Vulnerability database

Results: 242



#Item
171Public safety / Crime prevention / National security / Intrusion detection system / Information security / IT risk / Vulnerability / Physical security / Database security / Security / Data security / Computer security

STANDARD ADMINISTRATIVE PROCEDURE[removed]M1.11 Information Resources – Intrusion Detection Approved July 18, 2005 Revised April 27, 2010

Add to Reading List

Source URL: rules-saps.tamu.edu

Language: English - Date: 2013-08-29 19:16:15
172Relational database management systems / Database management systems / Cross-platform software / Database / Database theory / Oracle Corporation / SQL / IBM Lotus Domino / Data management / Computing / Software

Questions and Answers RFP[removed]: Amendment 1 Database Vulnerability Scanner June 6, 2014

Add to Reading List

Source URL: www.dshs.wa.gov

Language: English - Date: 2014-06-06 14:41:18
173Computer security / Software / Companies listed on the New York Stock Exchange / Database security / Database activity monitoring / Database / Vulnerability / Guardium /  an IBM Company / Host Based Security System / Computing / Database management systems / McAfee

Business Brief Secure Your Databases for Sustainable SOX Compliance Key Advantages

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-01-10 01:04:09
174Cyberwarfare / Information technology audit / Crime prevention / National security / Information security / Security controls / Database security / Vulnerability / Information technology controls / Security / Computer security / Data security

AUGUST[removed]REPORT NO[removed]AUDITOR GENERAL WILLIAM O. MONROE, CPA

Add to Reading List

Source URL: www.myflorida.com

Language: English - Date: 2005-09-02 09:07:58
175Public safety / Information security / IT risk / Vulnerability / Risk management / Security controls / Database security / IT risk management / Computer security / Security / Data security

STANDARD ADMINISTRATIVE PROCEDURE[removed]M1.18 Information Resources – Security Monitoring Approved July 18, 2005 Revised April 27, 2010

Add to Reading List

Source URL: rules-saps.tamu.edu

Language: English - Date: 2013-08-29 19:16:15
176Software / Companies listed on the New York Stock Exchange / Database activity monitoring / Database security / Health Insurance Portability and Accountability Act / Vulnerability / Database / Guardium /  an IBM Company / Host Based Security System / Computer security / Computing / McAfee

Business Brief HIPAA/HITECH Compliance for Databases Comply fully and reduce database security risk SC Magazine 2012 Best Database

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-01-10 01:03:44
177Emergency management / Humanitarian aid / Risk / Actuarial science / Disaster risk reduction / International Decade for Natural Disaster Reduction / Social vulnerability / Database / Disaster / Management / Public safety / Disaster preparedness

Conceptual model: 3 application areas Recording Disaster Losses Recommendations for a European approach

Add to Reading List

Source URL: publications.jrc.ec.europa.eu

Language: English - Date: 2013-09-13 21:16:18
178Computer security / Computer jargon / National Vulnerability Database / Vulnerability / SQL injection / Error / Software bug / Crash / Database / Computing / Computer errors / Cyberwarfare

The Process of Analyzing Failure Reports to Determine the Number of Variables Interacting in a Software Failure

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-09-03 21:04:32
179Renewable energy / Technology / Environment / United States / Bureau of Ocean Energy Management / Low-carbon economy / Outer Continental Shelf

The Relative Vulnerability of Migratory Bird Species to Offshore Wind Energy Projects on the Atlantic Outer Continental Shelf: An Assessment Method and Database

Add to Reading List

Source URL: www.data.boem.gov

Language: English - Date: 2013-11-08 12:47:57
180Information technology management / Computer network security / Information Risk Management / Information security / Security controls / Database security / Vulnerability / IT risk / Information technology audit / Security / Computer security / Data security

2013 State of Information Security in the Commonwealth of Virginia for the period July 1, 2012 thorugh June 30, 2013

Add to Reading List

Source URL: www.apa.virginia.gov

Language: English - Date: 2013-10-09 11:19:36
UPDATE