Vulnerability management

Results: 5447



#Item
201Humanitarian aid / Disaster preparedness / Motivation / Positive psychology / Psychological resilience / Disaster risk reduction / Frontline / Social vulnerability / Adaptation to global warming / Public safety / Emergency management / Management

Frontline Methodology Guide VersionTDG Note that these guidelines will be frequently updated: check at www.gndr.org/frontline Introduction

Add to Reading List

Source URL: www.gndr.org

Language: English - Date: 2015-03-10 08:51:07
202Management / Glastonbury Festival / Oxfam / Gender analysis / Gender mainstreaming / Gender / Disaster risk reduction / Empowerment / Social vulnerability / Sociology / Gender studies / Public safety

Gender, Disaster Risk Reduction, and Climate Change Adaptation

Add to Reading List

Source URL: www.indiaenvironmentportal.org.in

Language: English - Date: 2010-06-14 02:25:41
203Peace and conflict studies / Ethnic conflict / Conflict management / Conflict resolution / Fund for Peace / Conflict analysis / Social vulnerability / Mediation / Needs assessment / Conflict / Sociology / Dispute resolution

CHAPTER 2 Conflict analysis Purpose of chapter This chapter explains: l

Add to Reading List

Source URL: www.amaniafrika.org

Language: English - Date: 2012-03-30 07:30:01
204Risk management / Actuarial science / Impact assessment / Technology assessment / Social vulnerability / Geographic information system / Dangerous goods / HELCOM / Risk / Ethics / Management

Admiral Danish Fleet HQ, National Operations, Maritime Environment Sub-regional risk of spill of oil and hazardous substances in the Baltic Sea (BRISK)

Add to Reading List

Source URL: www.brisk.helcom.fi

Language: English
205Software testing / Hacking / Relational database management systems / Database management systems / Attack patterns / SQL injection / Vulnerability / Code injection / Buffer overflow / Cyberwarfare / Computing / Computer security

CWECWE/SANS Top 25 Most Dangerous Software Errors

Add to Reading List

Source URL: cwe.mitre.org

Language: English - Date: 2012-09-25 15:14:33
206Cyberwarfare / Deliverable / Vulnerability / Penetration test / Management / Software testing / Computer security / Project management

Secure Provision and Consumption in the Internet of Services FP7-ICT, ICTTrustworthy ICT) Project Nowww.spacios.eu

Add to Reading List

Source URL: www.spacios.eu

Language: English - Date: 2013-07-12 10:38:54
207Emergency management / Ethics / Actuarial science / Disaster preparedness / Humanitarian aid / Disaster risk reduction / Social vulnerability / Disaster / Centre for Research on the Epidemiology of Disasters / Management / Public safety / Risk

Microsoft PowerPoint - 3 METIER_Final_Conference_Ochola.ppt

Add to Reading List

Source URL: www.peer.eu

Language: English - Date: 2010-01-14 18:00:00
208Technology / Hacking / Computer network security / Computer security / Secure communication / SCADA / Vulnerability / Automation / Security testing / Software testing / Cyberwarfare / Security

Emerson Process Management Integrates Achilles Testing June 15, 2009 Wurldtech Announces The Latest Equipment Manufacturer To Select The Award-Winning Achilles Security & Robustness Testing Platform Demonstrating Continu

Add to Reading List

Source URL: www.wurldtech.com

Language: English - Date: 2015-07-15 01:28:14
209Emergency management / Humanitarian aid / Occupational safety and health / Disaster recovery / Social vulnerability / Disaster / Social Sciences and Humanities Research Council / Risk / Psychological resilience / Management / Public safety / Disaster preparedness

Microsoft Word - SL-Newsletter V1, I2, 2013 FINAL.docx

Add to Reading List

Source URL: disaster.colostate.edu

Language: English - Date: 2013-07-23 17:27:21
210

Security Vulnerability Management Mark J Cox Responsibility & Accountability ●

Add to Reading List

Source URL: people.redhat.com

- Date: 2007-03-13 09:56:47
    UPDATE