Vulnerability

Results: 14773



#Item
471Computer security / Computing / Security / Data security / Cyberwarfare / Computer network security / ISO/IEC 27002 / Vulnerability / Information security management system / Security controls / Information security / ISO/IEC 27001:2013

WRITTEN INFORMATION   SECURITY PROGRAM (WISP) ACME Consulting Services, Inc.    Copyright © 2016 

Add to Reading List

Source URL: examples.complianceforge.com

Language: English - Date: 2016-07-28 21:17:59
472Climate change / Effects of global warming / Climatology / Vulnerability / Atmospheric sciences / Oceanography / Sea level / Sea level rise / Natural environment / National Oceanic and Atmospheric Administration / Social vulnerability

    Surging Seas Risk Finder  ​ http://sealevel.climatecentral.org/maps/risk­finder     

Add to Reading List

Source URL: sealevel.climatecentral.org

Language: English - Date: 2016-02-04 14:11:38
473Computer security / Security / Cyberwarfare / Prevention / Vulnerability / Reliability engineering / Operations security / Systems engineering / Threat / Information assurance / Counterintelligence / Attack

System Security Engineering and Program Protection Integration into SE

Add to Reading List

Source URL: www.acq.osd.mil

Language: English - Date: 2014-11-06 08:35:31
474Computer security / Cyberwarfare / Computing / Computer network security / Web applications / Software testing / Hacking / Vulnerability / Application security / Web application security / Software quality / Foundstone

Microsoft PowerPoint - DenimGroup_IntroductionToApplicationSecurity

Add to Reading List

Source URL: denimgroup.com

Language: English - Date: 2014-01-13 18:27:01
475Livelihood / Social vulnerability / Poverty reduction / Poverty / Sustainability / International development / Natural environment / International relations / Applied ethics / Akshara Network / Asset-based welfare

The Sustainable Livelihoods Framework: An Overview

Add to Reading List

Source URL: www.torontoenterprisefund.ca

Language: English - Date: 2013-04-13 22:41:15
476Data management / Information technology / Computing / Information / Data management plan / Data / Data sharing / Open data

Data Policy Arctic Boreal Vulnerability Experiment DRAFT May 12, 2016 The Arctic Boreal Vulnerability Experiment (ABoVE) is a NASA Terrestrial Ecology Program field campaign conducted in Alaska and Western Canada. ABoVE

Add to Reading List

Source URL: above.nasa.gov

Language: English - Date: 2016-06-08 14:47:18
477Lightning / Lightning strike / Safety / Vulnerability / Computer security / Cyberwarfare / Electrical safety / Risk

Introduction Letter TO WHOM IT MAY CONCERN The purpose of this letter is to introduce to you our company the National Lightning Safety Institute (NLSI). Our focus is Risk Management of the lightning hazard.

Add to Reading List

Source URL: lightningsafety.com

Language: English - Date: 2014-12-02 20:52:43
478Security / Computer security / Crime prevention / Cryptography / Information governance / National security / Cybercrime / Vulnerability / Operating system / Computing / Authorization

MONTANA BOARD OF REGENTS OF HIGHER EDUCATION Policy and Procedures Manual SUBJECT: INFORMATION TECHNOLOGY Policy – User Responsibilities – Students Adopted: May 24, 2002 _______________________________________

Add to Reading List

Source URL: mus.edu

Language: English - Date: 2015-08-31 15:55:46
479Risk / Prevention / Social vulnerability / Vulnerability / Safety / Vulnerability assessment / Disaster risk reduction

INQUIMUS Workshops Integrating quantitative and qualitative assessment

Add to Reading List

Source URL: inquimus.sbg.ac.at

Language: English - Date: 2016-04-13 09:51:57
480

POLITIQUE DE PUBLICATION D’UNE VULNERABILITE VULNERABILITY DISCLOSURE POLICY 1.0 Thursday 2 JunePour tous renseignements:

Add to Reading List

Source URL: www.cert-devoteam.com

Language: French - Date: 2016-06-02 11:04:44
    UPDATE