movie - Nov 30, 2013 -- 43,612 7.51
Koukaku Kidoutai -- -- Production I.G -- 1 ep -- Manga -- Action Mecha Police Psychological Sci-Fi Seinen -- Koukaku Kidoutai Koukaku Kidoutai -- In the year 2029, Niihama City has become a technologically advanced metropolis. Due to great improvements in cybernetics, its citizens are able to replace their limbs with robotic parts. The world is now more interconnected than ever before, and the city's Public Security Section 9 is responsible for combating corruption, terrorism, and other dangerous threats following this shift towards globalization. -- -- The strong-willed Major Motoko Kusanagi of Section 9 spearheads a case involving a mysterious hacker known only as the "Puppet Master," who leaves a trail of victims stripped of their memories. Like many in this futuristic world, the Puppet Master's body is almost entirely robotic, giving them incredible power. -- -- As Motoko and her subordinates follow the enigmatic criminal's trail, other parties—including Section 6—start to get involved, forcing her to confront the extremely complicated nature of the case. Pondering about various philosophical questions, such as her own life's meaning, Motoko soon realizes that the one who will provide these answers is none other than the Puppet Master themself. -- -- -- Licensor: -- Manga Entertainment -- Movie - Nov 18, 1995 -- 482,343 8.29
Koukaku Kidoutai: SAC_2045 -- -- Production I.G, Sola Digital Arts -- 12 eps -- Manga -- Action Military Sci-Fi Police Mecha Seinen -- Koukaku Kidoutai: SAC_2045 Koukaku Kidoutai: SAC_2045 -- The year is 2045, and artificial intelligence has undergone tremendous developments. Governments use them as weapons, engaging in never-ending warfare to sustain their economies. The mercenary group GHOST, headed by Major Motoko Kusanagi, is no stranger to this landscape. However, the rapid innovation of this technology causes a new threat to loom over the horizon. -- -- Having left Public Security Section 9, Kusanagi and her group are involved in many operations worldwide related to these proxy wars. But a seemingly simple job of locating an arms dealer drags GHOST into a hidden conflict against cybernetically enhanced individuals, who have inexplicably gained extreme intelligence and physical abilities. Dubbed "post-humans," their emergence sets off a chain of events leading to the reunion of Section 9. Armed with a new mission, it is up to Kusanagi and her reestablished team to prevent global chaos at the hands of these post-humans. -- -- ONA - Apr 23, 2020 -- 26,133 6.67
Koukaku Kidoutai: Shin Movie -- -- Production I.G -- 1 ep -- Manga -- Action Sci-Fi Police Psychological Mecha -- Koukaku Kidoutai: Shin Movie Koukaku Kidoutai: Shin Movie -- In the year 2027, a year following the end of the non-nuclear World War IV, a bomb has gone off in Newport City, killing a major arms dealer who may have ties with the mysterious 501 Organization. Public Security official Daisuke Aramaki hires full-body cyber prosthesis user and hacker extraordinaire, Motoko Kusanagi, to investigate. -- -- (Source: Wikipedia) -- -- Licensor: -- Funimation -- Movie - Jun 20, 2015 -- 40,670 7.47
Lupin III: Dead or Alive -- -- Tokyo Movie Shinsha -- 1 ep -- Manga -- Action Adventure Mystery Comedy Seinen -- Lupin III: Dead or Alive Lupin III: Dead or Alive -- Lupin, Goemon, and Jigen take a mini-helicopter and head to the mysterious “Drifting Island” looking for a treasure rumored to be hidden somewhere on it. Through their exploration of the island, the trio encounters the lethal “Nanomachine,” the island’s security system. The trio triggers the alarm, springing “the Nanomachine” to life. The key to solving the island’s mystery lies in the small nation of Zufu. This once prosperous nation is now ruled by the ruthless, knife-collecting, General Headhunter. Fujiko does her usual probing and hacks into General Headhunter’s computer hoping to find some crucial information. Zenigata has received a video message from Lupin in which Lupin announces his desire for the priceless treasure. Oleander, a fiery blond officer with some hidden secrets of her own, steps in to help Zenigata. Armed with their newly found information, Lupin, Goemon, Jigen, and Fujiko go back to “Drifting Island,” but this time they are followed by General Headhunter. -- -- (Source: ANN) -- -- Licensor: -- Funimation -- Movie - Apr 20, 1996 -- 8,836 7.16
Maken-Ki! Two -- -- Xebec -- 10 eps -- Manga -- Action Harem Super Power Ecchi Martial Arts School -- Maken-Ki! Two Maken-Ki! Two -- Takeru continues his education at Tenbi Academy as part of the newly formed Security Committee. As a team with the other members, they battle unscrupulous individuals who use their Maken for evil purposes. In the meantime, his libido and the conflicting romantic interests of the girls surrounding him complicate matters considerably. -- -- (Source: ANN) -- -- Licensor: -- Funimation -- TV - Jan 16, 2014 -- 118,148 6.17
Michiko to Hatchin -- -- Manglobe -- 22 eps -- Original -- Action Adventure -- Michiko to Hatchin Michiko to Hatchin -- Under the unrelenting heat of the South American sun, hardened criminal Michiko Malandro breaks out of a high security prison for the fourth time in search of a man from her past. Michiko finds a clue in the form of Hana Morenos, a young girl trapped under the fists of her abusive foster family. In her powerlessness, Hana fantasizes about the day when she is finally whisked away from her captors by her very own Prince Charming. Little does she know that her fated prince would turn out to be the buxom and husky convict who charges in atop a stolen motorbike, claiming to be her mother. -- -- The unlikely duo chase down their dreams in the sun-drenched land of Diamandra, navigating through the cacophony of betrayal, poverty, and child exploitation rings hiding in plain sight. However, wind of Michiko's manhunt soon reaches the ears of criminal syndicate Monstro Preto, and a storm of gang warfare begins brewing over the horizon… -- -- Michiko to Hatchin is the story of vibrant people and their clashing agendas, and of all the unlikely human connections drawn together by one elusive man. -- -- -- Licensor: -- Funimation -- TV - Oct 16, 2008 -- 153,950 7.85
Mobile Suit Gundam: Iron-Blooded Orphans -- -- Sunrise -- 25 eps -- Original -- Action Drama Mecha Sci-Fi Space -- Mobile Suit Gundam: Iron-Blooded Orphans Mobile Suit Gundam: Iron-Blooded Orphans -- Over three hundred years have passed since the Calamity War, the great conflict between Earth and its outer space colonies. Now Earth is ruled over by four economic blocs, and the military organization Gjallarhorn is responsible for keeping the peace. Mars, on the other hand, depends heavily on Earth's economy. -- -- Horrified by the appalling living conditions that Mars' inhabitants have to bear, Kudelia Aina Bernstein, a young aristocrat from the Chryse Autonomous Region, gets involved in the Red Planet's independence movement. She hires the services of a local company, Chryse Guard Security (CGS), to escort her on the journey to Earth to negotiate economic conditions with the earthly bloc that controls the region. The Third Army Division—consisting of Mikazuki Augus, Orga Itsuka, and many other child soldiers—are chosen to protect her. -- -- When Gjallarhorn attacks the CGS facilities to assassinate the young revolutionary threatening their interests, Orga and his comrades must not let the attackers accomplish their goal—in fact, Gjallarhorn's actions might turn out to be the unintentional catalyst that leads the children to be the forgers of their own destiny. -- -- -- Licensor: -- Funimation -- 172,819 8.03
Naruto: Shippuuden Movie 5 - Blood Prison -- -- Studio Pierrot -- 1 ep -- Manga -- Action Adventure Martial Arts Mystery Shounen Super Power -- Naruto: Shippuuden Movie 5 - Blood Prison Naruto: Shippuuden Movie 5 - Blood Prison -- During their discussion of a sensitive investigation A, the Fourth Raikage, and his subordinates are ambushed by a cloaked intruder. As the Kumogakure leader repels the assault, he is shocked to discover that the culprit is Naruto Uzumaki! -- -- However, the assassination attempt is not the only crime attributed to the young ninja, who vigorously denies the accusations. To avoid a diplomatic conflict, Tsunade forcibly sends him to Kusagakure's Houzuki Castle—a maximum-security penitentiary dedicated to ninja criminals—until the situation is resolved. -- -- Despite his powers being immediately suppressed by Mui, the prison's warden who possesses the ability to seal chakra, Naruto recklessly engages in futile escape attempts. But with the help of two fellow inmates, he realizes that there is more to this legendary detention facility than meets the eye. Uncovering a terrible secret, the trio embarks on a dangerous operation that may be Naruto's only chance to break free and prove his innocence. -- -- -- Licensor: -- VIZ Media -- Movie - Jul 30, 2011 -- 169,645 7.45
Naruto: Shippuuden Movie 5 - Blood Prison -- -- Studio Pierrot -- 1 ep -- Manga -- Action Adventure Martial Arts Mystery Shounen Super Power -- Naruto: Shippuuden Movie 5 - Blood Prison Naruto: Shippuuden Movie 5 - Blood Prison -- During their discussion of a sensitive investigation A, the Fourth Raikage, and his subordinates are ambushed by a cloaked intruder. As the Kumogakure leader repels the assault, he is shocked to discover that the culprit is Naruto Uzumaki! -- -- However, the assassination attempt is not the only crime attributed to the young ninja, who vigorously denies the accusations. To avoid a diplomatic conflict, Tsunade forcibly sends him to Kusagakure's Houzuki Castle—a maximum-security penitentiary dedicated to ninja criminals—until the situation is resolved. -- -- Despite his powers being immediately suppressed by Mui, the prison's warden who possesses the ability to seal chakra, Naruto recklessly engages in futile escape attempts. But with the help of two fellow inmates, he realizes that there is more to this legendary detention facility than meets the eye. Uncovering a terrible secret, the trio embarks on a dangerous operation that may be Naruto's only chance to break free and prove his innocence. -- -- Movie - Jul 30, 2011 -- 169,645 7.45
Noblesse -- -- Production I.G -- 13 eps -- Web manga -- Action School Supernatural Vampire -- Noblesse Noblesse -- The "Noblesse" Cadis Etrama di Raizel, also known as "Rai," is enrolled in Ye Ran High School by his servant Frankenstein to stay hidden from the sights of the Union, a mysterious organization out for Rai's blood. Rai commences his life as a student, making himself familiar with his classmates and the daily activities of humans. However, his new life is far from peaceful, and Rai is soon forced to save his new friends from the hands of the Union that had abducted them. --   -- Meanwhile, M-21—a Union agent gone rogue during Rai's rescue operation—joins the Ye Ran High School security staff after a proposition by the school's director, who happens to be none other than Frankenstein himself. On the surface, M-21 is a prim and proper employee, but in truth he is shackled by his former ties to the Union and the inevitable consequences of betraying the organization. --   -- To further complicate matters, Nobles Regis K. Landegre and Seira J. Loyard enroll in the same school to investigate the Noblesse. While the Union conducts a manhunt for M-21 to extract clues regarding their missing agents, Rai is forced to keep his identity hidden while protecting all that he holds dear. -- -- 177,212 6.82
