Webster's Revised Unabridged Dictionary
L. securitas,: cf. F. sécurité,. See Secure, and cf. Surety
Chambers's Twentieth Century Dictionary
L. securus—se- (for sine), without, cura, care.
Wrap in each a slice of salmon, securing the paper around them, with a string or pins.
"Directions for Cookery, in its Various Branches" by Eliza Leslie
To secure the pulp without any of the skin, first peel the orange, as shown in Fig.
"Woman's Institute Library of Cookery, Vol. 5" by Woman's Institute of Domestic Arts and Sciences
The wall was not only solid and secure, but it was really handsome.
"Wyandotte" by James Fenimore Cooper
It is like the keel and ribs of a vessel or the frame of a house, the foundation upon which the bodies are securely built.
"A Practical Physiology" by Albert F. Blaisdell
On the Sabbath rest was secured to servants by the fourth commandment.
"The Anti-Slavery Examiner, Part 1 of 4" by American Anti-Slavery Society
A negro is directed to go into the woods and secure himself upon a tree.
"The Anti-Slavery Examiner, Part 2 of 4" by American Anti-Slavery Society
Second, the states for enacting laws to secure their victim.
"The Anti-Slavery Examiner, Part 3 of 4" by American Anti-Slavery Society
Her duty it is to watch for dead relatives, to secure them, and make them alive again (p. 132).
"Traditions of the Tinguian: A Study in Philippine Folk-Lore" by Fay-Cooper Cole
There are others which seem, at least, to make it difficult for one to secure social recognition.
"Analyzing Character" by Katherine M. H. Blackford and Arthur Newcomb
All laws to secure these ends will receive my best efforts for their enforcement.
"A Compilation of the Messages and Papers of the Presidents: Ulysses S. Grant" by James D. Richardson
Thou God, whom heav’nly host obey,
How highly blest is he
Whose hope and trust, securely placed,
Is still reposed on Thee.
"O God of hosts, the mighty Lord," by Nahum Tate and Nicholas Brady
"Secured by fetter, cramp, and chain,
And gagged securely - so -
You shall be placed in Drury Lane,
Where only good lads go.
"The Two Ogres" by William Schwenck Gilbert
He wants to sift you all, as wheat,
And thinks his vict'ry sure;
But I his malice will defeat,
My prayer shall faith secure.
"The Believer's Danger, Safety, And Duty" by John Newton
Not for one single day
Can I discern my way,
But this I surely know,--
Who gives the day,
Will show the way,
So I securely go.
"The Day--The Way" by John Oxenham
Secure in their grave I shall be
From it all, and quiet then,
With no thought and no memory
Of the deeds and the dooms of men.
"The Suicide" by Thomas MacDonagh
On kings that reign as David did,
He pours his blessings down;
Secures their honors to their seed,
And well supports the crown.
"Psalm 18 part 2" by Isaac Watts
Security increased at the Carrier Dome on Friday night following new security measures implemented by Syracuse University and Syracuse Police.
A security officer performs a security check with a sniffer dog prior to the Nobel Prize Ceremony at Concert Hall on Dec 10, 2012, in Stockholm, Sweden.
One important way organizations can strengthen their network and IT security is by strengthening and consolidating the process surrounding network access and authentication, say many security professionals.
BC-US--Homeland Security Spending, 4th Ld-Writethru,680Homeland Security grant spending questionedAP Photo NY128.
7, 2002: Cameras and other gadgets will be a critical but limited tool as the United States and Canada step up security on their border, Homeland Security Director Tom Ridge said Friday.
They will not be able to bargain over security policies, procedures or the deployment of security personnel and equipment.
Saranac Lake, NY, Nov 19, 2012 — An investment banker and securities broker from Saranac Lake has been barred from the securities industry for defrauding his customers out of hundreds of thousands of dollars.
One sailor was shot by Naval security forces and another was taken into custody uninjured after they allegedly smashed their vehicle into two security units during a chase on the San Diego Naval Base early Saturday morning.
0 Former White House cyber-security coordinator Howard Schmidt speaks at an Internet security conference in Anaheim.
Director of the national security studies program at the New America Foundation and CNN national security analyst.
Co-written with synthetic biology expert Andrew Hessel and global security expert Marc Goodman, the story examines the dawning of the era of personalized bio -weapons and the incredible threat these pose to national security.
The Securities & Exchange Commission actually pays rewards for tips about securities fraud.
The Social Security Board of Trustees today released its annual report on the financial health of the Social Security Trust Funds.
"They really have stepped it up by bringing a lot of those fast (DPS) boats in," said Rep Henry Cuellar, D-Laredo, the ranking Democrat on the House Homeland Security subcommittee on Border and Maritime Security.
Los Alamos National Security, LLC, is bringing in outside counsel to help it deal with the botched construction of a security upgrade at the lab.
As for encryption of communication protocols, XMPP has already provided the encryption characteristic in its standard. XMPP supports the Simple Authentication and Security Layer (SASL) framework and Transport Layer Security (TLS) protocol.
Interoperability and Standardization of Intercloud Cloud Computing
Cryptographers as important cryptographic primitives. • Security engineers as techniques to employ in distributed security applications.
Social Secret Sharing for Resource Management in Cloud
Security concerns are • Traditional security • Availability • Third-party Data Control At the same time there are also some security issues that can be encounter.
Social Secret Sharing for Resource Management in Cloud
Price, Security for Computer Networks, An Introduction to Data Security in Teleprocessing and Electronic Funds Transfer, 2nd ed. (John Wiley & Sons, Chichester, 1989).
A Comparative Study of Some Pseudorandom Number Generators
We take a critical look at the relationship between the security of cryptographic schemes in the Random Oracle Model, and the security of the schemes that result from implementing the random oracle by so called “cryptographic hash functions”.
The Random Oracle Methodology, Revisited