Vulnerability

Results: 14773



#Item
921

Developing Adaptation Strategies for San Luis Obispo County: Preliminary Climate Change Vulnerability Assessment for Social Systems May 5, 2010 EXECUTIVE SUMMARY

Add to Reading List

Source URL: www.susannemoser.com

Language: English - Date: 2010-12-02 00:13:01
    922

    Ṕྐ㒔ᕷ㜵⅏ㄽᩥ㞟 Vol. 4㸦2010ᖺ7᭶㸧 ࢝ࢺ࣐ࣥࢬࡢṔྐ㒔ᕷ࡟࠾ࡅࡿᩥ໬㑇⏘ࡢ ⅏ᐖ⬤ᙅᛶ࡟㛵ࡍࡿ஦౛ⓗ◊✲ Disaster Vulnerability of Historic City of Patan, Kathmandu Valley

    Add to Reading List

    Source URL: r-cube.ritsumei.ac.jp

    Language: Japanese - Date: 2015-07-16 02:36:58
      923

      IS YOUR WEBSITE HACKABLE? Check with Acunetix Web Vulnerability Scanner Audit your Website Security with Acunetix Web Vulnerability Scanner

      Add to Reading List

      Source URL: www.adm-tools.com

      Language: English - Date: 2016-02-25 14:15:12
        924

        Vulnerability Index Service Prioritization Decision Assistance Tool (VI-SPDAT) Prescreen Triage Tool for Single Adults AMERICAN VERSION 2.0 ©2015 OrgCode Consulting Inc. and Community Solutions. All rights reserved.

        Add to Reading List

        Source URL: mayorschallengeseakc.files.wordpress.com

        Language: English - Date: 2015-06-05 11:15:17
          925

          ASV Scan Report Vulnerability Details UserVoice Inc. Scan Results Executive Summary

          Add to Reading List

          Source URL: www.uservoice.com

          Language: English - Date: 2015-08-26 12:14:43
            926Risk / Prevention / Vulnerability / Safety / Security / Actuarial science / Social vulnerability / Disaster / Hazard / Natural hazard / Psychological resilience / Vulnerability index

            Microsoft Word - CapHaz-Net_WP4_Social_Vulnerability.doc

            Add to Reading List

            Source URL: caphaz-net.org

            Language: English - Date: 2010-12-03 05:06:51
            927

            Species assessment: Regional (BCR) 2 Measures of Vulnerability: – Population Size (PS) – Distribution (BD, ND) Global

            Add to Reading List

            Source URL: www.bsc-eoc.org

            Language: English - Date: 2004-02-27 15:33:23
              928

              Bioinsecurity and Vulnerability Edited by Nancy N. Chen and Lesley A. Sharp School for Advanced Research Press Santa Fe

              Add to Reading List

              Source URL: pages.wustl.edu

              Language: English - Date: 2015-05-05 13:36:11
                929

                An Empirical Study of Vulnerability Rewards Programs Matthew Finifter, Devdatta Akhawe, and David Wagner University of California, Berkeley \{ finifter, devdatta, daw\} @cs.berkeley.edu Abstract

                Add to Reading List

                Source URL: www.cs.berkeley.edu

                Language: English - Date: 2015-01-21 19:48:40
                  930Cryptography / Stream ciphers / Advanced Encryption Standard / Differential fault analysis / Block cipher / VEST / Data Encryption Standard / Fault model / Fault injection / Side-channel attack / Common Scrambling Algorithm

                  IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, SPECIAL ISSUE, VOL. 6, NO. 1, DECEMBERA Combined Design-Time/Test-Time Study of the Vulnerability of Sub-Threshold Devices to

                  Add to Reading List

                  Source URL: euler.ecs.umass.edu

                  Language: English - Date: 2014-03-28 15:45:17
                  UPDATE