Ou Dorobou Jing -- -- Studio Deen -- 13 eps -- Manga -- Adventure Comedy Fantasy Sci-Fi Shounen -- Ou Dorobou Jing Ou Dorobou Jing -- Jing may appear to be a young boy, but his remarkable skills make him one of the most feared thieves on the planet. Along with his feathered partner Kir, Jing travels from town to town, stealing anything of value regardless of the amount of security. But when he's in a pinch, he has one more trick up his sleeve: Kir bonds with Jing's right arm to perform the effectively deadly "Kir Royale" attack. And because of all this, Jing is infamously known by many as the "King of Bandits." -- -- Licensor: -- ADV Films -- TV - May 15, 2002 -- 33,425 7.22
Project Scard: Praeter no Kizu -- -- GoHands -- 13 eps -- Other -- Action Super Power -- Project Scard: Praeter no Kizu Project Scard: Praeter no Kizu -- Project Scard depicts the encounters and battles of those who have tattoos which possess the sealed powers of divine beasts and gods. The story is set in the Akatsuki Special Zone, a lawless zone in Tokyo. -- -- "Helios" are those who use the ability of the tattoos to protect the city, "Artemis" are committed to maintain security and control, whilst having a strong commercial motive, and the "Public Security Special Service" are Scard Staff of the metropolitan police department. They live through the turbulent days to keep on going. -- -- (Source: MAL News) -- -- Licensor: -- Funimation -- 22,414 5.78
Rakuen Tsuihou -- -- Graphinica -- 1 ep -- Original -- Action Sci-Fi Mecha -- Rakuen Tsuihou Rakuen Tsuihou -- In a future where a massive disaster has devastated Earth, most of humanity has abandoned their physical bodies and relocated in digital form to DEVA, an advanced space station orbiting the ravaged planet. Free from the limitations of traditional existence, such as death and hunger, the inhabitants of this virtual reality reside in relative peace until Frontier Setter, a skilled hacker, infiltrates the system and spreads subversive messages to the populace. -- -- Labeled a threat to security by authorities, Frontier Setter is pursued by Angela Balzac, a dedicated member of DEVA's law enforcement. When the hacker's signal is traced to Earth, Angela takes on physical form, transferring her consciousness to a clone body and traveling to the world below in order to deal with the menace. On Earth, she is assisted by Dingo, a charismatic agent, and during her journey to uncover the mystery behind Frontier Setter, she gradually discovers startling realities about the wasteland some of humanity still refers to as home, as well as the paradise above. -- -- -- Licensor: -- Aniplex of America -- Movie - Nov 15, 2014 -- 83,758 7.37
Rakuen Tsuihou -- -- Graphinica -- 1 ep -- Original -- Action Sci-Fi Mecha -- Rakuen Tsuihou Rakuen Tsuihou -- In a future where a massive disaster has devastated Earth, most of humanity has abandoned their physical bodies and relocated in digital form to DEVA, an advanced space station orbiting the ravaged planet. Free from the limitations of traditional existence, such as death and hunger, the inhabitants of this virtual reality reside in relative peace until Frontier Setter, a skilled hacker, infiltrates the system and spreads subversive messages to the populace. -- -- Labeled a threat to security by authorities, Frontier Setter is pursued by Angela Balzac, a dedicated member of DEVA's law enforcement. When the hacker's signal is traced to Earth, Angela takes on physical form, transferring her consciousness to a clone body and traveling to the world below in order to deal with the menace. On Earth, she is assisted by Dingo, a charismatic agent, and during her journey to uncover the mystery behind Frontier Setter, she gradually discovers startling realities about the wasteland some of humanity still refers to as home, as well as the paradise above. -- -- Movie - Nov 15, 2014 -- 83,758 7.37
RD Sennou Chousashitsu -- -- Production I.G -- 26 eps -- Original -- Action Sci-Fi -- RD Sennou Chousashitsu RD Sennou Chousashitsu -- 2061 AD. Fifty years have passed since mankind developed the Network society. It was anticipated that this new infrastructure would realize a utopia where people connected with each other at the level of consciousness. However, new social problems such as personal data leaks and proliferation of manipulated information began to surface. Nevertheless, people still relied on the Network to exchange information, and proved unable to opt to abandon it. -- -- In due course, a new Network realm with more effective security measures was developed. This was called Meta Real Network, usually abbreviated as "the Metal." -- -- The Metal accommodated personal memory data within protected virtual stand-alone organic cyber enclaves called bubble shells and eventually pervaded the everyday lives of people. -- -- However, people gradually learned to release and explode their instincts within the secure environment of the Metal. The unleashed instincts pushed each individual's consciousness to drown in the sea of information and to be exposed to the pressures of desire. Meanwhile, norms and regulations continued to bind their real world lives. Thus, strange friction between the two worlds began to manifest themselves as aberrations beyond the bounds of the imaginable. -- -- Experts who challenged the deep sea of the Metal to investigate and decipher such aberrations were called cyber divers. -- -- This is a story of a cyber diver, Masamichi Haru, who investigates the incidents that lie between Reality and the Metal. -- -- (Source: Production I.G) -- 23,293 7.12
Sakura Trick -- -- Studio Deen -- 12 eps -- 4-koma manga -- Slice of Life Comedy Romance School Seinen Shoujo Ai -- Sakura Trick Sakura Trick -- Having been best friends since middle school, Haruka Takayama and Yuu Sonoda plan to attend Misato West High School together. However, despite being assigned to the same class, a cruel twist of fate has them seated on the opposite ends of their classroom! To make matters worse, their school will shut down in three years, making them the final intake of first-year students. Undeterred by this chain of unfortunate events, Haruka is set on sticking with Yuu, striving to create many wonderful memories with her. -- -- Much to Haruka's jealousy however, Yuu's easygoing demeanor quickly attracts the attention of their female classmates. Sympathizing with her friend's growing insecurity, Yuu ends up sharing a deep, affectionate kiss with her in an empty classroom. The act intensifies their bond as "special friends," gradually revealing a different aspect to their unique friendship while also inviting new conflicts. -- -- -- Licensor: -- Sentai Filmworks -- TV - Jan 10, 2014 -- 215,977 7.00
Sakura Trick -- -- Studio Deen -- 12 eps -- 4-koma manga -- Slice of Life Comedy Romance School Seinen Shoujo Ai -- Sakura Trick Sakura Trick -- Having been best friends since middle school, Haruka Takayama and Yuu Sonoda plan to attend Misato West High School together. However, despite being assigned to the same class, a cruel twist of fate has them seated on the opposite ends of their classroom! To make matters worse, their school will shut down in three years, making them the final intake of first-year students. Undeterred by this chain of unfortunate events, Haruka is set on sticking with Yuu, striving to create many wonderful memories with her. -- -- Much to Haruka's jealousy however, Yuu's easygoing demeanor quickly attracts the attention of their female classmates. Sympathizing with her friend's growing insecurity, Yuu ends up sharing a deep, affectionate kiss with her in an empty classroom. The act intensifies their bond as "special friends," gradually revealing a different aspect to their unique friendship while also inviting new conflicts. -- -- TV - Jan 10, 2014 -- 215,977 7.00
Saredo Tsumibito wa Ryuu to Odoru -- -- Seven Arcs Pictures -- 12 eps -- Light novel -- Action Drama Fantasy Sci-Fi -- Saredo Tsumibito wa Ryuu to Odoru Saredo Tsumibito wa Ryuu to Odoru -- It is a world replete with dragons and Jushiki sorcerers. Jushiki is a devastatingly powerful formula that can alter the laws of physics, capable of creating enormous TNT explosives or poisonous gas through plasma and nuclear fusion. A down-on-his-luck sorcerer named Gayus joins forces with the beautiful but cruel Jushiki practitioner, Gigina, as bounty hunters pursuing dragons. Then one day, they are presented with an odd request: to serve as security guards for a grand festival put on by Mouldeen, the ruler of their kingdom. It is then that a mysterious serial killing of Jushiki sorcerers begins. -- -- (Source: TBS Global Business) -- -- Licensor: -- Funimation -- 47,289 5.81
Seihou Tenshi Angel Links -- -- Sunrise -- 13 eps -- Novel -- Action Adventure Space Comedy Romance Drama Sci-Fi -- Seihou Tenshi Angel Links Seihou Tenshi Angel Links -- Li Meifon is the head of a free, no expenses paid protection/security agency for escorting ships across outer space. Though only 16, she posesses great skill and leadership qualities while commanding her crew aboard their ship, the "Angel Links." However, some unpleasant memories begin to trouble her and she starts questioning her own past and reason for existence. Join Li Meifon and the rest of the Angel Links crew on their adventures through the Oracion star system as they battle pirates, government organizations, and a Tao master, all while finally uncovering Meifon's dark and mysterious past. -- -- Licensor: -- Bandai Entertainment, Funimation -- 7,571 5.96
Solty Rei -- -- Gonzo -- 24 eps -- Original -- Action Sci-Fi Super Power -- Solty Rei Solty Rei -- In a future-based disaster-ridden city with an enormous gap between the rich and the poor, it is hard to tell which humans are walking around with cybernetic body parts. This makes Roy Revant's job as a renegade bounty hunter/bodyguard-for-hire even more difficult. When a young girl with unbeliveable strength rescues him from a particularly dangerous criminal, Roy realizes that perhaps help can be found in the strangest of places. Joining together with a few others, they engage in a battle to find out the truth behind the giant conglomerates that are supposedly serving mankind and making life better. -- -- Solty, an android who has lost her memory, has escaped and is being hunted by the RUC Security Bureau. She encounters the bounty hunter Roy and he adopts her as his daughter after being hired as a bodygaurd for Miranda. -- -- (Source: ANN) -- -- Licensor: -- Funimation -- 25,949 7.27
Space Cobra -- -- Tokyo Movie Shinsha -- 31 eps -- Manga -- Action Adventure Sci-Fi Space -- Space Cobra Space Cobra -- Meek salaryman Johnson discovers that he is in fact the notorious (and reportedly dead) space pirate Cobra, with a new face and altered memories. Embedded in his left arm is Cobra's unique Psychogun, a famous weapon powered by his own will. Having recovered his past, his partner-in-crime Armaroid Lady, and his spaceship, he journeys across the galaxy seeking adventure. -- -- On his travels he will hunt for the galaxy's ultimate weapon, rob museums, break into and out of maximum-security prison, infiltrate a drug ring in the brutal and deadly sport of Rugball, engineer a coup on an alien world, confront the Pirate Guild's most fearsome leaders, and do much else besides—smoking cigars, chasing women and cracking jokes all the while. -- -- This, the 1982–83 Cobra TV anime, adapts the Cobra manga from the beginning, covering the first three major stories and building to a grand conclusion with some shorter one-off tales interspersed along the way. (The 1982 Cobra film has only a loose connection to the TV series—though it involved the same director and some of the same animators.) -- -- Licensor: -- Discotek Media, Nozomi Entertainment -- TV - Oct 7, 1982 -- 16,559 7.70
