Vulnerability

Results: 14773



#Item
691Crime prevention / Cryptography / Information governance / National security / Computer network security / Computer security / Vulnerability / Privacy / Internet privacy / Confidentiality

IT Code of Ethics I will strive to know myself and be honest about my capability.  I will strive for technical excellence in the IT profession by maintaining and enhancing my own knowledge and skills. I acknowledge th

Add to Reading List

Source URL: trustednetworking.com

Language: English - Date: 2012-02-09 17:25:52
692Livelihood / Social vulnerability / Disaster / Akshara Network

G U I D A N C E N O T E O N

Add to Reading List

Source URL: www.recoveryplatform.org

Language: English - Date: 2016-04-13 00:39:29
693National security / Security / Crime prevention / Computer network security / Civil defense / Threat / Emergency management / Resilience / Vulnerability / Computer security / Physical security / Violence

Microsoft Word - Houses of Worship Security Practices Guide

Add to Reading List

Source URL: fedweb-assets.s3.amazonaws.com

Language: English - Date: 2014-11-20 14:26:45
694Computer network security / Software testing / Computer security / Hacking / OWASP / Penetration test / Vulnerability / Web application security / HP Application Security Center

Statement of Information Security Assessment May 2016 CosmoLex Cloud LLC 201 No. Center Drive North Brunswick NJ 08902

Add to Reading List

Source URL: www.cosmolex.com

Language: English - Date: 2016-06-02 13:51:42
695Computability theory / Vulnerability / Public-key cryptography / Theoretical computer science / Models of computation / Buffer overflow / Social vulnerability / Zero-day / Ring signature / Symbolic execution / Turing machine / Halting problem

Towards Automatic Generation of Vulnerability-Based Signatures David Brumley, James Newsome, and Dawn Song Carnegie Mellon University Pittsburgh, PA, USA {dbrumley,jnewsome,dawnsong}@cmu.edu

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2014-05-29 15:38:01
696Disaster preparedness / Humanitarian aid / Risk / Emergency management / Disaster / Social vulnerability / Natural hazard / Hazard / Coastal hazards / Pretoria / Natural disaster / Rare events

Monday 17 January:00-09:00 Workshop registration 09:00-10:30

Add to Reading List

Source URL: www.icsu-geounions.org

Language: English - Date: 2016-02-25 05:01:08
697Hydrology / Water management / Water pollution / Water / Aquatic ecology / Social vulnerability / Hydrological transport model

This article was downloaded by: [Portland State University] On: 28 January 2014, At: 20:54 Publisher: Taylor & Francis Informa Ltd Registered in England and Wales Registered Number: Registered office: Mortimer Ho

Add to Reading List

Source URL: aquaticecologylab.weebly.com

Language: English - Date: 2014-10-28 23:26:51
698

Social Vulnerability to Environmental Hazards, 2000 State of Utah County Comparison Within the Nation "

Add to Reading List

Source URL: webra.cas.sc.edu

- Date: 2011-02-23 13:33:43
    699Disaster preparedness / Humanitarian aid / Emergency management / Natural disasters / Risk / World Conference on Disaster Risk Reduction / Sendai Framework for Disaster Risk Reduction / United Nations International Strategy for Disaster Reduction / Disaster risk reduction / Social vulnerability / Risk management / Disaster

    Microsoft Word - N1516716

    Add to Reading List

    Source URL: www.un.org

    Language: English - Date: 2015-12-17 12:34:40
    700National Weather Service / Storm / Montana / Storm Data / Social vulnerability / Demography

    Microsoft Word - AMS conference paper.doc

    Add to Reading List

    Source URL: ams.confex.com

    Language: English - Date: 2006-11-08 17:05:49
    UPDATE