×
Log in
Upload File
Most Popular
Study
Business
Design
Technology
Travel
Explore all categories
The top documents tagged [vulnerability types]
Cyber Terrorism
367 views
CWE cwe.mitre.org The Common Weakness Enumeration (CWE) Initiative Part of the DHS/DoD Software Assurance Initiatives Tools and Technologies Effort [currently
213 views
Security Vulnerabilities in Modern Operating Systems
1.310 views
G. Gritsai, A. Timorin, Y. Goltsev, R. Ilin, S. Gordeychik, and A. Karpin, “SCADA safety in numbers v1.1,” Positive Technologies Security Report [Online], Boston, MA, 2012
72 views
Presented by SSA Robert Flaim FEDERAL BUREAU OF INVESTIGATION Cyber Division FBIHQ Cyber Attacks: The Next Frontier
214 views
Safeguarding & Protecting Vulnerable Adults
109 views
Safeguarding & Protecting Vulnerable Adults. Jenab (Zen) Yousuf Associate Head of Safeguarding/Named Professional Vulnerable Adults
216 views
Assessing Impacts of HIV/AIDS on the education sector MTT Winter School, Durban, August 2004 Dr Anthony Kinghorn
214 views
Narcissistic Omnipotence and Uniqueness: Promising Measures of the Narcissism Phenotype
43 views
1 CVE Behind the Scenes: The Complexity of Being Simple Steve Christey The MITRE Corporation July 11, 2001 © 2001 The MITRE Corporation
216 views
Submitted by: Abhashree Pradhan 0501227096 8CA (1)
216 views