Summer Wars -- -- Madhouse -- 1 ep -- Original -- Sci-Fi Comedy -- Summer Wars Summer Wars -- OZ, a virtual world connected to the internet, has become extremely popular worldwide as a spot for people to engage in a large variety of activities, such as playing sports or shopping, through avatars created and customized by the user. OZ also possesses a near impenetrable security due to its strong encryption, ensuring that any personal data transmitted through the networks will be kept safe in order to protect those who use it. Because of its convenient applications, the majority of society has become highly dependent on the simulated reality, even going as far as entrusting the system with bringing back the unmanned asteroid explorer, Arawashi. -- -- Kenji Koiso is a 17-year-old math genius and part-time OZ moderator who is invited by his crush Natsuki Shinohara on a summer trip. But unbeknownst to him, this adventure requires him to act as her fiancé. Shortly after arriving at Natsuki's family's estate, which is preparing for her great-grandmother's 90th birthday, he receives a strange, coded message on his cell phone from an unknown sender who challenges him to solve it. Kenji is able to crack the code, but little does he know that his math expertise has just put Earth in great danger. -- -- -- Licensor: -- Funimation, GKIDS, Warner Bros. Japan -- Movie - Aug 1, 2009 -- 435,444 8.08
Wo de Tian Jie Nu You -- -- - -- 15 eps -- Web manga -- Adventure Super Power Supernatural Romance Fantasy -- Wo de Tian Jie Nu You Wo de Tian Jie Nu You -- In the modern cultivation world, everywhere is law of the jungle, everyone feels insecure. After saving a cultivatior girl, the security guard Ma Yingxiong accidentally starts the journey of practicing cultivation. -- -- (Source: Guodong Subs) -- ONA - Sep 20, 2017 -- 20,163 6.55
Wonderful Days -- -- - -- 1 ep -- Original -- Action Drama Romance Sci-Fi -- Wonderful Days Wonderful Days -- Set in 2142, Wonderful Days depicts a world that has been nearly destroyed by environmental pollution. Human life as we know it is almost extinct, and only a few were able to pull through the collapse of Earth's ecosystem. In order to deal with the chaos, a city named Ecoban was created. The city uses the very pollution that caused the disaster as an energy source. -- -- However, although the initial plan was successful to an extent, it didn't just create a new source of energy, but also an elite group of people. This prestigious faction believes that they are above the system, and are not willing to accept survivors from outside the city unless they are put to work as laborers. -- -- Among the people living in the wasteland outside Ecoban is a young man named Shua. He leads a very difficult life, but tries to make the most of it through the love that he feels for his childhood friend Jay. Unfortunately, Jay may be more interested in her security commander Cade than in Shua, and thus a love triangle is formed. Not only does Shua have to deal with the heartbreak, but he must also find a new way to survive in the crumbles left from the once-beautiful planet Earth. -- Movie - Jul 17, 2003 -- 31,680 7.04
https://wiki.archlinux.org/index.php/Arch_package_guidelines/Security
https://wiki.archlinux.org/index.php/Arch_package_security
https://wiki.archlinux.org/index.php/Arch_Security_Team
https://wiki.archlinux.org/index.php/ArchWiki:Privacy_policy#Our_commitment_to_data_security
https://wiki.archlinux.org/index.php/Category:Security
https://wiki.archlinux.org/index.php/Category:Security_testing
https://wiki.archlinux.org/index.php/Category_talk:Security
https://wiki.archlinux.org/index.php/Category:Transport_Layer_Security
https://wiki.archlinux.org/index.php/General_recommendations#DNS_security
https://wiki.archlinux.org/index.php/Getting_involved#Inform_about_security_issues
https://wiki.archlinux.org/index.php/List_of_applications#File_security
https://wiki.archlinux.org/index.php/List_of_applications#Network_security
https://wiki.archlinux.org/index.php/List_of_applications/Security
https://wiki.archlinux.org/index.php/List_of_applications#Security
https://wiki.archlinux.org/index.php/List_of_applications/Security#Cryptography
https://wiki.archlinux.org/index.php/List_of_applications/Security#Password_managers
https://wiki.archlinux.org/index.php/Network_Security_Services
https://wiki.archlinux.org/index.php/Security
https://wiki.archlinux.org/index.php/Security#Sandboxing_applications
https://wiki.archlinux.org/index.php/Special:Search?search="python-flask-security-too"
https://wiki.archlinux.org/index.php/Transport_Layer_Security
https://wiki.archlinux.org/index.php/Transport_Layer_Security#Implementations
https://commons.wikimedia.org/wiki/Category:Food_security
https://commons.wikimedia.org/wiki/Category:Media_from_Agriculture_&_Food_Security
https://commons.wikimedia.org/wiki/Commons:Copyright_tags/Country-specific_tags#Department_of_Homeland_Security
https://commons.wikimedia.org/wiki/File:National_Security_Adviser_Brent_Scowcroft_during_discussions_on_the_evacuation_of_Americans_in_Lebanon,_June_1976_-_NARA_-_7064956.jpg
https://commons.wikimedia.org/wiki/File:National_Security_Advisor_Brent_Scowcroft_at_a_meeting_following_the_assassinations_in_Beirut,_1976_-_NARA_-_7064964.jpg
https://commons.wikimedia.org/wiki/File:Public_Security_LLC_cruiser_in_Baltimore_during_Riot_on_May_1st_2015.jpg
102d Security Forces Squadron
1st Security Force Assistance Brigade
2006 transatlantic aircraft plot security reaction
2007 Latvian security laws referendum
2010 Nuclear Security Summit
2010 Rio de Janeiro security crisis
2012 Moldova security zone incident
2012 Nuclear Security Summit
2013 MSS Security V8 Supercars Challenge
2013 Wilson Security Sandown 500
2014 international conferences on Iraqi security
2014 Nuclear Security Summit
2014 Wilson Security Sandown 500
2015 Indian Border Security Force King Air crash
2015 Wilson Security Sandown 500
2016 Nuclear Security Summit
2016 Wilson Security Sandown 500
2017 Wilson Security Sandown 500
2018 Dutch Intelligence and Security Services Act referendum
20192020 Department of Homeland Security appointment disputes
201st Security Division (Wehrmacht)
203rd Security Division (Wehrmacht)
207th Security Division (Wehrmacht)
213th Security Division (Wehrmacht)
221st Security Division (Wehrmacht)
281st Security Division (Wehrmacht)
285th Security Division (Wehrmacht)
286th Security Division (Wehrmacht)
3D security
3rd Security Force Assistance Brigade
403rd Security Division
435th Security Forces Squadron
444th Security Division (Wehrmacht)
454th Security Division (Wehrmacht)
586th Expeditionary Security Forces Squadron
5th Security Force Assistance Brigade
6933d Electronic Security Squadron
732nd Expeditionary Security Forces Squadron
886th Expeditionary Security Forces Squadron
AAA (computer security)
Act of Security 1704
Administration for Security and Counterintelligence
Administrative Department of Security
Aetos Security Management
Afghan National Security Forces
African Security Review
Agency for Sustainable and Operational Social Security
Agency security
Aid Worker Security Database
Air Forces Northern National Security Emergency Preparedness Directorate
Airport security
Airport Security Police (Argentina)
Airport Security Police (Bermuda)
Airport security repercussions due to the September 11 attacks
Airport Security Unit
Airport Security Unit (Hong Kong)
Airports Security Force
Alaska Division of Homeland Security & Emergency Management
Albanian National Security Party
AMD Platform Security Processor
America's Climate Security Act of 2007
American Civil Liberties Union v. National Security Agency
American Clean Energy and Security Act
American Security and Trust Company Building
American Security Council Foundation
Americans for Job Security
Anti-terrorism, Crime and Security Act 2001
Application security
Area 25 (Nevada National Security Site)
Area 27 (Nevada National Security Site)
Area 2 (Nevada National Security Site)
Area of freedom, security and justice
Area Police/Private Security Liaison
Argenbright Security
Argentine Interior Security System
Argus Cyber Security
Arrow security
Asgaard German Security Group
Asia-Pacific Center for Security Studies
Asset-backed security
Asset (computer security)
Assistant Secretary of Defense for Homeland Defense and Americas' Security Affairs
Assistant Secretary of Defense for Indo-Pacific Security Affairs
Assistant Secretary of Defense for International Security Affairs
Assistant to the President and Deputy National Security Advisor for Iraq and Afghanistan
AT&T Cybersecurity
Auction rate security
AustraliaIndonesia Security Agreements
Australian Security Intelligence Organisation
Aviation and Transportation Security Act
Aviation Security Operational Command Unit
Aviation Security Stakeholder Participation Act of 2013
Awards of the Federal Security Service of the Russian Federation
AzerbaijanOrganization for Security and Co-operation in Europe relations
Badge of the Communications Security Establishment
Ballot Security Task Force
Bangladesh Institute of Peace & Security Studies
Beijing Municipal Public Security Bureau
Belgian General Information and Security Service
Beyond Fear: Thinking Sensibly About Security in an Uncertain World
Biologically Inspired Tactical Security Infrastructure
Biosecurity
Biosecurity Act 1993
Biosecurity Act 2015
Biosecurity in Australia
Biosecurity in New Zealand
Blacker (security)
Black hat (computer security)
Black Sea Security
BlueBorne (security vulnerability)
Boeing Defense, Space & Security
Border Security
Border Security: Canada's Front Line
Border Security, Economic Opportunity, and Immigration Modernization Act of 2013
Border Security Force
Border Security Zone of Russia
Border Service of the Federal Security Service of the Russian Federation
BPO security
Brian Lord (cyber security expert)
BrickHouse Security
Brinks Home Security
British Security Co-ordination
British security forces
British Security Industry Association
Browser security
BT Managed Security Solutions
Budapest Memorandum on Security Assurances
Bureau of Civil Aviation Security
Bureau of Diplomatic Security
Bureau of Diplomatic Security bibliography
Bureau of Industry and Security
Bureau of International Security and Nonproliferation
Business Executives for National Security
Cabinet Committee on National Security (Pakistan)
Cabinet National Security Committee (New Zealand)
Cabinet Secretary for Social Security and Older People
Canadian Air Transport Security Authority
Canadian Centre for Cyber Security
Canadian Security Intelligence Service
Capability-based security
Card security code
Carmichele v Minister of Safety & Security
Cebu Declaration on East Asian Energy Security
Center for Advanced Security Research Darmstadt
Center for a New American Security
Center for Borderless Security Doctrinal Analysis
Center for Health and Homeland Security
Center for Homeland Defense and Security
Center for International Maritime Security
Center for International Security and Cooperation
Center for Internet Security
Center for Research and Security Studies
Center for Research in Security Prices
Center for Security Policy
Center for Security Studies
Centigon Security Group
Central Directorate of Public Security
Central European Journal of International and Security Studies
Central Industrial Security Force
Central Industrial Security Force Act
Central Office for Information Technology in the Security Sector
Central Oregon Jobs and Water Security Act
Central Public Security Comprehensive Management Commission
Central Registry of Securitisation Asset Reconstruction and Security Interest
Central Registry of War Criminals and Security Suspects
Central Security Bureau of the Chinese Communist Party
Central Security Forces
Central Security Service
