Vulnerability assessment

Results: 2199



#Item
381Biology / Tennessee / Social vulnerability / Conservation biology / Adaptation to global warming / Southern United States / Confederate States of America / Tennessee Wildlife Resources Agency

Project Title: Tennessee Wildlife Resources Agency Vulnerability Assessment of State Wildlife Action Plan Species of Greatest Conservation Need Headline Title: West Tennessee Vulnerability Assessment Brief Summary: The T

Add to Reading List

Source URL: www.wildlifeadaptationstrategy.gov

Language: English - Date: 2015-03-26 14:50:03
382Management / Risk / Humanitarian aid / Motivation / Psychological resilience / Social vulnerability / International Decade for Natural Disaster Reduction / Disaster / Resilience / Emergency management / Public safety / Disaster preparedness

Social Dimensions of Vulnerability Professor Dilanthi Amaratunga Centre for Disaster Resilience, University of Salford, UK Training Workshop on Coastal Hazard Assessment: Applications in Risk

Add to Reading List

Source URL: www.disaster-resilience.net

Language: English
383McAfee / Computer network security / Companies listed on the New York Stock Exchange / Password / Database security / SQL injection / Vulnerability / Oracle Corporation / Oracle Database / Computer security / Cyberwarfare / Security

Data Sheet McAfee Vulnerability Manager for Databases A comprehensive assessment of the risk to your most sensitive data You store your most valuable and sensitive data in a database, but most vulnerability

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-01-10 00:53:28
384Software testing / Hacking / SAINT / Vulnerability / Penetration test / Attack / Zero-day attack / Cracking of wireless networks / Computer security / Cyberwarfare / Computer network security

» GROUP TEST l Vulnerability assessment This month’s group of products enable testing of the infrastructure, and make security assessments easy or, at least, easier, says Peter Stephenson. he environments in which we

Add to Reading List

Source URL: www.saintcorporation.com

Language: English - Date: 2008-08-18 12:46:26
385Hacking / Vulnerability scanner / Vulnerability / Image scanner / Nessus / Computer security / Cyberwarfare / SAINT

Centrally manage an entire network of SAINT vulnerability scanners located around the globe from a single interface. The centralized management and reporting capability lets a single vulnerability assessment team analyze

Add to Reading List

Source URL: www.saintcorporation.com

Language: English - Date: 2013-09-04 09:16:37
386Software testing / Hacking / SAINT / Vulnerability / Penetration test / Social vulnerability / Cracking of wireless networks / Nessus / Computer security / Cyberwarfare / Computer network security

» GROUP TEST l Vulnerability assessment Is vulnerability assessment what it should be? Peter Stephenson examines the field and discovers there have been some subtle – and a few not so subtle – evolutions in the spa

Add to Reading List

Source URL: www.saintcorporation.com

Language: English - Date: 2010-02-03 15:59:42
387Social vulnerability / Vulnerability / Security / Spatial analysis / Disaster / Statistics / Risk / Ethics

Assessment of Social Vulnerability Using Geographic Information Systems: Pendik, Istanbul Case Study Zeynep Haki, Zuhal Akyürek, Şebnem Düzgün Middle East Technical University, Natural and Applied Sciences, Geodetic

Add to Reading List

Source URL: itcnt05.itc.nl

Language: English - Date: 2005-02-27 17:00:00
388Desertification / Deserts / Drylands / Social vulnerability / Millennium Ecosystem Assessment / Earth / Environment / Michael Mortimore

Global Desertification: Building a Science for Dryland Development James F. Reynolds, et al. Science 316, ); DOI: scienceThe following resources related to this article are available online at

Add to Reading List

Source URL: www.desertnet-international.org

Language: English - Date: 2007-05-22 03:12:36
389National security / Computer security / Computer network security / Actuarial science / Information security / Threat / Critical infrastructure / Vulnerability / IT risk management / Security / Risk / Management

JDiBrief – Security Scenario based risk assessment for critical infrastructures: SUMMARY (1 of 5) Author: Dr Tanya Le Sage, UCL Department of Security & Crime Science In recent years democratic countries have witnessed

Add to Reading List

Source URL: www.ucl.ac.uk

Language: English - Date: 2013-06-27 11:57:27
390Urban heat island / Air pollution / Computer security / Cyberwarfare / Security / Risk / Social vulnerability / Vulnerability

Theme project: Vulnerability Assessment for Heat Wave and Relevant Adaptation Strategy Recommendations Progress Report The goal of this thematic project is to evaluate heatwave vulnerability determinants with a trans-dis

Add to Reading List

Source URL: www.cfss.sinica.edu.tw

Language: English - Date: 2012-11-08 01:45:48
UPDATE