Vulnerability

Results: 14773



#Item
421Disaster preparedness / Emergency management / United Nations / United Nations International Strategy for Disaster Reduction / Disaster risk reduction / UN-SPIDER / Natural hazard / World Conference on Disaster Risk Reduction / Disaster / Hazard / Social vulnerability / Risk management

Microsoft Word - ENHANS_Pretoria_WS_recomm_final.doc

Add to Reading List

Source URL: www.icsu-geounions.org

Language: English - Date: 2016-02-25 05:01:08
422Conservation / Natural environment / Biology / Habitat / Systems ecology / Conservation biology / Environmental conservation / Landscape ecology / Lupinus perennis / Wildlife corridor

Species: Frosted Elfin (Callophrys irus) Global Rank: G3 State Rank: S1S2 State Wildlife Action Plan: Immediate Concern Species Climate Change Vulnerability: Not Vulnerable/Presumed Stable Confidence: Very High

Add to Reading List

Source URL: www.naturalheritage.state.pa.us

Language: English - Date: 2011-07-22 13:15:39
423Alaska / United States / United States District Court for the District of Alaska / National Register of Historic Places listings in Alaska / Juneau International Airport

Social Vulnerability to Environmental Hazards, 2000 State of Alaska County Comparison Within the Nation Social Vulnerability Index, 2000 National Quantiles

Add to Reading List

Source URL: webra.cas.sc.edu

Language: English - Date: 2011-02-23 13:43:54
424Risk / Prevention / Safety / Disaster preparedness / Emergency management / Security / Vulnerability / Humanitarian aid / Social vulnerability / Disaster risk reduction / Vulnerability index / United Nations International Strategy for Disaster Reduction

State-of-the-Art and Definitions The following section gives a brief overview of other approaches in the field, focusing on disaster risk at the global or regional level. The overview of selected current approaches also

Add to Reading List

Source URL: www.worldriskreport.org

Language: English - Date: 2015-11-13 06:34:30
425Computing / Computer security / Security Content Automation Protocol / Extensible Configuration Checklist Description Format / Schematron / Federal Information Security Management Act / XML Schema / National Institute of Standards and Technology / Open Vulnerability and Assessment Language

NIST SP 800-126A, SCAP 1.3 Component Specification Version Updates

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2016-07-18 13:17:50
426Computer security / Security / Prevention / Data security / Crime prevention / Cryptography / National security / Health Insurance Portability and Accountability Act / Information security / Vulnerability / Security management / Security controls

Security HIPAA Security Topics 1.

Add to Reading List

Source URL: www.hhs.gov

Language: English - Date: 2015-09-03 14:19:54
427Computing / Software engineering / Computer programming / Software bugs / Arbitrary code execution / Program slicing / Instruction set / Vulnerability / Buffer overflow / Symbolic execution / Operand / Assembly language

Bouncer: Securing Software by Blocking Bad Input Manuel Costa Miguel Castro Microsoft Research

Add to Reading List

Source URL: www.sosp2007.org

Language: English - Date: 2016-06-15 13:09:51
428Florida / Government of Florida / United States / Florida Legislature / AFLCIO / Florida AFLCIO / National Register of Historic Places listings in Florida

Social Vulnerability to Environmental Hazards, 2000 State of Florida County Comparison Within the Nation AL

Add to Reading List

Source URL: webra.cas.sc.edu

Language: English - Date: 2011-02-23 13:44:17
429Probability / Actuarial science / Risk / Knowledge / Financial risk / Paul Slovic / Value at risk / Uncertainty / Social vulnerability / Pest Risk Analysis / Enterprise risk management

MEDIOZNAWSTWO . KOMUNIKOLOGIA

Add to Reading List

Source URL: www.mediaispoleczenstwo.ath.bielsko.pl

Language: English - Date: 2015-11-08 08:32:08
430Computing / Cyberwarfare / Computer security / Computer network security / SQL / Hacking / Software testing / Web applications / SQL injection / Vulnerability / Web application security / Code injection

Achieving Web Security by Increasing the Web Application Safety Maryam Abedi Navid Nikmehr Mohsen Doroodchi

Add to Reading List

Source URL: worldcomp-proceedings.com

Language: English - Date: 2014-05-28 12:08:56
UPDATE