Vulnerability management

Results: 5447



#Item
861Actuarial science / Management / Flood / Hydrology / Water / Social vulnerability / Psychological resilience / Environment Agency / Flood risk assessment / Meteorology / Atmospheric sciences / Risk

STATEMENT OF THE 6TH INTERNATIONAL CONFERENCE ON FLOOD MANAGEMENT (ICFM6) “FLOODS IN A CHANGING ENVIRONMENT” 16-18 SEPTEMBER 2014, SAO PAULO, BRAZIL From September 16th to 18th 2014, the 6th International Conference

Add to Reading List

Source URL: www.abrh.org.br

Language: English - Date: 2014-11-13 13:16:57
862International Association for Hydro-Environment Engineering and Research / Environmental engineering / Hydrology / UNESCO-IHE / Emergency management / World Meteorological Organization / Vulnerability / Flood warning / Earth / United Nations / Water

International Flood Initiative: UNESCO, WMO, UNU, ISDR; 2007

Add to Reading List

Source URL: www.ifi-home.info

Language: English - Date: 2012-07-09 00:10:37
863Computer network security / Crime prevention / National security / Key management / Computer security / Key escrow / Clipper chip / Vulnerability / Encryption / Security / Cyberwarfare / Cryptography

governmentreform-blaze2015

Add to Reading List

Source URL: oversight.house.gov

Language: English - Date: 2015-04-29 09:32:56
864Disaster preparedness / Risk / Humanitarian aid / Actuarial science / Disaster risk reduction / Social vulnerability / Disaster / Vulnerability / Natural hazard / Management / Public safety / Emergency management

The official statement of the Ethiopian Delegation to the second session of the Global Platform for Disaster Risk Reduction

Add to Reading List

Source URL: www.preventionweb.net

Language: English - Date: 2011-04-06 05:20:25
865Lumeta Corporation / Vulnerability management / Vulnerability / McAfee / Computer network security / Computer security / Cyberwarfare

PROFESSIONAL SERVICES Lumeta Edge Protecting your systems and infrastructure from vulnerabilities begins with securing your entire network. It’s certainly essential to be conscious of the inside, for if some malware w

Add to Reading List

Source URL: www.lumeta.com

Language: English - Date: 2014-11-05 11:55:14
866Agronomy / Hydrology / Emergency management / Risk / Risk management / Evapotranspiration / Social vulnerability / Economics of global warming / Environment / Earth / Ethics

opinion & comment Lobell et al. reply — The comments by Basso and Ritchie1 are unconvincing for several reasons. First, the main point of our paper2 (hereafter referred to as L13) was to gain insight into the mechanism

Add to Reading List

Source URL: web.stanford.edu

Language: English - Date: 2014-03-26 14:50:20
867Cyberwarfare / Data security / National security / Site Security Handbook / Vulnerability / Network security / Information security management system / Internet security / Password / Security / Computer network security / Computer security

Network Working Group Request for Comments: 2196 FYI: 8 Obsoletes: 1244 Category: Informational

Add to Reading List

Source URL: ietfreport.isoc.org

Language: English - Date: 2001-12-15 08:00:00
868Emergency management / Disaster preparedness / Development / Occupational safety and health / Social vulnerability / Disaster risk reduction / Crisis / Humanitarian crisis / Humanitarian Futures Programme / Humanitarian aid / Management / Public safety

International Federation of Red Cross and Red Crescent Societies 5I Key messages / World Disasters ReportAugust 2011 Section 2: Facing the humanitarian challenges of the future – threats and opportunities

Add to Reading List

Source URL: redcross.org.au

Language: English - Date: 2013-12-10 12:21:34
869Security / Emergency management / Vulnerability / Federal Protective Service / DHS Directorate for Science and Technology / Public safety / United States Department of Homeland Security / National security

Microsoft Word - CVPIPM_1PAGE_Community_ReligiousFacilities UPDATED LINKS

Add to Reading List

Source URL: fedweb-assets.s3.amazonaws.com

Language: English - Date: 2014-01-14 10:02:21
870Vulnerability / Open Vulnerability and Assessment Language / Social vulnerability / Common Vulnerabilities and Exposures / Information security / Information assurance / SAINT / Information assurance vulnerability alert / Computer security / Cyberwarfare / Security

Information Assurance Vulnerability Assessment Tool 2. Task Order Title Enterprise License for an automated Information Assurance Vulnerability Management (IAVM) Compliance Tool. Background

Add to Reading List

Source URL: oval.mitre.org

Language: English - Date: 2006-04-11 15:56:23
UPDATE