Vulnerability assessment

Results: 2199



#Item
881Ethics / Actuarial science / Data security / Vulnerability assessment / Social vulnerability / Vulnerability / Emergency management / Organisation for Economic Co-operation and Development / Systemic risk / Risk / Management / Security

Microsoft Word - Denmark- assessing societal risks and vulnerabilities.doc

Add to Reading List

Source URL: www.oecd.org

Language: English - Date: 2014-07-21 01:20:50
882Catfish / Soul food / Invasive species / Chesapeake Bay / Flathead catfish / Fish / Chesapeake Bay Watershed / Aquaculture

Forecasting the potential effects of invasive catfishes in the Chesapeake Bay watershed: a GISbased vulnerability assessment GREG GARMAN, STEVE MCININCH, AND WILLIAM SHUART RICE RIVERS CENTER VIRGINIA COMMONWEALTH UNIVER

Add to Reading List

Source URL: www.chesapeakebay.net

Language: English - Date: 2013-12-02 18:05:57
883Public safety / Conservation-restoration / Disaster preparedness / Humanitarian aid / Emergency management / International Centre for the Study of the Preservation and Restoration of Cultural Property / Social vulnerability / Disaster / Vulnerability / Risk / Management / Ethics

The Beijing Appeal Regional Capacity-Building Workshop on Assessment of Vulnerability of World Cultural and Natural Heritage Properties in Asia - Pacific to Disasters and Climate Change UNESCO, ICCROM and WHITR-AP Beijin

Add to Reading List

Source URL: whc.unesco.org

Language: English - Date: 2011-10-20 11:18:54
884Emergency management / Actuarial science / Safety engineering / Fire and Rescue NSW / Risk management / Risk assessment / Hazard / Insurance / Social vulnerability / Management / Risk / Ethics

University of Southern Queensland Faculty of Engineering and Surveying Applications of Geospatial Information Technology for Fire Risk Assessment and Management in NSW

Add to Reading List

Source URL: eprints.usq.edu.au

Language: English - Date: 2013-07-02 18:32:47
885Adaptation to global warming / Global warming / Social vulnerability / IPCC Fourth Assessment Report / Intergovernmental Panel on Climate Change / Robert Corell / National Center for Atmospheric Research / Atmospheric sciences / Climate change / Meteorology

Curriculum Vitae ______________________________________________________________________ SUSANNE C. MOSER, PH. D. Susanne Moser Research & Consulting 402 Arroyo Seco · Santa Cruz, CA 95060 · T: ([removed]Email: pro

Add to Reading List

Source URL: susannemoser.com

Language: English - Date: 2012-10-23 00:16:30
886Environmental design / Impact assessment / Social vulnerability / Environmental impact assessment / Prediction / Environmental indicator / Ecology / Environmental economics / Environment / Earth

CHAPTER 13 Importance of Land Cover and Biophysical Data in Landscape-Based Environmental Assessments K. Bruce Jones, U.S. Geological Survey, Biology Discipline, Reston, Virginia USA ABSTRACT

Add to Reading List

Source URL: www.aag.org

Language: English - Date: 2010-08-03 21:12:52
887Computer network security / Crime prevention / National security / Software testing / Cyc / Vulnerability / Network vulnerability scan / Computer network / Douglas Lenat / Security / Cyberwarfare / Computer security

A Knowledge-Based Approach to Network Security: Applying Cyc in the Domain of Network Risk Assessment Blake Shepard, Cynthia Matuszek, C. Bruce Fraser, William Wechtenhiser, David Crabbe, Zelal Güngördü, John Jantos,

Add to Reading List

Source URL: www.cyc.com

Language: English - Date: 2013-01-04 15:23:34
888Intergovernmental Panel on Climate Change / Risk / Global warming / Social vulnerability / Adaptation to global warming / IPCC Fourth Assessment Report / IPCC Fifth Assessment Report / Vulnerability / Global climate model / Climate change / Climatology / Atmospheric sciences

E UNITED NATIONS Distr. LIMITED

Add to Reading List

Source URL: css.escwa.org.lb

Language: English - Date: 2011-07-06 12:36:46
889Computer network security / Software testing / Rapid7 / Penetration test / Credit cards / Data privacy / Vulnerability / Payment Card Industry Data Security Standard / Threat / Computer security / Software / Computing

Network Penetration Test – Internal or External What is it? A penetration test simulates real-world attacks to provide a point-in-time assessment of vulnerabilities and threats to the customer’s network infrastructur

Add to Reading List

Source URL: www.rapid7.com

Language: English - Date: 2014-06-06 17:54:20
890Qualys / Social vulnerability

Brochure More information from http://www.researchandmarkets.com/reports[removed]Global Vulnerability Assessment Market[removed]Description:

Add to Reading List

Source URL: www.researchandmarkets.com

Language: English
UPDATE