Centre for Cybersecurity & Cybercrime Investigation
Centre for Defence and International Security Studies
Centre for Research on Energy Security
Centre of Excellence for Biosecurity Risk Analysis
Centre of Excellence on Public Security
Certificate Authority Security Council
Certified Information Systems Security Professional
Certified Payment-Card Industry Security Auditor
Certified Payment-Card Industry Security Manager
Certified Wireless Security Professional
Chartered Security Professional
Charter of the Australian Security Intelligence Organization
Chhattisgarh Special Public Security Act
Chicago Project on Security and Threats
Chief information security officer
Chief security officer
China Fire and Security Group
Christopher Boyd (IT security)
Chronicle Security
Chubb Fire & Security
CIA Security International SA v Signalson SA and Securitel SPRL
Cipher security summary
Cisco Security Monitoring, Analysis, and Response System
Citizen Advisors on the Mutual Security Program
Climate security
C-list (computer security)
Cloud access security broker
Cloud computing security
Cloud Security Alliance
Coalition for Peace through Security
Code Access Security
Collective security
Collective Security Treaty Organization
Colombian National Police Directorate for Citizens Security
Combined Security Transition Command Afghanistan
Commercial mortgage-backed security
Commissioner v. First Security Bank of Utah, N.A.
Commission on Security and Cooperation in Europe
Committee for Peace and Security in the Gulf
Committee of General Security
Committee on International Security and Arms Control
Committee on National Security Systems
Committee on World Food Security
Common Foreign and Security Policy
Common Security and Defence Policy
Common Security and Defence Policy Service Medal
Commonwealth Security Services
Communications security
Communications Security Establishment
Community food security
Community of interest (computer security)
Community Security Trust
Comodo Cybersecurity
Comodo Internet Security
Compartmentalization (information security)
Comprehensive National Cybersecurity Initiative
Comprehensive Social Security Assistance
Computer Law & Security Review
Computer security
Computer Security Act of 1987
Computer security conference
Computer security incident management
Computer security model
Computer security software
Concrete security
Conference on Security and Co-operation in Europe
Conference on Security, Stability, Development, and Cooperation
Connecticut Department of Emergency Management and Homeland Security
Conservation Security Program
Content security
Control system security
Convertible security
Cooperative security location
Coordinating Minister for National Security (Singapore)
Coordinating Ministry for Political, Legal, and Security Affairs (Indonesia)
Core Security Technologies
Corporate security
Costa Rican Social Security Fund
Council for National Defense and Security (Vietnam)
Council for National Security
Council for Security Cooperation in the Asia Pacific
Council of Political and Security Affairs (Saudi Arabia)
Counter-Terrorism and Security Act 2015
Court security officer
Covered security
CREW and National Security Archive v. Trump and EOP
Critical security parameter
Critical security studies
Croatian security and intelligence system
Croma Security
Crown Agents Philatelic and Security Printing Archive
Cyberbiosecurity
Cyber Security and Crime Division
Cyber Security and Information Systems Information Analysis Center
Cybersecurity and Infrastructure Security Agency
Cybersecurity and Infrastructure Security Agency Act
Cyber security awareness
Cyber Security Collaborative Research Alliance
Cybersecurity Information Sharing Act
Cybersecurity information technology list
Cybersecurity Law of the People's Republic of China
Cybersecurity rating
Cyber-security regulation
Cybersecurity standards
D3 Security Management Systems
Danish Security and Intelligence Service
Data center security
Datagram Transport Layer Security
Data security
Data Security Threats Database
DBS National Security Vetting
D-Day Daily Telegraph crossword security alarm
DEA Office of National Security Intelligence
Defence & Security Organisation
Defence and Internal Security Volunteer Reservists Medal
Defence and Security Media Advisory Committee
Defence Security and Vetting Service
Defence Security Corps
Defending American Security from Kremlin Aggression Act
Defense Counterintelligence and Security Agency
Defense Security Command
Defense Security Cooperation Agency
Delegation (computer security)
Delivering Security in a Changing World
Democracy and Security
Democratic security
Department for Protection and Security
Department of Health and Social Security
Department of Health and Social Security (Isle of Man)
Department of Homeland Security Appropriations Act, 2007
Department of Homeland Security Appropriations Act, 2014
Department of Homeland Security Interoperable Communications Act
Department of Homeland Security Office of Inspector General
Department of Homeland Security Port Security Grant
Department of Homeland Security (Spain)
Department of Homeland Security v. Regents of the University of California
Department of Homeland Security v. Thuraissigiam
Department of Social Security (United Kingdom)
Deputy Director of the National Security Agency
DHS Border and Maritime Security Division
Digital Security Agency
Digital Transition Content Security Act
Diplomatic Security Service
Directive for the Establishment and Maintenance of a Security Service
Directorate-General for External Security
Directorate-General for Human Resources and Security
Directorate General for the Public Security
Directorate of Carabineers and Rural Security
Directorate of General Security
Director for Security Liaison
Director-General of Security
Director General of the National Security Guard
Director of Military Intelligence and Security
Director of Security of the Defense Establishment
Director of the Cybersecurity and Infrastructure Security Agency
Director of the Federal Security Service
Director of the National Security Agency
Discrimination and National Security Initiative
Distributed System Security Architecture
Domain Based Security
Domain Name System Security Extensions
Domestic Security Enhancement Act of 2003
Door security
Draft:Bond (personal security platform)
Draft:Cybersecurity Maturity Model Certification
Draft:Internet security with Linux
Draft:Joe Sullivan (computer security)
Draft:Maritime security in the Black Sea
Drug Quality and Security Act
Dutch Military Intelligence and Security Service
Dynamic application security testing
Eastern Sabah Security Command
Eastern Sabah Security Zone
Economics of security
Economists for Peace and Security
ELearnSecurity
Electricity Security and Affordability Act
Elements of national security
Emotional security
Employee Benefits Security Administration
Employee Retirement Income Security Act of 1974
Employees' Pension Security Act
Endpoint security
Energy Independence and Security Act of 2007
Energy security
Energy Security Act
Energy security of the People's Republic of China
Enhanced Border Security and Visa Entry Reform Act of 2002
Enterprise information security architecture
Environmental security
Equality of Treatment (Social Security) Convention, 1962
ERP security
Estonian Academy of Security Sciences
Estonian Internal Security Service
Estonian Security Police and SD
Eternal security
European Association of Bodies and Public Organizations of Security and Defense
European Forum for Urban Security
European Parliament Subcommittee on Security and Defence
European Security
European Security and Defence College
European Security Strategy
European Strategic Intelligence and Security Center
European Union Agency for Cybersecurity
European Union Institute for Security Studies
European Union Maritime Security Strategy
Experimental Security University
Exploit (computer security)
Fake security camera
Farm Security Administration
Farm Security and Rural Investment Act of 2002
FBI National Security Branch
Federal Academy for Security Policy
Federal Information Security Management Act of 2002
Federal Information Security Modernization Act of 2014
Federal Lands Jobs and Energy Security Act
Federal Office for Information Security
Federal Public Service Social Security
Federal Security Force (Pakistan)
Federal Security Service
Feminist security studies
Fidelis Cybersecurity
Financial security
Finnish Security Intelligence Service
First Security Bank
First Security Bank (Missoula, Montana)
First Security Bank Montana
Food security
Food Security Act of 1985
Food security during the COVID-19 pandemic
Food security in Ethiopia
Food security in Madagascar
Food security in Malawi
Food security in Mozambique
Food security in the Central Valley, California
Ford Institute for Human Security
Foreign Investment and National Security Act of 2007
Foreign Policy and Security Research Center
Fortune Brands Home & Security
Foundation for Ecological Security
Fred Burton (security expert)
Full disclosure (computer security)
Galmudug Security Force
Garda Crime and Security Branch
Gendarmerie Special Public Security Command
Gender and food security
Gender and security sector reform
General Directorate for Internal Security
General Directorate for National Security
General Directorate of General Security
General Directorate of National Security
General Directorate of Public Security
General Directorate of Security (Turkey)
General Intelligence and Security Service
Generalized TTL security mechanism
General Security Directorate
General Security Directorate (Iraq)
General Security Service
Generic Security Service Algorithm for Secret Key Transaction
Generic Security Services Application Program Interface
Geneva Centre for Security Policy
Gentle Man Security
George C. Marshall European Center for Security Studies
Georgia Emergency Management and Homeland Security Agency
Gerardo Hernandez Airport Security Act of 2014
German Institute for International and Security Affairs
Ghost Security
Global Center on Cooperative Security
Global Change, Peace & Security
Global Food Security Index
Global Security Contingency Fund
Global Security Institute
GlobalSecurity.org
Global Security Review
Goatse Security
Government Communications Security Bureau
Government Communications Security Bureau Act 2003
Grid Security Infrastructure
GRIPS-Security and International Studies Program, Tokyo
Guard (information security)
Hardware security module
Hash function security summary
Helvenston v. Blackwater Security
High-Level Conference on World Food Security
High Representative of the Union for Foreign Affairs and Security Policy
High Tech Gays v. Defense Industrial Security Clearance Office
High-water mark (computer security)
History of the Common Security and Defence Policy
Homeland security
Homeland Security Act of 2002
Homeland Security Advisor
Homeland Security Advisory Council
Homeland Security Advisory System
Homeland Security Centers of Excellence
Homeland Security Committee
Homeland Security Cybersecurity Boots-on-the-Ground Act
Homeland Security Distinguished Service Medal
Homeland Security (film)
Homeland Security Grant Program
Homeland Security Information Network
Homeland Security Presidential Directive 7
Homeland Security Presidential Directive 8
Homeland Security Presidential Directive 9
Homeland Security USA
Home security
Honduran Social Security Institute
Hong Kong national security law
HP Application Security Center
HRU (security)
HTTP Strict Transport Security
Humancomputer interaction (security)
Human security
Human Security Act
Human Security Report 2005
Human Security Report Project
IBM Internet Security Systems
Identity-based security
IEEE Transactions on Information Forensics and Security
IET Information Security
