Vulnerability database

Results: 242



#Item
21Computer network security / Data security / Content-control software / Fortinet / Database security / Database activity monitoring / Security information and event management / Vulnerability / Database / Computing / Computer security / Cyberwarfare

DATA SHEET FortiDB™ Database Security and Compliance FortiDB

Add to Reading List

Source URL: corex.at

Language: English - Date: 2015-05-13 12:15:06
22Computer security / Crime prevention / National security / Database security / Vulnerability / Application security / Network security / Cisco Career Certifications / Information security audit / Security / Cyberwarfare / Computer network security

Senior Security Engineer Location: Burlington, VT or Denver, CO or Boston, MA or Washington DC Term: Permanent Travel Required: Yes – up to 50% Telecommute: Occasionally

Add to Reading List

Source URL: www.nuharborsecurity.com

Language: English - Date: 2015-05-04 21:34:25
23Security / Malware / Vulnerability / Threat / Computer insecurity / Zero-day attack / Attack / Database security / Cloud computing / Computer network security / Cyberwarfare / Computer security

TOP 10 where Security-OBLIGATED Executives should focus Introduction

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-01-21 02:20:33
24Security / Malware / Vulnerability / Threat / Computer insecurity / Zero-day attack / Attack / Database security / Cloud computing / Computer network security / Cyberwarfare / Computer security

TOP 10 where Security-OBLIGATED Executives should focus Introduction

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-01-21 02:20:33
25Economics / Social issues / Sociology / Quality of life / Social vulnerability / Social exclusion / Gross domestic product / Open Method of Coordination / Child poverty / Socioeconomics / Development / Poverty

Conception Paper for an Integrated Poverty and Living Condition Indicator System (IPOLIS) Database First draft – not to be quoted András Gábos and Marianna Kopasz

Add to Reading List

Source URL: www.tarki.hu

Language: English - Date: 2013-11-18 11:23:51
26Disaster preparedness / Humanitarian aid / Natural disasters / Development / Disaster risk reduction / Social vulnerability / Adaptation to global warming / Database / Disaster / Management / Public safety / Emergency management

Anguilla Interim national progress report on the implementation of the Hyogo Framework for Action Name of focal point : Mrs. Elizabeth Klute Organization : Department of Disaster Management

Add to Reading List

Source URL: www.eird.org

Language: English - Date: 2009-03-06 10:47:09
27Security Content Automation Protocol / Vulnerability / Countermeasure / Open Vulnerability and Assessment Language / Social vulnerability / Ontology / National Vulnerability Database / Attack / Cisco IOS / Computer security / Cyberwarfare / Security

Avoiding Inconsistencies in the Security Content Automation Protocol William M. Fitzgerald Computer Science Department University College Cork Ireland

Add to Reading List

Source URL: www.cs.ucc.ie

Language: English - Date: 2013-08-16 10:44:34
28Crime prevention / National security / Software testing / Integrity / Vulnerability / Database / Ring / Computer security / Security / Cyberwarfare

ABSTRACT KIL, CHONGKYUNG. Mechanisms for Protecting Software Integrity in Networked Systems. (Under the direction of Associate Professor Peng Ning). Protecting software integrity is a key to successfully maintain its own

Add to Reading List

Source URL: repository.lib.ncsu.edu

Language: English - Date: 2010-10-28 07:21:39
29Security / Malware / Vulnerability / Threat / Computer insecurity / Zero-day attack / Attack / Database security / Cloud computing / Computer network security / Cyberwarfare / Computer security

PDF Document

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-01-21 02:20:33
30Cross-platform software / Java platform / Query languages / SQL / Null / Java / Where / Oracle Database / Vulnerability / Computing / Relational database management systems / SQL keywords

PDF Document

Add to Reading List

Source URL: www.cigital.co.uk

Language: English - Date: 2014-10-08 15:38:40
UPDATE