Vulnerability

Results: 14773



#Item
771Vulnerability / Risk / Customer experience management / Hacking / Software testing / Social vulnerability / Customer experience

DESKTOP REVIEW OF VULNERABLE CUSTOMERS November 2014 The Lending Standards Board Limited, Company Limited by Guarantee, Registered in England & Wales, NoRegistered Office: 21 Holborn Viaduct, London EC1A 2DY

Add to Reading List

Source URL: www.lendingstandardsboard.org.uk

Language: English
772Louisiana State Legislature / Louisiana House of Representatives / National Register of Historic Places listings in Louisiana / West Feliciana Parish /  Louisiana / Avoyelles Parish /  Louisiana

Social Vulnerability to Environmental Hazards, 2000 State of Louisiana County Comparison Within the Nation "

Add to Reading List

Source URL: webra.cas.sc.edu

Language: English - Date: 2011-02-23 13:44:34
773Risk / Social vulnerability / Vulnerability / Oceanography / Fisheries science / Climate change

Microsoft Word - Generic Purple Back Cover.doc

Add to Reading List

Source URL: www.marlin.ac.uk

Language: English - Date: 2016-04-22 09:56:27
774

Denver Vulnerability Index Results Volunteers From... • • •

Add to Reading List

Source URL: denversroadhome.org

Language: English - Date: 2015-06-23 17:03:17
    775Climatology / Risk / Physical geography / Climate change / Vulnerability / Effects of global warming / Climate history / Social vulnerability / Vulnerability index / Intergovernmental Panel on Climate Change / Centro de Previso do Tempo e Estudos Climticos / Climate risk

    Foreign & Commonwealth Office Global Opportunities Fund – Climate Change and Energy Programme

    Add to Reading List

    Source URL: mudancasclimaticas.cptec.inpe.br

    Language: English - Date: 2009-04-02 15:44:25
    776

    CUPRINS A NOTE ON DIFFERENTIAL SUBORDINATIONS USING SÃLÃGEAN AND RUSCHEWEYH OPERATORS, Alina Alb Lupaº ……………………………………………………………….... RECENT SOFTWARE VULNERABILITY MODELS,

    Add to Reading List

    Source URL: www.romai.ro

    Language: English - Date: 2009-11-23 06:10:20
      777Computer security / Computing / Cyberwarfare / Hacking / Computer network security / Veracode / Application security / Cross-site scripting / Vulnerability / Cross-site request forgery / JavaScript / Web application security

      WHAT IS APPLICATION SECURITY? Every enterprise’s application landscape is now both business critical and rapidly expanding. “On our current

      Add to Reading List

      Source URL: www.veracode.com

      Language: English - Date: 2016-01-20 16:34:29
      778Security / Computing / Prevention / Computer security / Crime prevention / Cryptography / Information governance / National security / Vulnerability / Application security / Software development process / Software development

      The Days Before Zero Day: Investment Models for Secure Software Engineering Chad Heitzenrater∗‡ Rainer B¨ohme†

      Add to Reading List

      Source URL: weis2016.econinfosec.org

      Language: English - Date: 2016-05-18 13:31:12
      779Disaster preparedness / Risk / Disaster / Social vulnerability / Emergency management / Sociology of disaster / Security / Safety

      Microsoft Word - SOC463SyllabusFA09.doc

      Add to Reading List

      Source URL: central.colostate.edu

      Language: English - Date: 2013-10-15 17:10:50
      780Security / Prevention / Computing / Crime prevention / Cryptography / Information governance / National security / Information security / Computer security / Usability / Vulnerability / Paul Dourish

      International Journal of Human Computer Studies Special Issue on HCI Research in Privacy and Security, 63(1-2), In the Eye of the Beholder: A Visualization-based Approach to Information System Security Rogér

      Add to Reading List

      Source URL: www.dourish.com

      Language: English - Date: 2008-06-14 12:49:25
      UPDATE