Vulnerability assessment

Results: 2199



#Item
871Management / Vulnerability / Social vulnerability / ETH Zurich / Reinsurance / Knowledge / Actuarial science / Risk / Ethics

ETH Research Database Project Summary VULPET (Vulnerability Assessment of Petrochemical Plants) 1) Creation date of the summary: [removed]

Add to Reading List

Source URL: www.lsa.ethz.ch

Language: English - Date: 2008-01-29 08:29:20
872Actuarial science / Security / Effects of global warming / Risk management / Current sea level rise / Social vulnerability / Decision support system / Climate Change Science Program / Management / Ethics / Risk

A Geospatial Decision Support System for climate change risk assessment and management Rizzi J.a,b, Torresan S. a, Zabeo A. a,b, Gallina V. a, Critto A. a,b, Giove S. c, Marcomini A. b a

Add to Reading List

Source URL: www.agile-online.org

Language: English - Date: 2011-03-31 09:14:58
873Emergency management / Humanitarian aid / Development / Natural disasters / Disaster risk reduction / International Decade for Natural Disaster Reduction / Disaster / Risk / Social vulnerability / Management / Public safety / Disaster preparedness

Community based disaster risk reduction planning tool Local level risk assessment of natural hazards and development of action plans for reducing the impacts of disasters

Add to Reading List

Source URL: assets.helvetas.org

Language: English - Date: 2013-01-09 05:09:25
874Emergency management / Actuarial science / Hazard analysis / Hazard / Social vulnerability / Vulnerability / Disaster / Threat / Risk assessment / Risk / Security / Management

Hazards and Risk @ SLR Network A Preliminary Overview Dr. Jorge R. del Pino formerly at the

Add to Reading List

Source URL: cddis.gsfc.nasa.gov

Language: English - Date: 2011-06-17 15:09:55
875Security / Actuarial science / ETH Zurich / Vulnerability assessment / Public safety / Vulnerability / Social vulnerability / Risk / Ethics / Management

ETH Research Database Project Summary Vulnerability Assessment Regional Level 1) Creation date of the summary: [removed]

Add to Reading List

Source URL: www.lsa.ethz.ch

Language: English - Date: 2008-06-10 06:08:22
876Risk management / Design for X / Security / Reliability engineering / Vulnerability assessment / European Safety and Reliability Association / Social vulnerability / Probabilistic risk assessment / ETH Zurich / Ethics / Risk / Probability

crosoft Word - J4rg Birchmeier-cv.docx

Add to Reading List

Source URL: www.lsa.ethz.ch

Language: English - Date: 2008-08-05 06:30:14
877Spatial data analysis / Social vulnerability / Spatial analysis / Vulnerability / Geographic information system / Statistics / Risk / Geography

INQUIMUS Workshop Series Integrating quantitative and qualitative assessment

Add to Reading List

Source URL: www.uni-salzburg.at

Language: English - Date: 2014-04-10 09:18:58
878Cyberwarfare / Computer network security / Security / Penetration test / Hacker / Vulnerability / White hat / Exploit / Security testing / Software testing / Hacking / Computer security

Incorporating Cyber Threat Intelligence into Security Assessment

Add to Reading List

Source URL: digital-forensics.sans.org

Language: English - Date: 2015-02-06 11:01:11
879Security / Computer network security / Software testing / OWASP / Application security / Web application security / Vulnerability / Computer security / Cyberwarfare / Computing

WhiteHat Security Jim Manico – VP Security Architecture When is a web security assessment tool effective for your web application security program? Page 1

Add to Reading List

Source URL: software-security.sans.org

Language: English - Date: 2012-08-27 12:08:52
880Security / Software testing / Crime prevention / National security / Penetration test / Vulnerability / Exploit / Attack / Information security / Computer security / Computer network security / Cyberwarfare

Penetration Testing “Let us find your vulnerabilities before anyone else does.” A Penetration Test or Vulnerability Assessment is used to discover what an unauthorised individual(s) may be able to achieve when target

Add to Reading List

Source URL: www.cndltd.com

Language: English - Date: 2014-08-15 16:51:06
UPDATE