Security risk

Results: 17047



#Item
611

Analysis of automobile manufacturers’ efforts reveals security and privacy gaps Tracking & Hacking: Security & Privacy Gaps Put American Drivers at Risk

Add to Reading List

Source URL: www.thenewspaper.com

Language: English - Date: 2015-02-12 21:40:06
    612

    White Paper The Psychology of (In)Security Security Myths Create Risk Adversity to Change

    Add to Reading List

    Source URL: www.bromium.com

    Language: English
      613

      Adelman Delivers the Ultimate Value to their Clients with TMC Messaging Adelman Travel ensures client safety and security by utilizing a best in class risk management solution. With the ability to proactively communicate

      Add to Reading List

      Source URL: www.concur.com

      Language: English - Date: 2015-04-23 11:49:38
        614Warning systems / Emergency management / Tsunami / Seismology / Oceanography / Risk management / Physical oceanography / National Tsunami Warning Center / National Weather Service / Federal Emergency Management Agency / Pacific Tsunami Warning Center / Office of Emergency Management

        Social Media Sites* NTHMP Partners Alaska Alaska Division of Homeland Security and Emergency

        Add to Reading List

        Source URL: nws.weather.gov

        Language: English - Date: 2016-02-17 14:45:20
        615Safety / Prevention / Risk / Probability / Actuarial science / Hazard analysis / Security / HAZUS / Social vulnerability / Hazard / Emergency management / Vulnerability assessment

        Schelhorn et al. Identifying Elementsat Risk from OpenStreetMap Identifying Elements at Risk from OpenStreetMap: The Case of Flooding

        Add to Reading List

        Source URL: www.agora.icmc.usp.br

        Language: English - Date: 2014-03-30 16:06:02
        616

        Security Management Policy It is Salamanca Risk Management (SRM)’s policy to conduct its worldwide business in a manner that delivers optimum protection of the supply chain, within the framework of national, internati

        Add to Reading List

        Source URL: salamanca-group.com

        Language: English - Date: 2015-10-19 04:38:22
          617Occupational safety and health / Disaster preparedness / Emergency management / Humanitarian aid / Emergency response / Computer security incident management / Risk management

          0 Updated Table of Contents Education Abroad Preparation Overview

          Add to Reading List

          Source URL: dga.kennesaw.edu

          Language: English - Date: 2015-07-20 11:17:40
          618

          Security Plan Workflow Develop an Approach Identify Information Assets Assess Risk

          Add to Reading List

          Source URL: ciso.washington.edu

          - Date: 2014-11-12 17:20:01
            619Computing / Security / Technology / E-commerce / Identity management / Internet privacy / Mobile computers / Privacy / Internet of things / Computer security / Password / Email

            IoT Trust Framework – Discussion Draft released August 11, 2015 (updated August 13) As consumers and businesses increasingly rely on IoT devices, the security and privacy risk is amplified. Addressing the mounting conc

            Add to Reading List

            Source URL: otalliance.org

            Language: English
            620Software / Digital media / Computing / Social networking services / Social media / Social networks / Facebook / New media / Social media marketing / Social search / Social computing / Target audience

            2011 IEEE International Conference on Privacy, Security, Risk, and Trust, and IEEE International Conference on Social Computing The Effect of Post Type, Category and Posting Day on User Interaction Level on Facebook Ire

            Add to Reading List

            Source URL: cocoa.ethz.ch

            Language: English - Date: 2013-05-10 05:23:10
            UPDATE