Security risk

Results: 17047



#Item
651Risk management / Risk / Emergency management / Financial risk / Flood / Ethics / Management / Actuarial science

Environmental Change Institute Risk-based principles for defining and managing water security Jim Hall Environmental Change Institute

Add to Reading List

Source URL: www.water.ox.ac.uk

Language: English - Date: 2012-04-16 09:53:40
652Ethics / Security / Financial risk / Risk management / IT risk management / Morgan Stanley / Basel II / Operational risk / Enterprise risk management / Risk / Actuarial science / Management

Registered number: Registered office: Luna Arena HerikerbergwegCM Amsterdam Zuidoost

Add to Reading List

Source URL: www.morganstanley.com

Language: English - Date: 2015-04-30 14:37:06
653Internet privacy / Information security / Information privacy / Personally identifiable information / Consumer privacy / Health Insurance Portability and Accountability Act / Spyware / Risk / Freedom of speech / Ethics / Privacy / Security

Spare the Rod, Spoil the Network Security? Economic Analysis of Sanctions Online Vaibhav Garg L. Jean Camp

Add to Reading List

Source URL: www.ljean.com

Language: English - Date: 2015-02-25 17:27:02
654Financial markets / Investment / Financial risk / Securities / Futures contract / Hedge / Security / Futures exchange / Foreign exchange market / Financial economics / Finance / Economics

Harding_Loevner_pms_logo_12_12_13

Add to Reading List

Source URL: www.hardingloevnerfunds.com

Language: English - Date: 2015-07-06 15:59:03
655Genetics / Molecular biology / Genetic genealogy / Single-nucleotide polymorphism / Biology / Population genetics / DNA

2015 IEEE CS Security and Privacy Workshops Privacy Threats and Practical Solutions for Genetic Risk Tests Ludovic Barman, Mohammed-Taha Elgraini, Jean Louis Raisaro, and Jean-Pierre Hubaux ´ Ecole

Add to Reading List

Source URL: www.genopri.org

Language: English - Date: 2015-05-21 15:26:53
656Safety / Security / Risk / Disaster preparedness / Humanitarian aid / Emergency evacuation / Emergency / Hazard / Disaster / Emergency management / Public safety / Management

Emergency Planning Guide for Childcare Centres

Add to Reading List

Source URL: www.lead.ece.govt.nz

Language: English - Date: 2010-02-11 20:14:35
657Software testing / Computer network security / Hacking / Risk / Software bugs / Vulnerability / Social vulnerability / Buffer overflow / Database / Computer security / Cyberwarfare / Computing

=================================================================== PLOVER - Preliminary List Of Vulnerability Examples for Researchers =================================================================== [*] Author: Stev

Add to Reading List

Source URL: cwe.mitre.org

Language: English - Date: 2006-09-13 14:57:16
658Computer network security / CVSS / Security / Vulnerability / Social vulnerability / Qualys / Metric / Computer security / Cyberwarfare / Risk

The Common Vulnerability Scoring System Mike Schiffman, Cisco Systems The RSA Conference, February 2005 Today’s Agenda

Add to Reading List

Source URL: packetfactory.openwall.net

Language: English - Date: 2005-02-23 13:47:09
659Industrial hygiene / Environmental social science / Occupational safety and health / Risk management / Institution of Occupational Safety and Health / British Safety Industry Federation / Personal protective equipment / Safety Management Systems / Safety / Security / Risk

BSIF Member Bulletin MarchIssue 9

Add to Reading List

Source URL: www.bsif.co.uk

Language: English - Date: 2015-06-18 16:44:51
660Risk management / Actuarial science / Industrial hygiene / Environmental social science / Occupational safety and health / Safety Management Systems / Safety culture / Safety / Risk / Security

Sword of Honour 2014 Chief Adjudicator’s Report © British Safety Council 2014 Sword of Honour - Chief Adjudicator’s Report 2014

Add to Reading List

Source URL: www.britsafe.org

Language: English - Date: 2014-10-10 07:08:43
UPDATE