Results 301 to 310 of about 5,815,285 (328)
Some of the next articles are maybe not open access.

Vulnerabilities assessment — Part 1. Vulnerability basics

Network Security, 1999
Part 1 of this two-part series will define vulnerabilities, explain how to determine their importance, list the general types of vulnerabilities and explain how to properly treat them. Concentrating on Internet-related vulnerabilities, Part 2 will detail how to find the vulnerabilities that are typically most important, explain how to treat them and ...
openaire   +1 more source

Vulnerability Assessment

2015
Susmita Dasgupta   +5 more
  +4 more sources

Desertification Vulnerability Assessment

Desertification and Land Degradation, 2022
Ajai, Rimjhim Bhatnagar
semanticscholar   +1 more source

Vulnerability Assessment

2018
Morey J. Haber, Brad Hibbert
openaire   +2 more sources

Assessing Vulnerabilities

Information Systems Security, 2000
openaire   +1 more source

Vulnerability Assessment

2017
Dania Abdul Malak   +3 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy