Search Results - "vulnerability"
Suggested Topics within your search.
Suggested Topics within your search.
- Computational Intelligence 16
- Computational intelligence 16
- Data and Information Security 14
- Data protection 14
- General 13
- Social Science 12
- Artificial Intelligence 11
- Artificial intelligence 11
- Sociology 11
- Communications Engineering, Networks 9
- Education 9
- Electronic Circuits and Systems 9
- Electronic circuits 9
- Telecommunication 9
- Signal processing 8
- Signal, Speech and Image Processing 8
- Buildings 6
- Human Geography 6
- Human geography 6
- Research 6
- Security Science and Technology 6
- Security systems 6
- Social aspects 6
- Electronics 5
- Electronics and Microelectronics, Instrumentation 5
- Mechanics, Applied 5
- Sociology, Urban 5
- Urban Sociology 5
- Building Construction and Design 4
- Climate Sciences 4
-
1
-
2
-
3
Vulnerability in a mobile world /
Published 2019Subjects: “…Vulnerability (Personality trait)…”
Full-text access
View in OPAC
e-Book -
4
-
5
Forensic psychologists : prisons, power, and vulnerability /
Published 2020Table of Contents: “…. -- Chapter 9: The Paradox of Being Vulnerable Adjuncts.…”
Full-text access
View in OPAC
e-Book -
6
Critical Infrastructures: Risk and Vulnerability Assessment in Transportation of Dangerous Goods Transportation by Road and Rail /
Published 2016Table of Contents: “…From the Contents: Introduction -- Risk Assessment in Hazardous Material Transportation -- Risk Assessment -- Quantitative Probability Assessment of LOC Accident -- Vulnerability Assessment in Hazardous Materials Transportation -- The Vulnerability Issue.…”
Full-text access
View in OPAC
e-Book -
7
-
8
Trusted Digital Circuits Hardware Trojan Vulnerabilities, Prevention and Detection /
Published 2018Table of Contents: “…The Global Integrated Circuit Supply Chain Flow and the Hardware Trojan Attack -- Circuit Vulnerabilities to Hardware Trojans at the Register Transfer Level -- Design Techniques for Hardware Trojans Prevention and Detection at the Register Transfer Level -- Circuit Vulnerabilities to Hardware Trojans at the Gate Level -- Design Techniques for Hardware Trojans Prevention and Detection at the Gate Level -- Circuit Vulnerabilities to Hardware Trojan at the Layout Level -- Design Techniques for Hardware Trojans Prevention and Detection at the Layout Level -- Trusted Testing Techniques for Hardware Trojan Detection -- Hardware Trojans in Analog and Mixed-Signal Integrated Circuits.…”
Full-text access
View in OPAC
e-Book -
9
Critical Infrastructures, Key Resources, Key Assets Risk, Vulnerability, Resilience, Fragility, and Perception Governance /
Published 2018Table of Contents: “…Critical Infrastructures, Key Resources, Key Assets -- Chapter 2. Governance Vulnerability Facets -- Chapter 3. A Physical Analogy for Resilience and Vulnerability -- Chapter 4. …”
Full-text access
View in OPAC
e-Book -
10
Microbiologically Influenced Corrosion An Engineering Insight /
Published 2017Table of Contents: “…-- Examples of Some Systems Vulnerable to MIC -- Examples of Some Materials Vulnerable to MIC -- How Is MIC Treated?.…”
Full-text access
View in OPAC
e-Book -
11
Inclusive principles and practices in literacy education /
Published 2017Table of Contents: “…Prelims -- Literacy, inclusion and access to the curriculum: international insights -- Improving student literacy with vulnerable cohorts -- Index.…”
Full-text access
View in OPAC
e-Book -
12
Security Challenges and Approaches in Internet of Things
Published 2017Table of Contents: “…Introduction -- Motivation -- System Model for the Internet of Things -- Vulnerable Features and Threats -- Securing the Internet of Things -- Security Approaches in Internet of Things -- Conclusion.…”
Full-text access
View in OPAC
e-Book -
13
Urban areas and global climate change
