Vulnerability

Results: 14773



#Item
901

MISSISSIPPI AND THE SURGING SEA A vulnerability assessment with projections for sea level rise and coastal flood risk This page intentionally blank

Add to Reading List

Source URL: sealevel.climatecentral.org

Language: English - Date: 2015-08-24 10:47:07
    902Computer security / Security / Computer network security / Computing / Software testing / Codenomicon / Coriant / Vulnerability management

    Creating Trust with Coriant Power suppliers, critical infrastructure providers, and network builders all operate in an unsafe world, where cyber attacks and network malfunctions can disrupt services. Coriant’s customer

    Add to Reading List

    Source URL: www.codenomicon.com

    Language: English - Date: 2016-03-02 04:58:14
    903Adaptation to global warming / Climate change / Global warming / Social vulnerability / Risk / Evaluation / IPCC Third Assessment Report / Psychological resilience / Intergovernmental Panel on Climate Change / Climate change and poverty

    The ART Approach ADAPTING TO RISING TIDES PROGRAM WHITE PAPER Overview The ART approach is a road-tested, outcome-oriented adaptation planning process. The ART process was

    Add to Reading List

    Source URL: www.adaptingtorisingtides.org

    Language: English - Date: 2015-09-11 17:37:02
    904

    Toward a Vibrant, Prosperous and Sustainable Fresno County: Vulnerability and Adaptation in the Midst of Rapid Change Technical Report November 7, 2010

    Add to Reading List

    Source URL: www.susannemoser.com

    Language: English - Date: 2010-12-02 00:16:38
      905

      ICS Technology VEST - Vulnerability & Exploit Shield Trinity Description Features

      Add to Reading List

      Source URL: icsd.i2r.a-star.edu.sg

      Language: English - Date: 2015-09-30 21:11:42
        906Computer memory / Computing / Software bugs / Software engineering / Cyberwarfare / Buffer overflow / Program analysis / Control flow graph / Data buffer / Data-flow analysis / Vulnerability

        Transformation-aware Exploit Generation using a HICFG Dan Caselden Alex Bazhanyuk Mathias Payer Laszlo Szekeres

        Add to Reading List

        Source URL: www.eecs.berkeley.edu

        Language: English - Date: 2013-05-16 23:27:09
        907

        Using Concolic Testing to Refine Vulnerability Profiles in F UZZBUSTER David J. Musliner, Jeffrey M. Rye, Tom Marble Smart Information Flow Technologies (SIFT) Minneapolis, MN, USA Email: {dmusliner, jrye, tmarble}@sift.

        Add to Reading List

        Source URL: musliner.com

        Language: English - Date: 2013-05-01 13:55:59
          908

          A Vulnerability and Risk Assessment of SEPTA’s Regional Rail A Transit Climate Change Adaptation Assessment Pilot AUGUST 2013 FTA Report No. 0071

          Add to Reading List

          Source URL: www.septa.org

          Language: English - Date: 2015-10-02 10:31:17
            909Safety / Risk / Prevention / Probability / Disaster preparedness / Actuarial science / Humanitarian aid / Risk management / United Nations International Strategy for Disaster Reduction / Disaster risk reduction / Emergency management / Social vulnerability

            Project number: Project name:

            Add to Reading List

            Source URL: matrix.gpi.kit.edu

            Language: English - Date: 2014-02-10 08:17:58
            910Computer security / Cyberwarfare / Security / Computer network security / Cybercrime / Hacking / FireEye / Advanced persistent threat / Vulnerability / Phishing / Zero-day

            FIREEYE AS A SERVICE IN ACTION: A Global, Coordinated Effort

            Add to Reading List

            Source URL: www.fireeye.de

            Language: English - Date: 2016-02-10 18:53:46
            UPDATE