Vulnerability database

Results: 242



#Item
111Crime prevention / National security / Cyberwarfare / Information security / Asset / Vulnerability / Federal Information Security Management Act / Database security / Security / Computer security / Data security

PDF Document

Add to Reading List

Source URL: www.cio.ca.gov

Language: English - Date: 2013-06-28 15:17:47
112Computer network security / Data security / Software testing / Vulnerability / Information security / Database security / Security testing / Security risk / Security controls / Computer security / Security / Cyberwarfare

Department of Health and Human Services OFFICE OF INSPECTOR GENERAL HEALTH INSURANCE MARKETPLACES GENERALLY PROTECTED PERSONALLY

Add to Reading List

Source URL: oig.hhs.gov

Language: English - Date: 2014-09-19 13:06:15
113Risk / Global warming / Effects of global warming / Adaptation to global warming / Climate risk / IPCC Third Assessment Report / Social vulnerability / Vulnerability / Economics of global warming / Climate change / Environment / Intergovernmental Panel on Climate Change

Methodological framework, analytical tool and ­database for the assessment of climate change impacts, adaptation and vulnerability in Denmark Report[removed]DTU Management Engineering

Add to Reading List

Source URL: en.klimatilpasning.dk

Language: English - Date: 2013-04-08 06:20:27
114Relational database management systems / Computer network security / Database management systems / Hacking / Software testing / SQL injection / Cross-site scripting / Vulnerability / Code injection / Computing / Cyberwarfare / Computer security

How to Secure Your Website 5th Edition Approaches to Improve Web Application and Website Security

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2014-11-27 01:57:42
115Risk / Climate change / Effects of global warming / Adaptation to global warming / Global warming / Social vulnerability / Current sea level rise / Vulnerability / Geographic information system / Oceanography / Environment / Earth

Tools for Climate Change Adaptation Planning Tool Name Adaptation Database for

Add to Reading List

Source URL: training.fws.gov

Language: English - Date: 2013-10-30 14:15:58
116Cyberwarfare / Information technology audit / Information security / National security / Vulnerability / Audit / IT risk / Database security / Computer security / Security / Data security

NISD-K304-111 Management Standards for Information Security Measures for the Central Government Computer Systems

Add to Reading List

Source URL: www.nisc.go.jp

Language: English - Date: 2013-01-31 20:44:38
117HTML / HTML element / Database / Computing / Markup languages / Technical communication

The  Common  Vulnerability  Reporting  Framework   Dictionary  of  Elements   Last Update: [removed]07T10:26:00-08:00 Mike Schiffman, Cisco Systems, Inc., [removed]  

Add to Reading List

Source URL: www.icasi.org

Language: English - Date: 2012-05-11 15:31:22
118Computer security / Transaction processing / Information technology audit / Vulnerability / Database / Information security audit / Information security / Database management systems / Information technology management / Computing

Part One - Information Technology Planning Questionnaire (ITPQ) Attachment 1

Add to Reading List

Source URL: www.in.gov

Language: English - Date: 2014-11-24 10:12:03
119SQL keywords / Software testing / SQL / SQL injection / Relational database management systems / Penetration test / Vulnerability / Null / Select / Data management / Computing / Computer security

Practical Identification of SQL Injection Vulnerabilities

Add to Reading List

Source URL: www.us-cert.gov

Language: English - Date: 2013-04-15 13:11:51
120Computing / Information security / Security controls / Vulnerability / Password / IT risk management / Database security / Security / Computer security / Data security

DOC Document

Add to Reading List

Source URL: www.cio.ca.gov

Language: English - Date: 2013-06-28 15:17:37
UPDATE