Vulnerability management

Results: 5447



#Item
991Management / Disaster preparedness / Humanitarian aid / Glastonbury Festival / Oxfam / Disaster risk reduction / Capacity building / Social vulnerability / AusAID / Development / Public safety / Emergency management

As the number of people affected by disasters has risen, so have the expectations placed on humanitarian agencies by donors, the public and the affected populations themselves. Agencies must now provide evidence of impac

Add to Reading List

Source URL: www.alnap.org

Language: English - Date: 2014-08-21 06:57:02
992Risk management / Risk / Humanitarian aid / Forced migration / Persecution / Disaster / Emergency management / Internally displaced person / Social vulnerability / Management / Ethics / Natural hazards

Annex A: the methodology behind IDMC’s global estimates IDMC’s annual Global Estimates report aims to provide a broad, quantified, global view of displacement associated with disasters brought on by natural hazards,

Add to Reading List

Source URL: www.internal-displacement.org

Language: English - Date: 2014-10-22 04:17:07
993Kansai Big Six / Ritsumeikan University / Management / Disaster / Public safety / Coordinating Committee for Earthquake Prediction / Social vulnerability / Disaster preparedness / Humanitarian aid / Emergency management

Global Center of Excellence for Education, Research and Development of Strategy on Disaster Mitigation of Cultural Heritage and Historic Cities Newsletter No.19

Add to Reading List

Source URL: www.rits-dmuch.jp

Language: English - Date: 2013-03-20 23:52:07
994Qualys / Computing / Lumeta Corporation / Vulnerability / Attack / VM / Computer network security / Computer security / Cyberwarfare

DATA SHEET Complete Vulnerability Management Across the Entire Enterprise Lumeta IPsonar and Qualys Integration Device and network vulnerabilities throughout the enterprise can be

Add to Reading List

Source URL: www.lumeta.com

Language: English - Date: 2015-03-11 11:06:00
995Ethics / Natural hazards / Hazards / Disaster / Social vulnerability / Natural disaster / Earthquake / Tsunami / Vulnerability / Management / Risk / Emergency management

http://www.tulane.edu/~sanelson/Natural_Disasters/introduction.

Add to Reading List

Source URL: www.tulane.edu

Language: English - Date: 2014-08-19 16:43:08
996Physical geography / Nature / Land management / Soil mechanics / Soil physics / Soil / Subsidence / Water content / Social vulnerability / Hydrology / Earth / Droughts

Hydrol. Earth Syst. Sci., 13, 1739–1747, 2009 www.hydrol-earth-syst-sci.net/ © Author(sThis work is distributed under the Creative Commons Attribution 3.0 License. Hydrology and

Add to Reading List

Source URL: www.hydrol-earth-syst-sci.net

Language: English - Date: 2014-12-04 02:31:09
997Computer network security / Software testing / Risk / Rapid7 / Metasploit Project / National security / Vulnerability / Penetration test / Social vulnerability / Computer security / Software / Cyberwarfare

``` Rapid7 Introduces Nexpose Ultimate, the First and Only Unified Solution for Vulnerability Management, Vulnerability Validation, and Controls Effectiveness Testing Innovative product improves overall network security

Add to Reading List

Source URL: www.rapid7.com

Language: English - Date: 2014-10-08 10:38:23
998Computer network security / Software testing / Rapid7 / Hacking / Vulnerability management / Social vulnerability / Vulnerability / Metasploit Project / Computer security / Software / System software

Nexpose Certified Administrator: Introduction to Nexpose What is it? Are you a security professional that doesn’t quite know where to begin getting an understanding of what kind of devices are in your environment, or h

Add to Reading List

Source URL: www.rapid7.com

Language: English - Date: 2015-03-26 11:34:29
999Notation / SQL / Data management / Markup languages / Computing / Mitre Corporation / Open Vulnerability and Assessment Language

OVAL Board MeetingAttendees Eric Walker – IBM Dave Waltermire – NIST Kent Landfield – McAfee, Inc. Steve Grubb – Red Hat

Add to Reading List

Source URL: oval.mitre.org

Language: English - Date: 2011-07-15 08:20:27
1000Computer network security / Software testing / Rapid7 / Metasploit Project / Data security / Security / Penetration test / Information security / Attack / Computer security / Software / Cyberwarfare

SC Magazine Readers Select Rapid7 As a Finalist in 2012 Awards for the Best Vulnerability Management Tool and Best SME Security Solution Readers Recognize Nexpose Enterprise and Metasploit Pro For Their Innovation Boston

Add to Reading List

Source URL: www.rapid7.com

Language: English - Date: 2012-11-29 09:06:07
UPDATE