Results 351 to 360 of about 6,055,547 (381)
Some of the next articles are maybe not open access.
Wireless vulnerability assessment
Network Security, 2005Only a few years ago, wireless networking was still a magical art. Special wireless cards had to be bought and plugged into existing computers. Drivers had to be downloaded from vendors regularly because they were buggy and under constant development. Home use access points cost more than $300 and enterprise access points did not really exist.
openaire +2 more sources
What Is Vulnerability Assessment?
2009Vulnerability assessment is an information security community standard to promote open and publicly available security content, and to standardize the transfer of this information across security tools and services. Also, vulnerability assessment is an XML specification for exchanging technical details on how to check systems for security-related ...
openaire +2 more sources
Assessing Physical Vulnerability
2014The fact basis for both hazard mitigation and comprehensive planning has long been based on hazard exposure and physical or structural vulnerability. As discussed in chapter 4, hazard exposure is a function of the nature of the hazard agent and its potential to affect the geography of urban areas captured in risk maps.
Lori Feild Schwarz+5 more
openaire +2 more sources
Reliability and Vulnerability Assessment of Multi-Energy Systems: An Energy Hub Based Method
IEEE Transactions on Power Systems, 2021Wujing Huang+6 more
semanticscholar +1 more source
Vulnerability Assessment and Management
2020Awareness of vulnerabilities is a critical issue in cyber security. There are well-known and documented vulnerabilities that can be readily addressed, but only if one is aware of them. Vulnerabilities are an issue of what you don’t know can hurt you.
openaire +2 more sources
Vulnerability Assessment and Scenarios
2015This chapter provides an overview of the assessment of socio-economic vulnerability to floods in the context of climate change in the Salzach catchment (UDRB) as well as for the floodplains in Assam (UBRB). The assessment adapts a conceptual framework of the IPCC defining vulnerability.
Stefan Kienberger+2 more
openaire +2 more sources
Legal vulnerability of assessment tools
Medical Teacher, 2001Legal challenges relating to assessment results are increasing around the world. Until recently such challenges were not possible in the UK. With changes to the law, including the Human Rights Act, it is now possible for an Examining Body to have its assessment process challenged.
Tweed, M, Miola, J
openaire +4 more sources
Risk assessment: vulnerability
IEE Symposium on Systems Engineering in Business, 2000The author discusses the vulnerability aspects of risk by using the example of a bank. The author discusses a couple of methodologies for identifying vulnerability. (3 pages)
openaire +2 more sources
Assessing Vulnerability to Landslides in Italy
2015The present work aims at answering the following research questions: (a) to infer on the causes of vulnerability (e.g. in infrastructures) to landslides and assess the contribution of these factors to vulnerability risks in disaster management; (b) to address policy implications for planning solutions to help reducing the risk of vulnerability to ...
De Lucia, Caterina+2 more
openaire +4 more sources
A practical vulnerability assessment program
IT Professional, 2007Firewalls, malicious-code-screening servers, and intrusion-detection systems aren't sufficiently comprehensive to ensure appropriate and ongoing information confidentiality, integrity, and availability. A practical vulnerability assessment program lets organizations identify potential security exposures and correct any deficiencies.
Simon Liu, L. Holt, Bruce Cheng
openaire +2 more sources