Published 2012Table of Contents: “…Cities in the flood : vulnerability and disaster risk management : evidence from Ibadan, Nigeria / Andrew Onwuemele -- ch. 12. …”
Full-text access
View in OPAC
e-Book -
14
Ubiquitous Computing and Computing Security of IoT
Published 2019Table of Contents: “…Security Protocols for IoT -- Security in Ubiquitous Computing Environment: Vulnerabilities, Attacks and Defences -- Security of Big Data in Internet of Things -- Trust Management Approaches in Mobile Adhoc Networks -- IoT for Ubiquitous Learning Applications: Current Trends and Future.…”
Full-text access
View in OPAC
e-Book -
15
Feminism : perspectives, stereotypes/misperceptions and social implications /
Published 2014Table of Contents: “…Roberts -- ch. 4 Black Women and Their Situation of Discrimination and Vulnerability in Brazil / Sonia Beatriz dos Santos -- ch. 5 Examining the Impact of Migration on the Reconfiguration of Family Dynamics: The Experiences of Haitian Immigrant Women in Canada / Louise Racine -- ch. 6 Feminism and Difference: A Pathway to Women's Reconstruction / Maria J. …”
Full-text access
View in OPAC
e-Book -
16
Global Adaptation and Resilience to Climate Change
Published 2019Table of Contents: “…Chapter 1 Introduction to climate change vulnerability, adaptation, and resiliency -- Chapter 2 Africa -- Chapter 3 Antarctica -- Chapter 4 Asia -- Chapter 5 Australia -- Chapter 6 Europe -- Chapter 7 North America -- Chapter 8 South America -- Chapter 9 The world adapting to climate change.…”
Full-text access
View in OPAC
e-Book -
17
Practical Information Security A Competency-Based Education Course /
Published 2018Table of Contents: “…Introduction -- Information Systems Security -- Malicious Attacks, Threats, and Vulnerabilities -- Access Controls -- Security Operations and Administration -- Auditing, Testing, and Monitoring -- Risk, Response, and Recovery -- Cryptography -- Networks and Telecommunications Security -- Source Code Security -- Information Security Standards -- Information Systems Security Education and Training -- U.S. …”
Full-text access
View in OPAC
e-Book -
18
Disaster Risk Reduction Community Resilience and Responses /
Published 2019Table of Contents: “…<women and="" the="" gaps="" in="" framework="" of="" disaster="" risk="" reduction -- mapping="" vulnerable="" earthquake="" class="" i="" cities="" for="" reduction="" community="" resilience="" india -- law="" can="" set="" a="" stage="" reduction:="" study="" on="" nepal -- socio="" -="" economic="" impact="" coastal="" hazards="" fisher-folk="" livelihoods="" kerala -- sustainability="" managed="" projects -- post-disaster="" vulnerability="" female-headed="" households -- child="" centred="" (cc="" drr).…”
Full-text access
View in OPAC
e-Book -
19
AI in Cybersecurity
Published 2019Table of Contents: “…OWL Ontologies in Cybersecurity: Conceptual Modeling of Cyber-Knowledge -- Knowledge Representation of Network Semantics for Reasoning-Powered Cyber-Situational Awareness -- The Security of Machine Learning Systems -- Patch Before Exploited: An Approach to Identify Targeted Software Vulnerabilities -- Applying Artificial Intelligence Methods to Network Attack Detection -- Machine Learning Algorithms for Network Intrusion Detection -- Android Application Analysis using Machine Learning Techniques.…”
Full-text access
View in OPAC
e-Book -
20
Innovation for sustainability : small farmers facing new challenges in the evolving food systems /
Published 2020Table of Contents: “…Unpacking food systems / Gianluca Brunori, Tessa Avermaete, Fabio Bartolini, Natalia Brzezina, Terry Marsden, Erik Mathijs, Ana Moragues-Faus, Roberta Sonnino -- Chapter 4. The vulnerability of food systems / Gianluca Brunori, Tessa Avermaete, Fabio Bartolini, Natalia Brzezina, Terry Marsden, Erik Mathijs, Ana Moragues-Faus, Roberta Sonnino -- Chapter 5. …”
Full-text access
View in OPAC
e-Book