Ila Detention and Security Prison
Indigenous food security in Canada
Indonesian Maritime Security Agency
Information and Security Service of the Republic of Moldova
Information security
Information security audit
Information security awareness
Information Security Forum
Information security management
Information security operations center
Information Security Oversight Office
Information Systems Security Association
Information technology security assessment
Information-theoretic security
Infrastructure security
InSecurity
Insecurity
Inspector-General of Intelligence and Security
Institute for Law, Science and Global Security
Institute for National Defense and Security Research
Institute for National Security Studies
Institute for National Security Studies (Israel)
Institute for Peace and Security Studies
Institute for Science and International Security
Institute for Security Studies
Institute for the Protection and Security of the Citizen
Institute of Information Security Professionals
Institutional Security Office of Brazil
Integrated Food Security Phase Classification
Integrated Security Unit
Intelligence and National Security
Intelligence and National Security Alliance
Intelligence and Security Committee of Parliament
Inter-Con Security
Internal security
Internal Security Act
Internal Security Act 1960
Internal Security Act (Singapore)
Internal Security Assessor
Internal Security Corps
Internal Security Department
Internal Security Department (Singapore)
Internal Security Forces
Internal Security Operations Command
Internal Security Organisation
Internal Security Unit
Internal security vehicle
International Centre for Sport Security
International Computer Security Association
International Conference on Availability, Reliability and Security
International Conference on Information Systems Security and Privacy
International Forum on Energy Security for the Future
International security
International Security Assistance Force
International Security (journal)
International Security Research and Intelligence Agency
International Ship and Port Facility Security Code
International Social Security Association
International Social Security Review
Internet Provider Security
Internet security
Internet Security Association and Key Management Protocol
Iranian Security Police
Iraqi security forces
Iraqi Special Security Organization
Irish security forces
Israeli security forces
Israeli Security Zone
Issues in retirement security
ITF Enhancing Human Security
ITIL security management
James Kennedy (security guard)
Jamie Foxx: I Might Need Security
Java security
Jewish Institute for National Security of America
Job security
Johns Hopkins Center for Health Security
Joint Security Area
Joint Security Area (film)
Journal of Asian Security and International Affairs
Journal of Cybersecurity
Justice and Security Act 2013
Kamiti Maximum Security Prison
Kaspersky Internet Security
Kensington Security Slot
King Fahd Security College
Knightsbridge Security Deposit robbery
Knight Security Systems
Korea Internet & Security Agency
Korea Minting and Security Printing Corporation
Kosovo Security Force
Kratos Defense & Security Solutions
Labeled Security Protection Profile
Language-based security
LebaneseSyrian Security Apparatus
Levels of identity security
Lightweight Portable Security
Linguistic insecurity
Linux Security Modules
List of Afghan security forces fatality reports in Afghanistan
List of Chiefs of the General Directorate of Security (Turkey)
List of computer security certifications
List of Iraqi security forces fatality reports in Iraq
List of members of the United Nations Security Council
List of post-war social security reforms in Italy
List of private security companies
List of rogue security software
List of Scientology security checks
List of security hacking incidents
List of United Nations Security Council Resolutions 1001 to 1100
List of United Nations Security Council Resolutions 101 to 200
List of United Nations Security Council Resolutions 1101 to 1200
List of United Nations Security Council Resolutions 1201 to 1300
List of United Nations Security Council Resolutions 1301 to 1400
List of United Nations Security Council Resolutions 1401 to 1500
List of United Nations Security Council Resolutions 1501 to 1600
List of United Nations Security Council Resolutions 1601 to 1700
List of United Nations Security Council Resolutions 1701 to 1800
List of United Nations Security Council Resolutions 1 to 100
List of United Nations Security Council Resolutions 201 to 300
List of United Nations Security Council Resolutions 2101 to 2200
List of United Nations Security Council Resolutions 2401 to 2500
List of United Nations Security Council Resolutions 2501 to 2600
List of United Nations Security Council Resolutions 301 to 400
List of United Nations Security Council Resolutions 401 to 500
List of United Nations Security Council Resolutions 501 to 600
List of United Nations Security Council Resolutions 601 to 700
List of United Nations Security Council Resolutions 701 to 800
List of United Nations Security Council Resolutions 801 to 900
List of United Nations Security Council Resolutions 901 to 1000
List of United Nations Security Council resolutions concerning Cyprus
List of United Nations Security Council resolutions concerning Iraq
List of United Nations Security Council resolutions concerning North Korea
List of United Nations Security Council resolutions on the Nagorno-Karabakh conflict
List of United Nations Security Council Resolutions related to the conflicts in former Yugoslavia
List of vetoed United Nations Security Council resolutions
List of White House security breaches
Lithuanian Security Police
Live at Chelmsford Top Security Prison
Li Zhen (Minister of Public Security)
Local Security Authority Subsystem Service
Logical security
Logjam (computer security)
Lookout (IT security)
Los Alamos National Security
M1117 Armored Security Vehicle
M86 Security
Macau national security law
Mace Security International
Macro and security
Managed security service
Marine Corps Security Force Battalion Bangor
Marine Corps Security Force Regiment
Marine Security Belt
Marine Security Guard
Maritime Civil Affairs and Security Training Command
Maritime Security Agency
Maritime security operations
Maritime Security Regimes
Maritime Security Risk Analysis Model
Maritime security (USCG)
Maritime Transportation Security Act of 2002
Market Investigations Ltd v Minister for Social Security
Massachusetts Executive Office of Public Safety and Security
Master of Science in Cyber Security
Masters Security FC
Maximum Security
Maximum Security (comics)
Maximum Security (horse)
Maximum Security (novel)
Maximum security prison
Maximum Security Prison, Robben Island
Maximum Security (TV series)
Max Planck Institute for Security and Privacy
Max Planck Institute for the Study of Crime, Security and Law
McCarran Internal Security Act
McMaster University Security Service
Meltdown (security vulnerability)
Mershon Center for International Security Studies
Messaging Layer Security
Metrocom Intelligence and Security Group
Mexican Social Security Institute
Microsoft Baseline Security Analyzer
Microsoft Security Development Lifecycle
Microsoft Security Essentials
Miles Taylor (security expert)
Military Intelligence and Security Service
Military Security Agency
Military Security and Intelligence Agency (Croatia)
Military Security Command of the Korean People's Army
Military Security Shield Forces
Minister for International Security Strategy
Minister for Security
Minister for Social Security
Minister of Internal Security
Minister of Justice and Public Security
Minister of Safety & Security v Hamilton
Minister of Safety & Security v Van Duivenboden
Ministry for National Security (Turkmenistan)
Ministry of Agriculture, Food Security and Cooperatives
Ministry of Agriculture, Forestry and Food Security
Ministry of Defence and National Security (Sierra Leone)
Ministry of Defence, Justice and Security (Botswana)
Ministry of Home Security
Ministry of Human Resources and Social Security
Ministry of Inclusion, Social Security and Migration
Ministry of Internal Security
Ministry of Internal Security (Malaysia)
Ministry of Justice and Public Security
Ministry of Justice and Public Security (Brazil)
Ministry of Justice and Public Security (Haiti)
Ministry of Justice and Security
Ministry of Labour and Social Security
Ministry of Labour and Social Security (Jamaica)
Ministry of Labour, Employment and Social Security
Ministry of Labour, Employment and Social Security (Myanmar)
Ministry of Labour, Employment and Social Security (Nepal)
Ministry of Labour, Solidarity and Social Security
Ministry of Manpower and Income Security (Quebec)
Ministry of National Food Security & Research
Ministry of National Security
Ministry of National Security (Bahamas)
Ministry of National Security (Jamaica)
Ministry of National Security of Azerbaijan
Ministry of Public Safety and Security
Ministry of Public Security
Ministry of Public Security (China)
Ministry of Public Security (Israel)
Ministry of Public Security (Laos)
Ministry of Public Security (Poland)
Ministry of Public Security (Quebec)
Ministry of Public Security (Vietnam)
Ministry of Security and Public Administration
Ministry of Social Development and Human Security (Thailand)
Ministry of Social Security
Ministry of Social Security and Labour (Lithuania)
Ministry of Social Security (Brazil)
Ministry of Social Security (North Korea)
Ministry of the Interior and Public Security (Chile)
Ministry of the Interior and Security (Democratic Republic of the Congo)
Ministry of the Public Security (Brazil)
Ministry of Welfare and Social Security
Ministry of Women & Child Affairs and Social Security
Ministry of Work, Employment, and Social Security
Minnesota Security Hospital
MIRACL (security firm)
Mitama Security: Spirit Busters
Mobile security
Mobile Security Deployment
ModSecurity
Mortgage-backed security
Multilevel security
Multi-National Security Transition Command Iraq
Munich Security Conference
Napco Security Technologies
National College of Cyber Security
National Committee to Preserve Social Security and Medicare
National Council for Social Security Fund
National Counterintelligence and Security Center
National Counter Terrorism Security Office
National Cybersecurity and Communications Integration Center
National Cybersecurity and Critical Infrastructure Protection Act of 2013
National Cybersecurity Center
National Cybersecurity Center of Excellence
National Cyber Security Centre
National Cyber Security Centre (Ireland)
National Cyber Security Centre (United Kingdom)
National Cyber Security Division
National Cyber Security Hall of Fame
National Cyber Security Policy 2013
National Directorate of Security
National Food Security Act, 2013
National Health Security Strategy
National Industrial Security Program
National Infrastructure Security Co-ordination Centre
National Institute on Retirement Security
National Intelligence and Security Agency
National Nuclear Security Administration
National Organization of Social Security Claimants' Representatives
National People's Congress decision on Hong Kong national security legislation
National Police Agency Security Bureau (Japan)
National Public Security Force
National Science Advisory Board for Biosecurity
National security
National Security (2012 film)
National Security Act
National Security Act 2017 (Canada)
National Security Action Memorandum 263
National Security Action Memorandum 273
National Security Act of 1947
National Security Act (South Korea)
National Security Adviser (Nigeria)
National Security Adviser (United Kingdom)
National security advisor
National Security Advisor (Canada)
National Security Advisor (India)
National Security Advisor (Pakistan)
