Vulnerability

Results: 14773



#Item
451Computing / Computer security / Cyberwarfare / Computer network security / Hacking / Cross-site scripting / Vulnerability / OWASP / Software quality / Application security / Software / Security

Microsoft PowerPoint - DenimGroup_IntroductionToApplicationSecurity.ppt

Add to Reading List

Source URL: denimgroup.com

Language: English - Date: 2014-01-13 18:17:57
452Computer security / Cyberwarfare / Cybercrime / Hacking / Cross-site scripting / Hypertext Transfer Protocol / SQL injection / Code injection / Cross-site request forgery / Vulnerability / Full disclosure / HTTP cookie

VoidSec Advisory 2016

Add to Reading List

Source URL: www.exploit-db.com

Language: English - Date: 2016-04-13 11:30:11
453Flora of North America / Carex magellanica subsp. irrigua / Bog sedge / Flora / Carex limosa / Botany / Plant taxonomy / Carex rufina

Species: Bog Sedge (Carex paupercula) Global Rank: G5 State Rank: S3 Climate Change Vulnerability Index: Highly Vulnerable Confidence: Very High Habitat:

Add to Reading List

Source URL: www.naturalheritage.state.pa.us

Language: English - Date: 2011-07-22 13:34:00
454Famines / Food security / Urban agriculture / Natural environment / Social vulnerability / Environmental Change Institute / Climate change / World / Earth / Climate change adaptation / Climate change and poverty

Global Environmental Change Food Security …. over-exploitation of the natural resource base

Add to Reading List

Source URL: www.gecafs.org

Language: English - Date: 2010-05-12 05:46:01
455Computer security / Security / Computing / Veracode / Software testing / Web application firewall / Application security / Vulnerability / Application firewall

Veracode Runtime Protection

Add to Reading List

Source URL: www.veracode.com

Language: English - Date: 2016-06-03 14:45:23
456Hacking / Software testing / Vulnerability / Computer security / Cyberwarfare / Risk

Security Sub-Committee (SSC) Charter Version 1.0.1, April 21, 2015 Purpose Security mistakes in any AllSeen project could be publicly perceived as reflecting poorly on the AllSeen project as a whole. That could damage b

Add to Reading List

Source URL: wiki.allseenalliance.org

Language: English - Date: 2016-04-11 14:38:57
457Risk / Demography / Sustainability / Vulnerability / Vulnerability index / Tsunami / Nature / Emergency management / South Pacific Applied Geoscience Commission

Proceedings of the twenty-eighth session, hosted by the Government of New Zealand in Nadi, Fiji Islands, 23-29 October 1999

Add to Reading List

Source URL: star.gsd.spc.int

Language: English - Date: 2016-04-11 18:59:38
458Computer security / Computing / Security / Veracode / Software testing / Application security / Vulnerability / Cloud computing

HIGHLIGHTS A state government meets compliance requirements and reduces risk in a scalable application

Add to Reading List

Source URL: www.veracode.com

Language: English - Date: 2015-06-03 10:46:07
459Transportation in California / Climate change / California / Climate change adaptation / Global warming / Regional effects of global warming / Social vulnerability / Indian Ocean Commission / Vulnerability assessment / Orange County Transportation Authority / Transportation in the United States

OCTA : Small Islands and Adapting to Climate Change Etude des risques et vulnérabilités au changement climatique dans les pays de la COI et ébauche d’un plan d’action régional d’adaptation- PARA dans le cadre d

Add to Reading List

Source URL: www.acclimate-oi.net

Language: English - Date: 2013-10-10 09:53:56
460Construction / Real estate / Genetics / Biology / Civil engineering / Structural engineering / Evolutionary biology / Robustness / Structural robustness / Social vulnerability

FINAL CONFERENCE COST ACTION TU0601 ROBUSTNESS OF STRUCTURES www.cost-tu0601.ethz.ch 30th and 31st of May 2011 Prague, Czech Republic

Add to Reading List

Source URL: www.cost-tu0601.ethz.ch

Language: English - Date: 2011-05-27 04:51:09
UPDATE