Vulnerability

Results: 14773



#Item
891

PRESENTING A NEW TITLE FROMWomen Confronting Natural Disaster: From Vulnerability to Resilience ELAINE ENARSON

Add to Reading List

Source URL: usgdra.org

Language: English - Date: 2012-04-14 15:43:19
    892Fax / Office equipment / Telecommunications equipment / Social vulnerability / Aristotle University of Thessaloniki / Science and technology / Academia / Economy

    Microsoft Word - TU0601_members_full_list.doc

    Add to Reading List

    Source URL: www.cost-tu0601.ethz.ch

    Language: English - Date: 2010-11-11 01:54:38
    893Software / Computing / Cyberwarfare / Computer network security / Computer security / Warez / Zero-day / Vulnerability database / Vulnerability / Common Vulnerabilities and Exposures / NetBSD / Solaris

    OS Diversity for Intrusion Tolerance: Myth or Reality? Miguel Garcia∗ , Alysson Bessani∗ , Ilir Gashi† , Nuno Neves∗ and Rafael Obelheiro‡ ∗ LaSIGE, University of Lisbon, Faculty of Sciences – Lisbon, Portu

    Add to Reading List

    Source URL: www.di.fc.ul.pt

    Language: English - Date: 2011-04-15 13:02:34
    894

    Vulnerability Index & Service Prioritization Decision Assistance Tool (VI-SPDAT) FAMILIES W/CHILDREN Introductory Paragraph Hello. I’m here today to talk to you about your housing and service needs. The purpose of thi

    Add to Reading List

    Source URL: www.danecountyhomeless.org

    Language: English - Date: 2015-09-25 11:08:44
      895

      Carly Speed Identification of Vulnerability 1. (b) What factors in their previous experiences are most likely to increase their vulnerability? Previous psychiatric history/treatment, previous self

      Add to Reading List

      Source URL: iapdeathsincustody.independent.gov.uk

      Language: English - Date: 2015-07-31 05:57:33
        896

        Scanning the Conservation Horizon A Guide to Climate Change Vulnerability Assessment Copyright © 2011 by National Wildlife Federation

        Add to Reading List

        Source URL: www.californiawildlifefoundation.org

        Language: English - Date: 2011-03-15 18:01:58
          897Computer security / Computer network security / Vulnerability / Software testing / Vulnerability database / National Vulnerability Database / Zero-day / CVSS / Common Vulnerabilities and Exposures / Attack / Buffer overflow / Social vulnerability

          SOFTWARE – PRACTICE AND EXPERIENCE Softw. Pract. ExperPublished online in Wiley Online Library (wileyonlinelibrary.com). DOI: spe.2180 Analysis of operating system diversity for intrusion tolerance Mig

          Add to Reading List

          Source URL: www.di.fc.ul.pt

          Language: English - Date: 2013-01-18 09:24:08
          898

          TaintScope: A Checksum-Aware Directed Fuzzing Tool for Automatic Software Vulnerability Detection Tielei Wang1,2 , Tao Wei1,2 , Guofei Gu3 , Wei Zou1,2∗ Laboratory of Network and Software Security Assurance (Peking Uni

          Add to Reading List

          Source URL: faculty.cs.tamu.edu

          Language: English - Date: 2010-03-05 09:52:30
            899

            LOUISIANA AND THE SURGING SEA A vulnerability assessment with projections for sea level rise and coastal flood risk This page intentionally blank

            Add to Reading List

            Source URL: sealevel.climatecentral.org

            Language: English - Date: 2015-08-24 10:48:14
              900

              Species assessment: Regional (BCR) 2 Measures of Vulnerability: – Population Size (PS) – Distribution (BD, ND) Global

              Add to Reading List

              Source URL: www.bsc-eoc.org

              Language: English - Date: 2004-11-30 09:28:53
                UPDATE