National Security Agency
National Security Agency academic publications
National Security Agency (Bahrain)
National Security Agency (Egypt)
National Security Agency in popular culture
National Security and Defense Council of Ukraine
National Security and Homeland Security Presidential Directive
National Security and Intelligence Committee of Parliamentarians
National Security and Intelligence Review Agency
National Security and Nuclear Diplomacy
National Security Archive
National Security Area
National Security Authority (Norway)
National Security Bureau
National Security Bureau of the Arab Socialist Ba'ath Party Syria Region
National Security Bureau (Slovakia)
National Security Bureau (Taiwan)
National Security Commission of the Chinese Communist Party
National Security Committee (Australia)
National Security Committee (Ireland)
National Security Committee (Kazakhstan)
National Security Coordination Secretariat
National Security Corps
National Security Council
National Security Council Act 2016
National Security Council (Croatia)
National Security Council (Czech Republic)
National Security Council (Georgia)
National Security Council (India)
National Security Council (Israel)
National Security Council (Pakistan)
National Security Council (Saudi Arabia)
National Security Council (Slovenia)
National Security Council (Sri Lanka)
National Security Council (Taiwan)
National Security Council (Turkey)
National Security Council (United Kingdom)
National security directive
National security (disambiguation)
National Security Division
National Security Education Program
National Security Entry-Exit Registration System
National security group
National Security Guard
National Security Higher Education Advisory Board
National Security Innovation Network
National Security Language Initiative
National Security Law
National Security Law Journal
National Security Law of the People's Republic of China
National security letter
National security of Bulgaria
National security of China
National security of Colombia
National security of Germany
National Security Operations Center
National Security Organization
National Security Resources Board
National Security Service
National Security Service (Armenia)
National Security Service (Greece)
National Security Service (Turkey)
National Security Space Launch
National Security Strategy
National Security Strategy (United Kingdom)
National Security Study Memorandum 200
National Security Surveillance Act
National Security Telecommunications and Information Systems Security Advisory Memoranda
National Security Whistleblowers Coalition
National Social Security Fund
National Social Security Fund (Uganda)
National Social Security Workers Union
National Special Security Event
NATO Science for Peace and Security
Nautilus Institute for Security and Sustainability
Naval Security Group
Naval Security Group Activity, Winter Harbor
Network interface layer security
Network security
Network security policy
Neurosecurity
New Jersey Cybersecurity and Communications Integration Cell
New Orleans security districts
New Zealand Security Intelligence Service
NHS Counter Fraud and Security Management Service Division
Nigerian Security Printing and Minting Company Limited
No. 1 Security Forces Squadron RAAF
No. 2 Security Forces Squadron RAAF
No. 3 Security Forces Squadron RAAF
North Africa Security and Order Operations Commemorative Medal
Northern Ireland Security Guard Service
Norton Internet Security
Norton Security
Norwegian Defence Security Department
Norwegian Government Security and Service Organisation
Norwegian Police Security Service
Nuclear safety and security
Nuclear Security Summit
Offensive Security
Offensive Security Certified Professional
Office for Safeguarding National Security of the CPG in the HKSAR
Office for Security and Counter-Terrorism
Office of the National Security Council
Officials Committee for Domestic and External Security Co-ordination
Offshore installation security
Oklahoma Employment Security Commission
Oklahoma Office of Homeland Security
Old Age Security
OpenBSD security features
Open security
Open Security Foundation
Open Source Security Foundation
Open-source software security
Operations security
Oppenheimer security hearing
Optiv (cybersecurity company)
Order of National Security Merit
Organizational Systems Security Analyst
Organization for Security and Co-operation in Europe
Organization for Security and Co-operation in Europe statistics
Pakistan Security Printing Corporation
Paladin Group (security company)
Palestinian National Security Forces
Palestinian Preventive Security
Palestinian Security Services
Panamanian Social Security Fund
Panda Security
Parliamentary Assembly of the Organization for Security and Co-operation in Europe
Parliamentary Joint Committee on Intelligence and Security
Parliament Security Services
Partnership for Peace Consortium of Defense Academies and Security Studies Institutes
Party for Life Security
Paul Whelan (security director)
Payment Card Industry Data Security Standard
Peace and Security Committee
Peace and Security Council
People's Public Security University of China
People's Security Agency
Permanent members of the United Nations Security Council
Personal Internet Security 2011
Personal Property Security Act (Canada)
Personnel Security Research Center
Peterson v Minister of Safety & Security
Philippine National Police Aviation Security Group
Physical information security
Physical security
Physical security information management
Physical Security Professional
Pindrop Security
Polar Security Cutter program
Police and Security News
Police custody and security officer
Police/Worlds: Studies in Security, Crime and Governance
Political and Security Committee
Political Movement for Social Security
Port security
PRAXIS: The Fletcher Journal of Human Security
Presidency of the United Nations Security Council
Presidential Assistant for Food Security and Agricultural Modernization
Presidential Security Force of Indonesia
Presidential Security Group
Presidential Security Service (Belarus)
Presidential Security Service (Russia)
Principal (computer security)
Prisoner security categories in the United Kingdom
Prison Security Act 1992
Privacy Office of the U.S. Department of Homeland Security
Private security industry in South Africa
Project on National Security Reform
Proliferation Security Initiative
Protective Security Command
Protective security units
Provable security
Public Facilities Privacy & Security Act
Public Health Security and Bioterrorism Preparedness and Response Act
Public security
Public security bureau
Public security bureau (China)
Public Security Directorate
Public Security Force
Public Security Forces
Public Security Intelligence Agency
Public Security Police Force of Macau
Public Security Section 9
Public Transport Security Command
Puntland Security Force
Purdue Homeland Security Institute
Quadrilateral Security Dialogue
RCCA security
RCMP Security Service
Reform of the United Nations Security Council
Regiment of Presidential Security
Regional security complex theory
Regional Security System
Regions and Powers: The Structure of International Security
Reich Main Security Office
Reich Security Head Office Referat IV B4
Residential mortgage-backed security
Rhodesian Security Forces
Richlin Security Service Co. v. Chertoff
RNZAF Security Forces
Robert S. Strauss Center for International Security and Law
Rogue security software
Royal Commission on Intelligence and Security
RSA Security
RTAF Security Force Command
Ruger Security-Six
Safety and security window film
Sandbox (computer security)
Saskatchewan Water Security Agency
Screen International Security Services
Secretariat-General for National Defence and Security (France)
Secretariat of Public Security
Secretary for Public Security
Secretary for Security
Securitisation and Reconstruction of Financial Assets and Enforcement of Security Interest Act, 2002
Security
Security Academy
Security Account Manager
Security Administration (FR Yugoslavia)
Security Administrator Tool for Analyzing Networks
Security Advisory Opinion
Security agency
Security agreement
Security Airster S-1
Security alarm
Security analysis
Security Analysis (book)
Security and Freedom Ensured Act
Security and Growth for All in the Region
Security and Human Rights
Security and Intelligence Agency (Croatia)
Security and Intelligence Division
Security and Intelligence Services (India)
Security and Maintenance
Security and Privacy in Computer Systems
Security and Prosperity Partnership of North America
Security and Public Order Division
Security and safety features new to Windows Vista
Security and Trust Services API for J2ME
Security appliance
Security AppScan
Security as a service
Security Assertion Markup Language
Security association
Security assurance
Security Attribute Modulation Protocol
Security bag
Security Bank
Security Bank (New Auburn, Wisconsin)
Security Belt
Security Branch
Security breach notification laws
Security bug
Security Building
Security Building (Los Angeles)
Security Building (Miami, Florida)
Security Building (Phoenix, Arizona)
Security Bureau
Security Bureau (Hong Kong)
Security Cabinet of Israel
Security categories in India
Security certificate
Security characteristic line
Security checkpoint
Security clearance
Security Commission
Security company
Security Control of Air Traffic and Air Navigation Aids
Security controls
Security convergence
Security Council of Belarus
Security Council of Russia
Security Council of the Soviet Union
Security culture
Security descriptor
Security Descriptor Definition Language
Security Detachment Iraq (Australia)
Security detail
Security Device Event Exchange
Security Dialogue
Security dilemma
Security (disambiguation)
Security Division of Tianjin Security Region
Security Division (Wehrmacht)
Security domain
Security engineering
Security-Enhanced Linux
Security event manager
Security (finance)
Security First Network Bank
SecurityFocus
Security-focused operating system
Security Force Assistance Brigade
Security Force Auxiliaries
Security forces
Security Forces Command
Security Forces Headquarters Central
Security Forces Headquarters East
Security Forces Headquarters Jaffna
Security Forces Headquarters Kilinochchi
Security Forces Headquarters Mullaitivu
Security Forces Headquarters Wanni
Security Forces Headquarters West
Security guard
Security hacker
Security hologram
Security identification display area
Security Identifier
Security incidents involving Barack Obama
Security incidents involving George W. Bush
Security increase
Security Industry Authority
Security information and event management
Security information management
Security Information Service
Security Insurance Company
Security Intelligence Agency
Security Intelligence Service
Security interest
Security level
Security locknut
Security log
Security management
Security market line
Security modes
Security Now
Security of Advanced Access Content System
Security of automated teller machines
Security of cryptographic hash functions
Security Offences (Special Measures) Act 2012
Security of Information Act
Security of person
Security of the Sovereign Act
Security of the Succession, etc. Act 1701
Security of Transport Layer Security
Security on the Mass Rapid Transit (Singapore)
Security operations center
Security Operations Group
Security Pacific Bank
Security pattern
Security perimeter
Security police
Security Police Department (Georgia)
Security policy
Security policy of the Enrique Pea Nieto administration
Security printing
Security Printing and Minting Corporation of India
Security Printing and Minting Organization
Security Protocols Open Repository
Security question
SecurityScorecard
Security Screenings
Security seal
Security sector governance and reform
