Secular Christmas stories
There exists a wide range of secular Christmas stories, told in popular music, on television, and in the cinema, that are told about the Christian hol...
9,052 articles — Page 113 of 453
There exists a wide range of secular Christmas stories, told in popular music, on television, and in the cinema, that are told about the Christian hol...
Secular coercion is a step taken, by means of a deliberate policy or without one, designed to lead to processes of secularization or to disobedience o...
Secular conservatism is a type of conservatism that is indifferent to religion, or that believes strongly in a separation of church and state. Example...
The Secular Order of Druids or SODs emerged after the Battle of the Beanfield, violent clashes between police and members of the public surrounding th...
Secular ProgressivismSecular-Progressive Ideology"Secular progressive", a term coined by Bill O'Reilly (author of Culture Warrior, in which the term i...
Secular Talk Radio is an online political commentary radio show created and hosted by political analyst, Kyle Kulinski. The show was launched in 2008 ...
SecurDisc is a hardware and software based security technology jointly developed by Hitachi-LG Data Storage and Nero AG that provides secure data prot...
A secure digital camera or trusted digital camera is a digital camera that has built-in watermarking and encryption to provide immediate digital right...
Secure digital forensic imaging (SDFI) is a process that ensures fast, safe and secure capture, storage and delivery of digital forensic evidence.The ...
Security of transmission of text, multimedia and images over internet is a very important issue. For example military image databases,video conference...
Secure Insight (SSI) (originally founded as Secure Settlements) is a national financial industry risk management and data evaluation company. The comp...
SPIKE (Secure Process-oriented Integrative Service Infrastructure for Networked Enterprises) is a collaborative 36-month research and development proj...
The Global Service for Mobile communications (GSM) with the greatest worldwide number of users succumbs to several security vulnerabilities. In the GS...
Secure Sockets Layer virtual private network (SSL VPN) is a kind of VPN that runs on Secure Socket Layers technology and is accessible via [] over web...
The Secure Store and Forward (SSF) mechanism is used by SAP systems to digitally sign and encrypt documents. SSF is intended to make documents secure ...
Secure Units for Children serve two main purposes. They can be to protect young people who are placing themselves or others at risk of harm through a ...
Also known as secure thumb drive, secure memory stick, secure pen drive, secure jump drive, secure flash drive, secure USB key etc., secure USB drives...
Secure-24 (Secure-24, Inc) is a provider of managed hosting, disaster recovery and managed services for the enterprise-level, mission-critical applica...
SecureAuth is an Irvine, California-based provider of access control solutions for premises; cloud and web applications; and resources. Solutions incl...
SecuRegister is a multi-modal biometric system developed by Techno Brain for member identification, registration and enrollment. The system enables ma...