Vulnerability management

Results: 5447



#Item
161Software development / Computer security / Cyberwarfare / Software testing / Computer network security / Software Bill of Materials / Software development process / Software project management / Supply chain management / Vulnerability / Codenomicon / Patch

AppCheck Build a More Resilient World KEY APPCHECK FEATURES: • Scan Anything in Minutes

Add to Reading List

Source URL: www.codenomicon.com

Language: English - Date: 2016-03-02 04:58:14
162

SNMP Vulnerability Management SNMP Vulnerability Management Solutions SNMP Vulnerabilities Simple Network Management Protocol (SNMP) is commonly used to monitor and manage critical

Add to Reading List

Source URL: bclpower.co.uk

Language: English - Date: 2015-03-06 12:22:59
    163Computing / Cyberwarfare / Software engineering / Hacking / Software testing / SQL / Computer security / Data management / SQL injection / Vulnerability / Data-flow analysis / Denial-of-service attack

    Static Detection and Automatic Exploitation of Intent Message Vulnerabilities in Android Applications Daniele Gallingani Rigel Gjomemo, V.N. Venkatakrishnan

    Add to Reading List

    Source URL: ieee-security.org

    Language: English - Date: 2015-05-20 23:58:55
    164Security / Prevention / Computer security / Computer network security / Data security / Cryptography / Information security / Threat / Managed security service / Risk management / Asset / Vulnerability

    In Brief WideAngle Managed Security Services (MSS) The threat landscape is evolving quickly – and Managed Security Services (MSS) can be

    Add to Reading List

    Source URL: www.nttcomsecurity.com

    Language: English - Date: 2015-07-14 05:58:47
    165Risk / Vulnerability / Security / Emergency management / Earthquake engineering / Social vulnerability / Natural hazard / Disaster / Flood / Hayward Fault Zone / Hazard / Seismic hazard

    Housing and Community Risk Multiple Hazard Risk Assessment Dana Brechwald, Resilience Planner, ABAG Cynthia Kroll, Chief Economist and Primary

    Add to Reading List

    Source URL: resilience.abag.ca.gov

    Language: English - Date: 2015-03-12 15:22:33
    166Computing / Software testing / Computer security / Security / Codenomicon / Vulnerability / Fuzz testing / Wi-Fi / Transport Layer Security / Bluetooth / Vulnerability management

    Defensics Build a More Resilient World KEY DEFENSICS FEATURES: • Next-Gen Fuzzing Technology Utilizes template, generation

    Add to Reading List

    Source URL: www.codenomicon.com

    Language: English - Date: 2016-03-02 04:58:12
    167

    Integrated Flood Risk Analysis and Management Methodologies Vulnerability, resilience and social constructions of flood risks in exposed communities A CROSS-COUNTRY COMPARISON OF CASE STUDIES IN GERMANY, ITALY AND THE UK

    Add to Reading List

    Source URL: www.floodsite.net

    Language: English - Date: 2014-10-20 17:13:14
      168Emergency management / Disaster preparedness / Humanitarian aid / International development / Natural disasters / Disaster risk reduction / World Conference on Disaster Risk Reduction / Gender equality / Social vulnerability / Disaster / Resilience / Gender

      Text adopted on 9 MarchGender Equality and the Empowerment of Women in Natural Disasters The Commission on the Status of Women, Bearing in mind that natural disasters affect human lives and living conditions there

      Add to Reading List

      Source URL: www.gender.go.jp

      Language: English - Date: 2015-07-10 09:34:08
      169Safety / Prevention / Risk / Probability / Actuarial science / Hazard analysis / Security / HAZUS / Social vulnerability / Hazard / Emergency management / Vulnerability assessment

      Schelhorn et al. Identifying Elementsat Risk from OpenStreetMap Identifying Elements at Risk from OpenStreetMap: The Case of Flooding

      Add to Reading List

      Source URL: www.agora.icmc.usp.br

      Language: English - Date: 2014-03-30 16:06:02
      170Transport / Business / Economy / Road traffic management / Road transport / Transportation planning / Route assignment / Vulnerability assessment / Traffic congestion / Risk / Social vulnerability / Traffic flow

      New Pratices in Vulnerability Assessment: Applicability and Limitations Alex Erath Kay W. Axhausen Swiss Transport Research Conference 2008

      Add to Reading List

      Source URL: www.strc.ch

      Language: English - Date: 2008-11-24 07:42:20
      UPDATE