Security segregation
Security Service
Security Service of Ukraine
Security service (telecommunication)
Security Shield
Security smoke
Security Strategy
Security studies
Security Studies (journal)
Security Support Provider Interface
Security switch
Security tape
Security Technical Implementation Guide
Security testing
Security theater
Security through obscurity
Security Through Regularized Immigration and a Vibrant Economy Act of 2007
Security token
Security token offering
Security token service
Security Trust Company of Rochester
Security.txt
Security vetting in the United Kingdom
Security vote in Nigeria
Security-Widefield, Colorado
Semantic security
Sensitive Security Information
Separation of protection and security
Shadows Are Security
Ship Security Alert System
Slovenian Intelligence and Security Agency
Slowloris (computer security)
SMBGhost (security vulnerability)
SOA security
Social engineering (security)
Social Security
Social Security Act
Social Security Act 1938
Social Security Act (disambiguation)
Social Security Administration
Social Security Advisory Board
Social Security Agency (Northern Ireland)
Social Security Amendments of 1965
Social Security and National Insurance Trust
Social Security Appeal Tribunal
Social Security Board
Social Security Board (Belize)
Social Security Board (Myanmar)
Social Security Contributions and Benefits Act 1992
Social Security Death Index
Social Security Disability Insurance
Social security in Australia
Social security in France
Social security in Germany
Social security in Spain
Social Security Institution
Social security in Sweden
Social Security (Minimum Standards) Convention, 1952
Social Security number
Social Security Organization
Social Security (Seafarers) Convention, 1946
Social Security (Seafarers) Convention (Revised), 1987
Social security system in Poland
Social security tribunal
Social Security Tribunal of Canada
Social Security Trust Fund
Social Security Wage Base
Software development security
Software security assurance
South African Security Police
South Lebanon security belt administration
South Pacific Manufacturing Co Ltd v New Zealand Security Consultants & Investigations Ltd
Spanish Aviation Safety and Security Agency
Spanish Cybersecurity Research Conference
Spanish Network of Excellence on Cybersecurity Research
Special Security and Protection Battalion
Special Security Directorate
Special Security Force
Special Security Force Command
Special Security Forces (Yemen)
Special Security Office
Special Security Unit
Spectra Cyber Security Solutions Trophy Handicap Chase
Spectre (security vulnerability)
Spoiler (security vulnerability)
Spring Security
Sri Lanka Civil Security Force
Stabilization, Security, Transition, and Reconstruction Operations
Standard of Good Practice for Information Security
Stanley Center for Peace and Security
Static application security testing
Strategic Defence and Security Review
Strategic Defence and Security Review 2015
Supplemental Security Income
Supply chain security
Supreme National Security Council
Supreme Security Committee
Suspicious Activity Report (justice and homeland security)
SWAPGS (security vulnerability)
Swedish Commission on Security and Integrity Protection
Swedish Military Intelligence and Security Service
Swedish Security Service
SwiftOnSecurity
System Security Services Daemon
Tactical Automated Security System
Tahnoun bin Zayed Al Nahyan (national security advisor)
Tamper-resistant security module
Tanzania's food security
Tanzania Intelligence and Security Service
Tennessee Department of Safety and Homeland Security
The Arctic Institute Center for Circumpolar Security Studies
The CIS Critical Security Controls for Effective Cyber Defense
The European Security Order Recast
The International Council on Security and Development
The Journal of International Security Affairs
The Security Institute
The Security Men
The Security Printing Corporation (Bangladesh) Ltd.
The William P. Clements Jr. Center for National Security
Thomas v. Review Board of the Indiana Employment Security Division
Total Security
Total security management
Trademark (computer security)
Transmission security
Transportable Port Security Boat
Transportation Security Acquisition Reform Act
Transportation Security Administration
Transport Layer Security
Transport Layer Security Channel ID
Trend Micro Internet Security
Truman National Security Project
Trust no one (Internet security)
Trust-preferred security
TBTAK Informatics and Information Security Research Center
Tyco Integrated Security
UK cyber security community
UMTS security
Undersecretariat of Public Order and Security
Under Secretary of Commerce for Industry and Security
Under Secretary of Energy for Nuclear Security
Underwater Port Security System
Unican Security Systems
Union and Security Act
Union security agreement
United Nations Department for Safety and Security
United Nations Interim Security Force for Abyei
United Nations Security Council
United Nations Security Council and the Iraq War
United Nations Security Council Counter-Terrorism Committee
United Nations Security Council resolution
United Nations Security Council Resolution 1
United Nations Security Council Resolution 10
United Nations Security Council Resolution 100
United Nations Security Council Resolution 101
United Nations Security Council Resolution 1013
United Nations Security Council Resolution 102
United Nations Security Council Resolution 1021
United Nations Security Council Resolution 1022
United Nations Security Council Resolution 103
United Nations Security Council Resolution 1037
United Nations Security Council Resolution 104
United Nations Security Council Resolution 1044
United Nations Security Council Resolution 105
United Nations Security Council Resolution 1052
United Nations Security Council Resolution 106
United Nations Security Council Resolution 107
United Nations Security Council Resolution 108
United Nations Security Council Resolution 1080
United Nations Security Council Resolution 1086
United Nations Security Council Resolution 109
United Nations Security Council Resolution 11
United Nations Security Council Resolution 110
United Nations Security Council Resolution 1101
United Nations Security Council Resolution 111
United Nations Security Council Resolution 112
United Nations Security Council Resolution 1127
United Nations Security Council Resolution 113
United Nations Security Council Resolution 1132
United Nations Security Council Resolution 114
United Nations Security Council Resolution 115
United Nations Security Council Resolution 1154
United Nations Security Council Resolution 1159
United Nations Security Council Resolution 116
United Nations Security Council Resolution 1160
United Nations Security Council Resolution 117
United Nations Security Council Resolution 1170
United Nations Security Council Resolution 1173
United Nations Security Council Resolution 118
United Nations Security Council Resolution 1181
United Nations Security Council Resolution 1189
United Nations Security Council Resolution 119
United Nations Security Council Resolution 1199
United Nations Security Council Resolution 12
United Nations Security Council Resolution 120
United Nations Security Council Resolution 121
United Nations Security Council Resolution 122
United Nations Security Council Resolution 123
United Nations Security Council Resolution 1234
United Nations Security Council Resolution 124
United Nations Security Council Resolution 1244
United Nations Security Council Resolution 125
United Nations Security Council Resolution 126
United Nations Security Council Resolution 1261
United Nations Security Council Resolution 1267
United Nations Security Council Resolution 127
United Nations Security Council Resolution 1272
United Nations Security Council Resolution 128
United Nations Security Council Resolution 1284
United Nations Security Council Resolution 129
United Nations Security Council Resolution 1295
United Nations Security Council Resolution 1298
United Nations Security Council Resolution 13
United Nations Security Council Resolution 130
United Nations Security Council Resolution 1306
United Nations Security Council Resolution 1308
United Nations Security Council Resolution 131
United Nations Security Council Resolution 1313
United Nations Security Council Resolution 132
United Nations Security Council Resolution 1325
United Nations Security Council Resolution 133
United Nations Security Council Resolution 1333
United Nations Security Council Resolution 134
United Nations Security Council Resolution 1343
United Nations Security Council Resolution 135
United Nations Security Council Resolution 136
United Nations Security Council Resolution 1368
United Nations Security Council Resolution 137
United Nations Security Council Resolution 1373
United Nations Security Council Resolution 138
United Nations Security Council Resolution 1386
United Nations Security Council Resolution 139
United Nations Security Council Resolution 1391
United Nations Security Council Resolution 1397
United Nations Security Council Resolution 14
United Nations Security Council Resolution 140
United Nations Security Council Resolution 1401
United Nations Security Council Resolution 141
United Nations Security Council Resolution 142
United Nations Security Council Resolution 1422
United Nations Security Council Resolution 143
United Nations Security Council Resolution 144
United Nations Security Council Resolution 1441
United Nations Security Council Resolution 145
United Nations Security Council Resolution 146
United Nations Security Council Resolution 147
United Nations Security Council Resolution 1478
United Nations Security Council Resolution 148
United Nations Security Council Resolution 1483
United Nations Security Council Resolution 1484
United Nations Security Council Resolution 149
United Nations Security Council Resolution 1495
United Nations Security Council Resolution 1496
United Nations Security Council Resolution 15
United Nations Security Council Resolution 150
United Nations Security Council Resolution 1502
United Nations Security Council Resolution 1509
United Nations Security Council Resolution 151
United Nations Security Council Resolution 152
United Nations Security Council Resolution 153
United Nations Security Council Resolution 1539
United Nations Security Council Resolution 154
United Nations Security Council Resolution 1540
United Nations Security Council Resolution 1544
United Nations Security Council Resolution 1546
United Nations Security Council Resolution 155
United Nations Security Council Resolution 1556
United Nations Security Council Resolution 1559
United Nations Security Council Resolution 156
United Nations Security Council Resolution 1564
United Nations Security Council Resolution 1566
United Nations Security Council Resolution 157
United Nations Security Council Resolution 1572
United Nations Security Council Resolution 158
United Nations Security Council Resolution 1583
United Nations Security Council Resolution 159
United Nations Security Council Resolution 1590
United Nations Security Council Resolution 1591
United Nations Security Council Resolution 1593
United Nations Security Council Resolution 16
United Nations Security Council Resolution 160
United Nations Security Council Resolution 161
United Nations Security Council Resolution 1612
United Nations Security Council Resolution 1617
United Nations Security Council Resolution 162
United Nations Security Council Resolution 1624
United Nations Security Council Resolution 1625
United Nations Security Council Resolution 163
United Nations Security Council Resolution 164
United Nations Security Council Resolution 1645
United Nations Security Council Resolution 165
