Vulnerability management

Results: 5447



#Item
391Emergency management / Humanitarian aid / Development / Disaster / National Disaster Risk Reduction and Management Council / Risk / Social vulnerability / Typhoon Ketsana / Mayon Volcano / Management / Public safety / Disaster preparedness

Philippine Institute for Development Studies Surian sa mga Pag-aaral Pangkaunlaran ng Pilipinas Policy Notes

Add to Reading List

Source URL: dirp4.pids.gov.ph

Language: English - Date: 2011-03-28 23:08:27
392Disaster preparedness / Humanitarian aid / Disaster / Natural disasters / Weather / Social vulnerability / Oxfam / Centre for Research on the Epidemiology of Disasters / Risk / Management / Public safety / Emergency management

Time’s Bitter Flood: Trends in the number of reported natural disasters

Add to Reading List

Source URL: www.oxfam.org.hk

Language: English - Date: 2011-05-30 22:57:29
393Disaster preparedness / Humanitarian aid / Development / Disaster risk reduction / Intergovernmental Authority on Development / Disaster / Social vulnerability / Psychological resilience / Will / Management / Public safety / Emergency management

Image: European Space Agency Conference report Strengthening technological capacities and information access for improving disaster risk reduction in the Horn of Africa

Add to Reading List

Source URL: www.wiltonpark.org.uk

Language: English - Date: 2014-03-07 09:07:54
394Data security / Crime prevention / National security / Hacking / Network security / Information security management system / Information security / Vulnerability / Attack / Security / Computer security / Cyberwarfare

NATIONAL CYBER SECURITY EXERCISE 2011 FINAL REPORT ISBN: January 2011

Add to Reading List

Source URL: www.syssec-project.eu

Language: English - Date: 2012-05-08 16:05:54
395Education / Adaptation to global warming / Global warming / Transdisciplinarity / Social vulnerability / Sustainability science / Disciplinary / Vulnerability / Cognition / Pedagogy / Knowledge / Risk

Transdisciplinary Communication and Stakeholder Integration in Climate Change Adaptation Jo-Ting Huang-Lachmann, Climate Service Center 2.0/HZG, Germany; Chair of Environmental Management and Accounting, Faculty of Busin

Add to Reading List

Source URL: presentations.copernicus.org

Language: English - Date: 2014-11-21 07:34:26
396Natural hazards / Risk management / Federal Emergency Management Agency / HAZUS / Social vulnerability / Risk / Disaster / Honolulu / Management / Public safety / Emergency management

Microsoft Word - TRB_NHTS_EvacuationMedicalCondition_v3.docx

Add to Reading List

Source URL: nhts.ornl.gov

Language: English - Date: 2015-02-25 08:47:25
397Environment of the Philippines / Food security / Emergency management / Social vulnerability / World food price crisis / Disaster / Economics / Economic impacts of climate change / Humanitarian aid / Food politics / Public safety

Economic Valuation of Aquatic Resources in Cambodia

Add to Reading List

Source URL: dirp3.pids.gov.ph

Language: English - Date: 2012-11-05 04:24:08
398Disaster preparedness / Humanitarian aid / Natural disasters / Development / Disaster risk reduction / Social vulnerability / Adaptation to global warming / Database / Disaster / Management / Public safety / Emergency management

Anguilla Interim national progress report on the implementation of the Hyogo Framework for Action Name of focal point : Mrs. Elizabeth Klute Organization : Department of Disaster Management

Add to Reading List

Source URL: www.eird.org

Language: English - Date: 2009-03-06 10:47:09
399Data security / Crime prevention / Computer network security / Information technology management / National security / Information security management system / Risk / Computer security / Vulnerability / Security / Public safety / Business

Who is the right gatekeeper for IT security? Popping Purple Pills: Who is the right gatekeeper for IT security? A CIOview White Paper

Add to Reading List

Source URL: www.cioview.com

Language: English - Date: 2005-12-12 17:11:30
400Cyberwarfare / Hacking / Vulnerability / Social vulnerability / Fuzz testing / Vulnerability management / Software testing / Computer security / Risk

1 Vulnerability finding in Win32 – a comparison There are several well known techniques to find a vulnerability in a closed source product running on the Windows family of operating systems. Researchers tend to prefer

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2015-05-28 15:51:40
UPDATE