Vulnerability management

Results: 5447



#Item
941Actuarial science / Earth / Hydrology / Flood control / Flood risk assessment / Security / Flood / Social vulnerability / Risk management / Risk / Meteorology / Atmospheric sciences

Microsoft WordIWE-CCW-R005-D HA20

Add to Reading List

Source URL: www.opw.ie

Language: English - Date: 2014-12-23 16:45:32
942Emergency management / Humanitarian aid / Risk / Development / Disaster risk reduction / International Decade for Natural Disaster Reduction / Social vulnerability / Vulnerability / Disaster / Management / Public safety / Disaster preparedness

The Good, The Bad and The Ugly: Disaster Risk Reduction (DRR) Versus Disaster Risk Creation (DRC) – PLOS Currents Disasters

Add to Reading List

Source URL: risk.earthmind.net

Language: English - Date: 2012-10-12 07:43:28
943Actuarial science / Hydrology / Security / Flood risk assessment / Flood / Risk management / Social vulnerability / Risk / Ethics / Management

Microsoft WordIWE-CCW-R004-D HA19

Add to Reading List

Source URL: www.opw.ie

Language: English - Date: 2014-12-23 18:26:15
944Computer security / IT risk management / Risk management / Vulnerability / Security risk / Risk assessment / IT risk / Hazard / Attack / Risk / Security / Management

NOV. 02 U.S. Department of Justice Office of Justice Programs National Institute of Justice

Add to Reading List

Source URL: www.jumpjet.info

Language: English - Date: 2008-11-09 02:04:03
945Emergency management / Natural hazards / Risk management / Humanitarian aid / National Institute of Water and Atmospheric Research / Social vulnerability / GNS Science / Disaster research / Risk / Management / Public safety / Disaster preparedness

Microsoft Word - Draft of Research Strat_Sept 2010.doc

Add to Reading List

Source URL: www.naturalhazards.org.nz

Language: English - Date: 2013-10-13 22:36:44
946National security / Federal Information Security Management Act / Risk management framework / Security controls / Information security / Critical infrastructure protection / Vulnerability / Configuration management / SCADA / Computer security / Data security / Security

The Anatomy of an Effective Cyber Security Solution

Add to Reading List

Source URL: ftp2.bentley.com

Language: English - Date: 2011-07-13 15:20:18
947Social psychology / Sociological terms / Corporate group / Strategic management / Social vulnerability / Community / Financial crisis / Trust / Multiculturalism / Sociology / Ethics / Structure

Trust and Envy: The Political Economy of Business Groups in Developing Countries Nathaniel H. Leff ∗, Jeffry Frieden †, and Shelby Grossman‡ AugustAbstract

Add to Reading List

Source URL: shelbygrossman.com

Language: English - Date: 2013-01-08 10:00:45
948Data / Relational database management systems / Database management systems / Subroutines / SQL injection / Stored procedure / Vulnerability / Code injection / Magic quotes / Data management / Computing / SQL

VISA Europe SQL Injection Attacks Data has become the preferred currency of today’s card criminals. Their aim is to obtain sensitive personal and account data. And, with so many online retailers routinely collecting an

Add to Reading List

Source URL: www.visaeurope.com

Language: English - Date: 2015-04-29 08:10:45
949Security / Social vulnerability / Vulnerability / Risk / Ethics / Management

CALL FOR PAPERS International Geographical Union Commission on ‘Population and Vulnerability’

Add to Reading List

Source URL: www.grm.cuhk.edu.hk

Language: English - Date: 2014-09-29 04:18:45
950Emergency management / Ethics / Natural hazards / Social vulnerability / Vulnerability / Disaster / Hazard / Risk / Management / Public safety

0 Usable Science 8: Early Warning Systems: Do’s and Don’ts Report of Workshop 20−23 October 2003

Add to Reading List

Source URL: www.riskred.org

Language: English - Date: 2008-08-07 05:35:08
UPDATE