Vulnerability assessment

Results: 2199



#Item
231Intergovernmental Panel on Climate Change / Effects of global warming / Adaptation to global warming / Global warming / Economics of global warming / Social vulnerability / Vulnerability / IPCC Fourth Assessment Report / Climate risk / Climate change / Environment / Risk

The dynamics of vulnerability: why adapting to climate variability will not always prepare us for climate change

Add to Reading List

Source URL: sciencepolicy.colorado.edu

Language: English - Date: 2015-04-27 17:48:56
232Risk management / Ethics / Flood / Actuarial science / Tsunami / Earthquake / Indian Ocean earthquake and tsunami / Social vulnerability / Probabilistic risk assessment / Management / Risk / Natural hazards

case study risk aware – ready for action risk ready

Add to Reading List

Source URL: www.gns.cri.nz

Language: English - Date: 2010-08-26 01:21:15
233Security Content Automation Protocol / Vulnerability / Countermeasure / Open Vulnerability and Assessment Language / Social vulnerability / Ontology / National Vulnerability Database / Attack / Cisco IOS / Computer security / Cyberwarfare / Security

Avoiding Inconsistencies in the Security Content Automation Protocol William M. Fitzgerald Computer Science Department University College Cork Ireland

Add to Reading List

Source URL: www.cs.ucc.ie

Language: English - Date: 2013-08-16 10:44:34
234Computer security / SecuriTeam / Malware / Beyond Security / Trojan horse / WinFS / Hacker / Phishing / Computing / Social engineering / Cybercrime

Beyond Security Automatic Vulnerability Assessment in the Year 2013 Myth or Reality

Add to Reading List

Source URL: beyondsecurity.de

Language: English - Date: 2012-08-21 09:36:12
235Cyberwarfare / Vulnerability / Social vulnerability / Environmental economics / Disaster / Threat / Flood / Urban resilience / Emergency management / Risk / Management / Ethics

Assessment of social vulnerability under three flood scenarios using an open source vulnerability index Garbutt K*1, Ellul C†2 and Fujiyama T‡2 1 Centre for Urban Sustainability and Resilience, Department of Civil,

Add to Reading List

Source URL: leeds.gisruk.org

Language: English - Date: 2015-04-19 18:19:37
236Management / Humanitarian aid / Risk / Development / Disaster risk reduction / Social vulnerability / Vulnerability / International Red Cross and Red Crescent Movement / International Federation of Red Cross and Red Crescent Societies / Public safety / Emergency management / Disaster preparedness

What is VCA? An introduction to vulnerability and capacity assessment The International Federation’s

Add to Reading List

Source URL: ifrc.org

Language: English - Date: 2010-09-23 09:34:57
237Computer network security / Electronic commerce / Hacking / Software testing / Vulnerability / Open Vulnerability and Assessment Language / Nessus / Security Technical Implementation Guide / Critical infrastructure protection / Computer security / Cyberwarfare / Security

Secure Configuration Remediation Tool Task Order Title Department of Defense (DoD)-wide Enterprise License for an automated Secure Configuration Remediation (SCR) tool.

Add to Reading List

Source URL: cve.mitre.org

Language: English - Date: 2007-09-17 15:17:21
238Health promotion / Human geography / Occupational safety and health / Simandou / Social vulnerability / Risk / Management / Health / Impact assessment / Health impact assessment

Microsoft Word - Mine_21_CommHSS_vDF2.05_clean.docx

Add to Reading List

Source URL: www.riotinto.com

Language: English - Date: 2014-12-05 06:42:27
239Gross domestic product / Sustainability / Social vulnerability / Sustainable development / Development economics / Economics / Environment / Economic theories

A Trade and Development Indicators’ System for Strategic Assessment and Monitoring: Applications relevant to SVEs and ACP Countries Progress attained on the smallness and vulnerability issues and potential advancements

Add to Reading List

Source URL: vi.unctad.org

Language: English - Date: 2010-05-28 03:32:06
240Software testing / Antivirus software / Cyberwarfare / Application security / Computer security / Malware / Network security / Hack / Vulnerability / Computing / Hacking / Software

Conference Kit * 30 Network Security Specialists and Researchers * 6-tracks of Hands on Technical Training Sessions * Network Assessment and Latest Attack Methods * Fundamental Defense Methodologies * Close Look At the L

Add to Reading List

Source URL: conference.hitb.org

Language: English - Date: 2014-10-26 12:49:07
UPDATE