Vulnerability

Results: 14773



#Item
651Politics of Alabama / National Register of Historic Places listings in Alabama / Alabama House of Representatives / Alabama

Social Vulnerability to Environmental Hazards, 2000 State of Alabama County Comparison Within the Nation Lauderdale

Add to Reading List

Source URL: webra.cas.sc.edu

Language: English - Date: 2011-02-23 13:29:38
652Java platform / Vulnerability / Integrated development environments / Software testing / Debuggers / Eclipse / Social vulnerability / Java

Blade Tool Output Integration Framework Overview Blade Tool Output Integration Framework (TOIF) is a powerful software vulnerability detection platform. It provides a standards based environment that integrates the outpu

Add to Reading List

Source URL: www.kdmanalytics.com

Language: English - Date: 2016-07-15 10:48:24
653Hydrology / Hydraulic engineering / Bodies of water / Vulnerability / Hydrogeology / Aquifer / Groundwater / Transmissivity / Hydraulic conductivity / Water well / Social vulnerability / Vulnerability index

JOURNAL OF ENVIRONMENTAL HYDROLOGY The Electronic Journal of the International Association for Environmental Hydrology On the World Wide Web at http://www.hydroweb.com

Add to Reading List

Source URL: www.hydroweb.com

Language: English - Date: 2009-07-16 12:32:37
654Computer security / Vulnerability / Information security / Application security / Threat model / Software development / Software / Threat / Draft:ICT Security Policy System: A Case Study / Mobile security

ISSA ISSA Journal | November 2009 The Global Voice of Information Security

Add to Reading List

Source URL: www.denimgroup.com

Language: English - Date: 2014-01-13 18:22:32
655Hydrology / Environmental soil science / Soil / Irrigation / Land management / Infiltration / Hydrograph / Rill / Tree / Surface runoff / Erosion / Stemflow

Rangeland Ecol Manage 63:614–629 | November 2010 | DOI: REM-DHydrologic Vulnerability of Sagebrush Steppe Following Pinyon and Juniper Encroachment Frederick B. Pierson,1 C. Jason Williams,2 Patric

Add to Reading List

Source URL: www.sagestep.org

Language: English - Date: 2014-05-20 13:03:34
656Hydrology / Climate change / Flood / Drought / Effects of global warming on humans / Effects of global warming on Australia

Risk as the interaction of climate-related hazards with the vulnerability and exposure of human and natural systems Climate change implications for New Zealand

Add to Reading List

Source URL: www.royalsociety.org.nz

Language: English - Date: 2016-05-10 20:46:16
657United States presidential election in Minnesota / Minnesota District Courts / Kanabec County /  Minnesota

Social Vulnerability to Environmental Hazards, 2000 State of Minnesota County Comparison Within the Nation Social Vulnerability Index, 2000

Add to Reading List

Source URL: webra.cas.sc.edu

Language: English - Date: 2011-02-23 13:44:43
658Shear

Engineering Structures–2099 www.elsevier.com/locate/engstruct Seismic vulnerability, behavior and design of tunnel form building structures Can Balkaya a, Erol Kalkan b,

Add to Reading List

Source URL: erolkalkan.com

Language: English - Date: 2015-07-21 18:20:02
    659Computer network security / OWASP / Vulnerability / Application security

    Vulnerability Management in an Application Security World OWASP Austin October 27th, 2009

    Add to Reading List

    Source URL: denimgroup.com

    Language: English - Date: 2014-01-13 18:16:57
    660Software testing / Extreme programming / Continuous integration / Vulnerability / Regression testing / Code coverage / Software quality / Unit testing / Dynamic program analysis

    Early and Often: Avoiding Security Flaws with Continuous Integration with High Code Coverage Early and Often: Avoiding Security Flaws with Continuous Integration with High Code Coverage Security vulnerabilities are cau

    Add to Reading List

    Source URL: www.agitar.com

    Language: English - Date: 2011-07-20 16:45:50
    UPDATE