Vulnerability management

Results: 5447



#Item
151Disaster preparedness / Business continuity and disaster recovery / Civil defense / National security / Resilience / Security / Psychological resilience / Federal Emergency Management Agency / Social vulnerability / Climate resilience / National disaster recovery framework

Microsoft Word - EDA_CO-Economic-Resilience-Planning_Oct2014.docx

Add to Reading List

Source URL: nwcoloradobusiness.org

Language: English - Date: 2015-07-21 14:27:37
152Disaster preparedness / Emergency management / Social vulnerability / Disaster / Federal Emergency Management Agency / Peek / Preparedness / Hurricane Katrina

CURRICULUM VITAE July 2012 Lori Peek, Ph.D. Department of Sociology Colorado State University B-237 Clark Building

Add to Reading List

Source URL: web.libarts.colostate.edu

Language: English - Date: 2014-06-27 12:49:39
153Data security / Computer security / Security / Computer network security / Cryptography / Information security management system / IT risk management / Information security / ISO/IEC 27001:2013 / Vulnerability / Security controls / Risk management

POLICY think project! INFORMATION SECURITY MANAGEMENT SYSTEM INFORMATION SECURITY POLICY

Add to Reading List

Source URL: www.thinkproject.com

Language: English - Date: 2015-03-17 10:50:21
154Computer security / Security / Computer network security / Computing / Crime prevention / Cryptography / National security / Vulnerability / OpenVAS / Attack / Countermeasure / Security appliance

Turn-key Vulnerability Management Greenbone Security Manager The solution for IT security in your organisation

Add to Reading List

Source URL: www.greenbone.net

Language: English - Date: 2016-06-15 04:15:49
155Computer security / Security / Data security / IT risk management / Risk analysis / BeyondTrust / Vulnerability / Threat / IT risk / Risk management / Asset

BeyondTrust Corporate Overview The leader in preventing data breaches from insider privilege abuse and external hacking attacks Reducing IT security risk with unmatched visibility and control The majority of data breache

Add to Reading List

Source URL: www.ciosummits.com

Language: English - Date: 2016-02-10 11:33:29
156Emergency management / Risk / Prevention / Safety / Actuarial science / Warning systems / Natural hazards / Early warning system / Tsunami / Hazard / Social vulnerability / Disaster

doi:rsta

Add to Reading List

Source URL: statebuildingmonitor.files.wordpress.com

Language: English - Date: 2012-01-13 11:15:29
157Hydrology / Water supply / Gilbert F. White / Hazard analysis / Hazard / Social vulnerability / Water scarcity / Natural hazard / Mekong River Commission / Water resource management / Flood / Water

Gilbert F. WhiteGreat Aspirations: Local Studies, National Comparisons, Global Challenges Gilbert White’s seven decades of professional life were nurtured in Chicago, begun in Washington, practiced in Africa

Add to Reading List

Source URL: dels.nas.edu

Language: English - Date: 2011-08-24 19:22:26
158BIOS / Boot loaders / Booting / Unified Extensible Firmware Interface / Advanced Configuration and Power Interface / Rootkit / System Management Mode / S3 / Reboot / Unified EFI Forum / Coreboot

Advanced Threat Research Technical Details of the S3 Resume Boot Script Vulnerability Revision 1 July 2015

Add to Reading List

Source URL: www.intelsecurity.com

Language: English - Date: 2015-07-29 16:06:16
159Computer security / Security / Computer network security / Computing / Software testing / Codenomicon / Coriant / Vulnerability management

Creating Trust with Coriant Power suppliers, critical infrastructure providers, and network builders all operate in an unsafe world, where cyber attacks and network malfunctions can disrupt services. Coriant’s customer

Add to Reading List

Source URL: www.codenomicon.com

Language: English - Date: 2016-03-02 04:58:14
160Safety / Risk / Prevention / Probability / Disaster preparedness / Actuarial science / Humanitarian aid / Risk management / United Nations International Strategy for Disaster Reduction / Disaster risk reduction / Emergency management / Social vulnerability

Project number: Project name:

Add to Reading List

Source URL: matrix.gpi.kit.edu

Language: English - Date: 2014-02-10 08:17:58
UPDATE