Security risk

Results: 17047



#Item
621Actuarial science / Financial risk / Mathematical finance / Value at risk / Economy / Applied mathematics / Money

OWASP_EU_Summit_2008_AntiSamydotNET

Add to Reading List

Source URL: www.tssci-security.com

Language: English - Date: 2013-01-16 12:15:22
622Property law / Business law / Bankruptcy / English law / Financial risk / Security interest / Lien / Reaffirmation agreement / Mortgage loan / Debt / Bankruptcy in the United States / Foreclosure

Danny L. Miller Clerk of Court United States Bankruptcy Court Southern District of Mississippi

Add to Reading List

Source URL: www.mssb.uscourts.gov

Language: English - Date: 2015-04-21 10:41:48
623United States Department of Agriculture / Agricultural economics / Agricultural subsidies / Agricultural insurance / Crop insurance / Crops / United States farm bill / Federal Crop Insurance Corporation / Farm programs / Disaster payments / Food /  Conservation /  and Energy Act / Food security

CropInsurance TODAY VisitWebsite ag-risk.org The Development of Crop Insurance

Add to Reading List

Source URL: www.cropinsuranceinamerica.org

Language: English - Date: 2015-09-28 09:56:15
624

Targeted Risk Communication for Computer Security Jim Blythe USC Information Sciences Institute

Add to Reading List

Source URL: www.isi.edu

Language: English - Date: 2011-04-21 12:46:13
    625Computer security / Business / Risk analysis / Data security / Computing / Supply chain management / Supply chain risk management / National Institute of Standards and Technology / Security controls / Open Trusted Technology Provider Standard

    ITL Bulletin, Increasing Visibility and Control of Your ICT Supply Chains (June 2015)

    Add to Reading List

    Source URL: csrc.nist.gov

    Language: English - Date: 2015-06-15 11:08:27
    626

    Information Security Risk Mitigation Plan Use this form to record an information security risk mitigation plan for an identified risk. For questions related to this form, contact the SITSD Information Systems Security Of

    Add to Reading List

    Source URL: sitsd.mt.gov

    Language: English - Date: 2015-07-06 17:33:17
      627Security / Actuarial science / Management / Cryptography / National security / Information security / Risk management / Risk / Computer security / Security management / IT risk management

      In Brief Global Enterprise Methodology This is our global approach that enables your organisation to understand its current exposure

      Add to Reading List

      Source URL: www.nttcomsecurity.com

      Language: English - Date: 2015-07-14 05:03:17
      628

      Visualizing Risk by Example: Demonstrating Threats Arising From Android Apps M. Hettig, E. Kiss, J.-F. Kassel, S. Weber, M. Harbach, M. Smith Distributed Computing and Security Group, Leibniz University Hannover, Germany

      Add to Reading List

      Source URL: www.dcsec.uni-hannover.de

      Language: English - Date: 2013-11-20 04:27:07
        629Probability / Risk / Prevention / Actuarial science / Security / Management / Risk management / Disaster / Social vulnerability

        Report_CapHaz-Net_18_11_09.indd

        Add to Reading List

        Source URL: caphaz-net.org

        Language: English - Date: 2010-12-08 11:04:41
        630

        Emerging Risk Report – 2015 Innovation Series SOCIETY & SECURITY Business Blackout

        Add to Reading List

        Source URL: www.lloyds.com

        Language: English
          UPDATE