United Nations Security Council Resolution 1658
United Nations Security Council Resolution 166
United Nations Security Council Resolution 167
United Nations Security Council Resolution 1672
United Nations Security Council Resolution 1674
United Nations Security Council Resolution 1675
United Nations Security Council Resolution 1679
United Nations Security Council Resolution 168
United Nations Security Council Resolution 1680
United Nations Security Council Resolution 169
United Nations Security Council Resolution 1690
United Nations Security Council Resolution 1695
United Nations Security Council Resolution 1696
United Nations Security Council Resolution 17
United Nations Security Council Resolution 170
United Nations Security Council Resolution 1700
United Nations Security Council Resolution 1701
United Nations Security Council Resolution 1704
United Nations Security Council Resolution 1706
United Nations Security Council Resolution 1718
United Nations Security Council Resolution 1737
United Nations Security Council Resolution 1738
United Nations Security Council Resolution 1781
United Nations Security Council Resolution 18
United Nations Security Council Resolution 1803
United Nations Security Council Resolution 1804
United Nations Security Council Resolution 1808
United Nations Security Council Resolution 181
United Nations Security Council Resolution 1820
United Nations Security Council Resolution 1834
United Nations Security Council Resolution 1835
United Nations Security Council Resolution 1851
United Nations Security Council Resolution 1858
United Nations Security Council Resolution 1859
United Nations Security Council Resolution 1860
United Nations Security Council Resolution 1861
United Nations Security Council Resolution 1862
United Nations Security Council Resolution 1863
United Nations Security Council Resolution 1864
United Nations Security Council Resolution 1865
United Nations Security Council Resolution 1866
United Nations Security Council Resolution 1867
United Nations Security Council Resolution 1868
United Nations Security Council Resolution 1869
United Nations Security Council Resolution 1870
United Nations Security Council Resolution 1871
United Nations Security Council Resolution 1873
United Nations Security Council Resolution 1874
United Nations Security Council Resolution 1887
United Nations Security Council Resolution 1888
United Nations Security Council Resolution 1889
United Nations Security Council Resolution 19
United Nations Security Council Resolution 1904
United Nations Security Council Resolution 1907
United Nations Security Council Resolution 1908
United Nations Security Council Resolution 1918
United Nations Security Council Resolution 1929
United Nations Security Council Resolution 1960
United Nations Security Council Resolution 1970
United Nations Security Council Resolution 1973
United Nations Security Council Resolution 1996
United Nations Security Council Resolution 20
United Nations Security Council Resolution 2031
United Nations Security Council Resolution 2033
United Nations Security Council Resolution 2061
United Nations Security Council Resolution 2077
United Nations Security Council Resolution 2085
United Nations Security Council Resolution 2087
United Nations Security Council Resolution 2094
United Nations Security Council Resolution 21
United Nations Security Council Resolution 22
United Nations Security Council Resolution 221
United Nations Security Council Resolution 2231
United Nations Security Council Resolution 2270
United Nations Security Council Resolution 23
United Nations Security Council Resolution 2337
United Nations Security Council Resolution 237
United Nations Security Council Resolution 2375
United Nations Security Council Resolution 24
United Nations Security Council Resolution 242
United Nations Security Council Resolution 25
United Nations Security Council Resolution 253
United Nations Security Council Resolution 26
United Nations Security Council Resolution 267
United Nations Security Council Resolution 27
United Nations Security Council Resolution 28
United Nations Security Council Resolution 29
United Nations Security Council Resolution 3
United Nations Security Council Resolution 30
United Nations Security Council Resolution 31
United Nations Security Council Resolution 32
United Nations Security Council Resolution 33
United Nations Security Council Resolution 338
United Nations Security Council Resolution 339
United Nations Security Council Resolution 34
United Nations Security Council Resolution 35
United Nations Security Council Resolution 350
United Nations Security Council Resolution 36
United Nations Security Council Resolution 37
United Nations Security Council Resolution 38
United Nations Security Council Resolution 39
United Nations Security Council Resolution 4
United Nations Security Council Resolution 40
United Nations Security Council Resolution 400
United Nations Security Council Resolution 41
United Nations Security Council Resolution 42
United Nations Security Council Resolution 425
United Nations Security Council Resolution 426
United Nations Security Council Resolution 43
United Nations Security Council Resolution 435
United Nations Security Council Resolution 44
United Nations Security Council Resolution 446
United Nations Security Council Resolution 45
United Nations Security Council Resolution 452
United Nations Security Council Resolution 46
United Nations Security Council Resolution 465
United Nations Security Council Resolution 47
United Nations Security Council Resolution 471
United Nations Security Council Resolution 476
United Nations Security Council Resolution 478
United Nations Security Council Resolution 48
United Nations Security Council Resolution 487
United Nations Security Council Resolution 49
United Nations Security Council Resolution 497
United Nations Security Council Resolution 5
United Nations Security Council Resolution 50
United Nations Security Council Resolution 502
United Nations Security Council Resolution 509
United Nations Security Council Resolution 51
United Nations Security Council Resolution 52
United Nations Security Council Resolution 520
United Nations Security Council Resolution 53
United Nations Security Council Resolution 54
United Nations Security Council Resolution 55
United Nations Security Council Resolution 56
United Nations Security Council Resolution 57
United Nations Security Council Resolution 58
United Nations Security Council Resolution 59
United Nations Security Council Resolution 6
United Nations Security Council Resolution 60
United Nations Security Council Resolution 61
United Nations Security Council Resolution 62
United Nations Security Council Resolution 63
United Nations Security Council Resolution 64
United Nations Security Council Resolution 65
United Nations Security Council Resolution 66
United Nations Security Council Resolution 660
United Nations Security Council Resolution 661
United Nations Security Council Resolution 662
United Nations Security Council Resolution 67
United Nations Security Council Resolution 672
United Nations Security Council Resolution 678
United Nations Security Council Resolution 68
United Nations Security Council Resolution 686
United Nations Security Council Resolution 687
United Nations Security Council Resolution 688
United Nations Security Council Resolution 69
United Nations Security Council Resolution 7
United Nations Security Council Resolution 70
United Nations Security Council Resolution 71
United Nations Security Council Resolution 713
United Nations Security Council Resolution 715
United Nations Security Council Resolution 72
United Nations Security Council Resolution 721
United Nations Security Council Resolution 724
United Nations Security Council Resolution 73
United Nations Security Council Resolution 731
United Nations Security Council Resolution 74
United Nations Security Council Resolution 746
United Nations Security Council Resolution 748
United Nations Security Council Resolution 757
United Nations Security Council Resolution 77
United Nations Security Council Resolution 78
United Nations Security Council Resolution 780
United Nations Security Council Resolution 781
United Nations Security Council Resolution 79
United Nations Security Council Resolution 794
United Nations Security Council Resolution 799
United Nations Security Council Resolution 8
United Nations Security Council Resolution 80
United Nations Security Council Resolution 81
United Nations Security Council Resolution 819
United Nations Security Council Resolution 82
United Nations Security Council Resolution 822
United Nations Security Council Resolution 825
United Nations Security Council Resolution 827
United Nations Security Council Resolution 83
United Nations Security Council Resolution 84
United Nations Security Council Resolution 85
United Nations Security Council Resolution 853
United Nations Security Council Resolution 86
United Nations Security Council Resolution 864
United Nations Security Council Resolution 87
United Nations Security Council Resolution 874
United Nations Security Council Resolution 88
United Nations Security Council Resolution 883
United Nations Security Council Resolution 884
United Nations Security Council Resolution 89
United Nations Security Council Resolution 9
United Nations Security Council Resolution 90
United Nations Security Council Resolution 91
United Nations Security Council Resolution 917
United Nations Security Council Resolution 918
United Nations Security Council Resolution 92
United Nations Security Council Resolution 928
United Nations Security Council Resolution 93
United Nations Security Council Resolution 94
United Nations Security Council Resolution 940
United Nations Security Council Resolution 949
United Nations Security Council Resolution 95
United Nations Security Council Resolution 955
United Nations Security Council Resolution 96
United Nations Security Council Resolution 97
United Nations Security Council Resolution 98
United Nations Security Council Resolution 984
United Nations Security Council Resolution 986
United Nations Security Council Resolution 99
United Nations Security Council veto power
University of Belgrade Faculty of Security Studies
Unix security
Unorganised Workers' Social Security Act 2008
USB flash drive security
U.S. Commission on National Security/21st Century
U.S. Department of Commerce Office of Security
U.S. National Action Plan on Women, Peace, and Security
US national security privatization
USS Security (AMc-103)
UTC Climate, Controls & Security
Valor Security Services
Vancouver Foreign Ministers' Meeting on Security and Stability on Korean Peninsula
Van Eeden v Minister of Safety & Security
Vasil Iliev Security
Vehicular Security Center
Vera Security
Veterans' Alliance for Security and Democracy
Vetoed United Nations Security Council resolutions on Syria
Virtual security appliance
Voluntary Principles on Security and Human Rights
WARP (information security)
Water security
Weapons Storage and Security System
Web API security
Web application security
Webroot Internet Security Essentials
Western Hemisphere Institute for Security Cooperation
White hat (computer security)
Wikipedia talk:Articles for deletion/Comparison of web browsers (security)
Wilson Security Racing
Wireless security
Wireless security camera
Witness Insecurity
Witness Insecurity (TV series)
Witness Security Programme (Ireland)
World Institute for Nuclear Security
World Security Institute
World Summit on Food Security 2009
Writ of security
WS-Security
Xavier's Security Enforcers
Y-12 National Security Complex


change font "color":
change "background-color":
change "font-family":
change "padding":
change "table font size":
last updated: 2022-02-04 11:16:15
101746 site hits