Vulnerability

Results: 14773



#Item
701Risk / Actuarial science / Security / Disaster preparedness / Risk management / Vulnerability assessment / Social vulnerability / Disaster risk reduction / Threat / Emergency management / Disaster / Hazard

Lecture Notes in Computer Science:

Add to Reading List

Source URL: www.codata-germany.org

Language: English - Date: 2014-06-10 04:46:05
702Mekong River / Mekong Delta / Mekong / River delta / Greater Mekong Subregion / Mekong River Commission / WISDOM Project

Session IV – Reducing the Mekong Delta’s Climate Change Vulnerability Through Regional Cooperation and Local Adaptations 11:45 AM Linking and Addressing the Combined Effects of Lower Mekong Main Stem Dams and Climate

Add to Reading List

Source URL: deltas.usgs.gov

Language: English - Date: 2009-07-31 15:32:42
703Secure communication / Cyberwarfare / Computer network security / E-commerce / Data security / Computer security / Data breach / Crimeware / Vulnerability / Denial-of-service attack / Supply chain attack / Database activity monitoring

2016 Data Breach Investigations Report—Executive SummaryData Breach Investigations Report

Add to Reading List

Source URL: www.verizonenterprise.com

Language: English - Date: 2016-06-13 20:00:00
704Algific talus slope / Blockfield

Climate vulnerability assessment: Bedrock Introduction: Climate change may bring higher temperatures, variable precipitation, and more frequent intense storms. This document provides a broad summary of potential impacts

Add to Reading List

Source URL: www.wicci.wisc.edu

Language: English - Date: 2016-06-21 20:47:38
705Auctions / Bidding / Commerce / Contract A / Auction theory

1 Invitation for Bids (IFB) Grenada Disaster Vulnerability Reduction Project

Add to Reading List

Source URL: www.gov.gd

Language: English - Date: 2015-09-29 15:38:17
706Risk management / Measurement / Statistical theory / Risk / Uncertainty / Social vulnerability / Reliability engineering / Monte Carlo method / Earthquake casualty estimation

Engineering Geology–26 Contents lists available at ScienceDirect Engineering Geology journal homepage: www.elsevier.com/locate/enggeo

Add to Reading List

Source URL: homepage.univie.ac.at

Language: English - Date: 2015-06-01 07:12:42
707National Register of Historic Places listings in Illinois / United States presidential election in Illinois

Social Vulnerability to Environmental Hazards, 2000 State of Illinois County Comparison Within the Nation County Comparison Within the State

Add to Reading List

Source URL: webra.cas.sc.edu

Language: English - Date: 2011-02-23 13:44:24
708Java platform / Computing platforms / Cross-platform software / Java / Hacking / Java security / Java Web Start / Sandbox / Vulnerability / Computer security / Android / Malware

Evaluating the Flexibility of the Java Sandbox Zack Coker, Michael Maass, Tianyuan Ding, Claire Le Goues, and Joshua Sunshine Carnegie Mellon University {zfc,mmaass}@cs.cmu.edu, , {clegoues,sunshine}@cs.cmu.

Add to Reading List

Source URL: www.cs.cmu.edu

Language: English - Date: 2015-11-22 13:12:13
709SAP SE / OpenTravel Alliance / Societates Europaeae / Computer security / Vulnerability / SAP Business Suite / Draft:ERP Security / SAP implementation

SAP SYSTEMS ANALYSIS Business Risk Illustration Key Trends in Business Critical Application Security Virtually every SAP application is vulnerable to financial fraud, sabotage or espionage

Add to Reading List

Source URL: www.ciosummits.com

Language: English - Date: 2016-08-04 10:44:21
710Computer security / Data security / Computer network security / Security controls / Security / Information security / Information technology controls / Information technology audit / Vulnerability / Audit / Professional certification / ISO/IEC JTC 1/SC 27

Microsoft Word - NISTRev 4 Information Security Assessment Template (v2016.1)

Add to Reading List

Source URL: examples.complianceforge.com

Language: English - Date: 2016-07-28 21:18:08
UPDATE