Vulnerability database

Results: 242



#Item
51Emergency management / Disaster / Social vulnerability / Risk / Geographic information system / International Decade for Natural Disaster Reduction / Landslide / Database / Federal Emergency Management Agency / Management / Public safety / Disaster preparedness

This discussion paper is/has been under review for the journal Natural Hazards and Earth System Sciences (NHESS). Please refer to the corresponding final paper in NHESS if available. Discussion Paper Nat. Hazards Earth

Add to Reading List

Source URL: www.nat-hazards-earth-syst-sci-discuss.net

Language: English - Date: 2015-02-24 02:56:15
52Computer network security / Software testing / Data management / SQL / SQL injection / Relational database management systems / Penetration test / Vulnerability / Web application security / Computing / Computer security / Cyberwarfare

The SQL Injection Threat Study Sponsored by DB Networks Independently conducted by Ponemon Institute LLC Publication Date: April[removed]Ponemon Institute© Research Report

Add to Reading List

Source URL: www.dbnetworks.com

Language: English - Date: 2014-04-15 01:06:32
53Schema / Database schema / Degrees of Eastern Orthodox monasticism / Information / Data / Computing / XML / Schematron / Open Vulnerability and Assessment Language

OVAL Board MinutesAttendees Jonathan Baker – MITRE Andrew Buttner – MITRE Bryan Worrell – MITRE

Add to Reading List

Source URL: oval.mitre.org

Language: English - Date: 2008-09-03 10:58:13
54Backup software / Cloud storage / Backup / Data security / Database / Remote backup service / Two-factor authentication / Virtual private network / Data center / Computing / Concurrent computing / Computer network security

Value of Cloud Security: Vulnerability Leviathan Security Group limitless innovation. no compromise. Introduction

Add to Reading List

Source URL: www.leviathansecurity.com

Language: English - Date: 2015-02-10 17:05:02
55Relational database management systems / Oracle Corporation / Computer network security / Pete Finnigan / Oracle Database / Barbara Gordon / Vulnerability / Guardium /  an IBM Company / Database security / Software / Computing / Computer security

Oracle_Security_Basics_UKOUG_2008

Add to Reading List

Source URL: www.petefinnigan.com

Language: English - Date: 2008-12-12 07:06:21
56Information technology management / Relational database management systems / Database activity monitoring / Oracle Corporation / InformationWeek / Database security / Oracle Database / Database administrator / Vulnerability / Computing / Data management / Software

Shell Employee Directory Leaked, Allegedly By Activist Wor... http://www.darkreading.com/database_security/security/client... Eight Steps To Holistic Database Security

Add to Reading List

Source URL: www.shellnews.net

Language: English - Date: 2010-02-13 10:54:23
57Security / Malware / Vulnerability / Threat / Computer insecurity / Zero-day attack / Attack / Database security / Cloud computing / Computer network security / Cyberwarfare / Computer security

TOP 10 where Security-OBLIGATED Executives should focus Introduction

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-01-21 02:20:33
58Software testing / Computing / Database security / Database / Vulnerability / Information security management system / Systems engineering process / Information security / Certified Information Technology Professional / Data security / Computer security / Security

Building a Database Security Program Despite being our most important repositories for our most sensitive - and critical - data, the ongoing, multi-year spate of data breaches shows most organizations still struggle to e

Add to Reading List

Source URL: securosis.com

Language: English - Date: 2011-12-01 09:44:11
59World Database on Protected Areas / IPCC Third Assessment Report / Environment / Science / Geography / Adaptation to global warming / United Nations Environment Programme / United Nations Development Group / World Conservation Monitoring Centre

PROJECT COMPONENTS Component 1: Vulnerability assessment and risk reduction strategies for existing protected area systems The extent to which the PAs in the West African region have been affected or could be affected by

Add to Reading List

Source URL: ec2-54-80-210-23.compute-1.amazonaws.com

Language: English - Date: 2014-01-10 05:57:49
60Cyberwarfare / Security / Penetration test / Password / Vulnerability / Prepared statement / Web application security scanner / Database testing / Software testing / Computer security / Computer network security

Date: [removed]Case Study: PENETRATION TESTING AUDIT Preface: Penetration testing AKA pen-testing is a process where a tester looks for exploitable vulnerabilities from within an IT infrastructure that may allow the t

Add to Reading List

Source URL: 2secure.biz

Language: English - Date: 2015-01-01 11:45:50
UPDATE