Security risk

Results: 17047



#Item
741Baglihar Dam / Water / Geography of Asia / Dams / Lawrence Susskind / Water diplomacy / Indus River

Water Diplomacy: A Networked Approach to Understanding, Measuring and Managing Water Security Shafik Islam, Tufts University Larry Susskind, MIT Water Security, Risk and Society: Oxford , April 17, 2012

Add to Reading List

Source URL: www.water.ox.ac.uk

Language: English - Date: 2012-04-17 08:55:54
742Systems engineering / Safety / Costs / Cost–benefit analysis / ALARP / Risk analysis / Reliability engineering / Derailment / Science / Risk / Rail transport / Security

Theme [SSTDevelopment of the Future Rail System to Reduce the Occurrences and Impact of Derailment Development of the Future Rail Freight System to Reduce the Occurrences and Impact of Derailment

Add to Reading List

Source URL: www.d-rail-project.eu

Language: English - Date: 2015-03-23 10:52:36
743Risk management / Actuarial science / Auditing / Security / Internal control / Enterprise risk management / Risk breakdown structure / Risk / Management / Ethics

Challenges to introducing riskbased supervision Mr. John Ashcroft, Key Expert to the EU project: “Support to the Agency for Supervision of Fully Funded Pension Insurance – MAPAS“

Add to Reading List

Source URL: www.iopsweb.org

Language: English - Date: 2014-07-16 09:04:53
744

Water Security, Risk & Society April 2012 Addressing water security risks: Can we leapfrog carbon? Which Approach?

Add to Reading List

Source URL: www.water.ox.ac.uk

Language: English - Date: 2012-04-17 04:21:56
    745Industrial hygiene / Safety engineering / Emergency evacuation / Emergency management / Occupational safety and health / Fire extinguisher / Safety / Risk / Prevention

    Department of Cellular and Molecular Medicine Faculty of Health and Medical Sciences ∙ University of Copenhagen Blegdamsvej 3 ∙ DK-2200 Copenhagen N ∙ Denmark SECURITY INSTRUCTION’S

    Add to Reading List

    Source URL: icmm.ku.dk

    Language: English - Date: 2015-07-18 12:08:24
    746Computer security / Electronic warfare / Hacking / Military technology / SCADA / Cyber security standards / Cyberwarfare / Technology / Security

    Can Security Certification Control Cyber Risk? November 12, 2010 Industrial devices comply with many standards, but Security certification is a relatively new area that is quickly rising in importance as devices are incr

    Add to Reading List

    Source URL: www.wurldtech.com

    Language: English - Date: 2015-07-15 01:28:14
    747Security / National security / Computer security / Industrial automation / SCADA / Security engineering / Remote Terminal Unit / Critical infrastructure protection / Industrial control system / Telemetry / Technology / Computer network security

    FP7-SECProjectCyber-security on SCADA: risk prediction, analysis and reaction tools for Critical Infrastructures D4.2 - Automatic Reaction Strategies and RTU

    Add to Reading List

    Source URL: www.cockpitci.eu

    Language: English - Date: 2015-04-04 09:28:29
    748Ethics / Public safety / Risk / Emergency management / Crisis / United States Environmental Protection Agency / Decision making / Advice / Management / Actuarial science / Security

    VUELCO: Volcanic Unrest in Europe and Latin America 2nd WORKSHOP “Scientific advice, decision-making, risk communication” 7th – 8th November 2013 SESSION 1- “SCIENTIFIC ADVICE: Scientists-decision makers interact

    Add to Reading List

    Source URL: vuelco.net

    Language: English - Date: 2014-10-10 03:34:38
    749Risk management / Actuarial science / Security / Computer performance / IOPS / Systemic risk / Risk assessment / European Insurance and Occupational Pensions Authority / Risk / Management / Ethics

    IOPS TOOLKIT RISKBASED SUPERIVSION INTRODUCTION TO RISK-BASED SUPERVISION Ross Jones, IOPS President, Deputy Chairman of APRA Skopje, Macedonia, 10 May 2012 2nd IOPS Regional Workshop on Pension Supervision

    Add to Reading List

    Source URL: www.iopsweb.org

    Language: English - Date: 2014-07-16 09:04:53
    750Cross-platform software / Linux / Red Hat / Hacking / Software testing / Vulnerability / Red Hat Enterprise Linux / Debian / Firefox / Software / Computing / Free software

    Whitepaper Risk Report Six years of Red Hat Enterprise Linux 4 Mark J Cox, Red Hat Security Response Team

    Add to Reading List

    Source URL: www.redhat.com

    Language: English - Date: 2011-03-16 12:21:36
    UPDATE