Vulnerability management

Results: 5447



#Item
341Computing / Software project management / Method engineering / Evaluation / Baseline / Configuration management / Vulnerability / Common Criteria / CimTrak / Computer security / Computer network security / Information technology management

Software Supplier Words Software Supplier Words REQUIREMENTS. The following are broad categories of short and long term goals and expectations for this SOO. The descriptions are in general terms at the objectives level

Add to Reading List

Source URL: cve.mitre.org

Language: English - Date: 2007-09-17 15:17:08
342Humanitarian aid / Management / Development / Disaster risk reduction / International Red Cross and Red Crescent Movement / Social vulnerability / Public safety / Emergency management / Disaster preparedness

How to do a VCA A practical step-by-step guide for Red Cross Red Crescent staff and volunteers

Add to Reading List

Source URL: ifrc.org

Language: English - Date: 2010-09-23 09:45:23
343Knowledge / International Union of Geodesy and Geophysics / International Association of Geomagnetism and Aeronomy / International Council for Science / Benoit Mandelbrot / Social vulnerability / Disaster / Risk / Emergency management / Geophysics / Science / Geology

Microsoft Word - IUGGej1011.doc

Add to Reading List

Source URL: iugg.org

Language: English - Date: 2012-07-28 17:22:43
344Key management / Electronic commerce / Secure communication / Transport Layer Security / X.509 / Certificate authority / Public key certificate / HTTP Secure / RSA / Cryptography / Public-key cryptography / Cryptographic protocols

When Private Keys are Public: Results from the 2008 Debian OpenSSL Vulnerability Scott Yilek Eric Rescorla

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2009-09-07 21:20:06
345Disaster preparedness / Humanitarian aid / Natural disasters / World Conference on Disaster Reduction / Disaster risk reduction / Disaster / Yoshitaka Murata / Jan Egeland / Social vulnerability / Public safety / Emergency management / Management

iisd Earth Negotiations Bulletin WCDR

Add to Reading List

Source URL: www.iisd.ca

Language: English - Date: 2005-01-18 10:54:19
346Data security / Computer network security / Crime prevention / National security / Information security / Federal Information Security Management Act / Vulnerability / Cloud computing security / Managed security service / Computer security / Security / Cyberwarfare

Information Security Challenges www.KahnConsultingInc.com Evaluation: Meridio

Add to Reading List

Source URL: www.kahnconsultinginc.com

Language: English - Date: 2007-09-05 16:18:00
347Disaster preparedness / Humanitarian aid / Risk / Development / Disaster risk reduction / Tata-Dhan Academy / Social vulnerability / Disaster / Community radio / Management / Public safety / Emergency management

ADVANCED CENTRE FOR ENABLING DISASTER RISK REDUCTION Pilots Brief1 Information: A Lifeline for Vulnerable Communities

Add to Reading List

Source URL: www.dhan.org

Language: English - Date: 2011-04-28 05:15:56
348International Year of Planet Earth / Emergency management / International Geoscience Programme / Natural hazard / International Union of Geological Sciences / Social vulnerability / Risk / Disaster / World Conference on Disaster Reduction / Earth / Management / Ethics

Hazards minimising risk, maximising awareness planetearth Earth Sciences for Society

Add to Reading List

Source URL: www.geology.bas.bg

Language: English - Date: 2006-11-21 05:51:18
349Computer network security / Data security / Crime prevention / National security / Information security / Vulnerability / Security management / Countermeasure / Security controls / Security / Computer security / Cyberwarfare

Information Security Management Benchmark - The Self-Assessment Tool for Security Measures - In this self-assessment site you will be asked 27 questions about information security measures in part I and 19 questions rega

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2014-10-27 01:00:18
350Risk / Emergency management / National security / Computer network security / Computer security / Vulnerability / Social vulnerability / Terrorism / Hazard / Security / Public safety / Management

NORTH CAROLINA DEPARTMENT OF AGRICULTURE & CONSUMER SERVICES

Add to Reading List

Source URL: ncagr.gov

Language: English - Date: 2011-03-22 09:59:56
UPDATE