Vulnerability

Results: 14773



#Item
751Data security / Crime prevention / Cryptography / Information governance / National security / Regulatory compliance / Audit / Computer security / Internal audit / Business process management / Vulnerability / Security information and event management

A FORESITE WHITE PAPER THE ART AND SCIENCE OF COMPLIANCE INTRODUCTION Today, regulatory and legislative compliance obligations seem endless and ever-changing. Corporations are faced with enormous challenges

Add to Reading List

Source URL: foresite.com

Language: English - Date: 2016-02-17 15:35:27
752Computer security / Cross-platform software / Scripting languages / Computing platforms / Java platform / HDIV / JavaScript / Vulnerability / Cross-site request forgery / Java / Adobe ColdFusion / Application security

Enterprise Security API (ESAPI) Java Java User Group – San Antonio Jarret Raim June 3rd, 2010

Add to Reading List

Source URL: denimgroup.com

Language: English - Date: 2014-01-13 18:19:01
753Risk / Occupational safety and health / Natural hazards / Hazard analysis / Emergency management / Wildfire / Hazard / Social vulnerability / Disaster risk reduction / Natural disaster

Institute for Catastrophic Loss Reduction Institut de prévention des sinistres catastrophiques

Add to Reading List

Source URL: www.iclr.org

Language: English - Date: 2016-08-15 13:01:23
754Disaster preparedness / Humanitarian aid / Risk / Actuarial science / International development / Disaster risk reduction / United Nations International Strategy for Disaster Reduction / World Conference on Disaster Risk Reduction / Risk management / Emergency management / Disaster / Social vulnerability

Global Platform for Disaster Risk Reduction FIFTH SESSION #MEXICOGP2017

Add to Reading List

Source URL: www.preventionweb.net

Language: English - Date: 2016-06-28 10:21:32
755Data security / Computer security / Crime prevention / Cryptography / National security / San Jose State University / Information security / Vulnerability / Asset / Security / Security controls / IT risk

PDF Document

Add to Reading List

Source URL: its.sjsu.edu

Language: English - Date: 2015-12-07 11:36:11
756

Social Vulnerability to Environmental Hazards, 2000 FEMA Region X County Comparison Within the Nation AK WA

Add to Reading List

Source URL: webra.cas.sc.edu

- Date: 2011-02-23 14:16:56
    757Working groups / Internet Engineering Task Force / Open Vulnerability and Assessment Language / Consensus decision-making / Center for Internet Security / Mitre Corporation

    OVAL Board MeetingAttendees Blake Frantz – Center for Internet Security Adam Montville – SACM Kent Landfield – Intel Corporation Randy Taylor – ThreatGuard, Inc.

    Add to Reading List

    Source URL: oval.mitre.org

    Language: English - Date: 2015-07-09 13:27:01
    758Computer network security / Crime prevention / National security / E-commerce / Secure communication / Computer security / Vulnerability / Software

    Microsoft PowerPoint - DenimGroup_RollingOutAnEnterpriseSourceCodeReviewProgram_Content.pptx

    Add to Reading List

    Source URL: denimgroup.com

    Language: English - Date: 2014-01-13 18:18:49
    759

    Social Vulnerability to Environmental Hazards, 2000 FEMA Region V County Comparison Within the Nation MT

    Add to Reading List

    Source URL: webra.cas.sc.edu

    - Date: 2011-02-23 14:16:38
      760

      Social Vulnerability to Environmental Hazards, 2000 State of Michigan County Comparison Within the Nation "

      Add to Reading List

      Source URL: webra.cas.sc.edu

      Language: English - Date: 2011-02-23 13:31:02
        UPDATE