Search Results - "vulnerability"

Refine Results
  1. 1
  2. 2

    Social vulnerability to disasters /

    Published 2013
    View in OPAC
    Book
  3. 3

    Vulnerability in a mobile world /

    Published 2019
    Subjects: “…Vulnerability (Personality trait)…”
    Full-text access
    View in OPAC
    e-Book
  4. 4
  5. 5

    Forensic psychologists : prisons, power, and vulnerability / by Warr, Jason

    Published 2020
    Table of Contents: “…. -- Chapter 9: The Paradox of Being Vulnerable Adjuncts.…”
    Full-text access
    View in OPAC
    e-Book
  6. 6

    Critical Infrastructures: Risk and Vulnerability Assessment in Transportation of Dangerous Goods Transportation by Road and Rail / by Vamanu, Bogdan I., Gheorghe, Adrian V., Katina, Polinpapilinho F.

    Published 2016
    Table of Contents: “…From the Contents: Introduction -- Risk Assessment in Hazardous Material Transportation -- Risk Assessment -- Quantitative Probability Assessment of LOC Accident -- Vulnerability Assessment in Hazardous Materials Transportation -- The Vulnerability Issue.…”
    Full-text access
    View in OPAC
    e-Book
  7. 7
  8. 8

    Trusted Digital Circuits Hardware Trojan Vulnerabilities, Prevention and Detection / by Salmani, Hassan

    Published 2018
    Table of Contents: “…The Global Integrated Circuit Supply Chain Flow and the Hardware Trojan Attack -- Circuit Vulnerabilities to Hardware Trojans at the Register Transfer Level -- Design Techniques for Hardware Trojans Prevention and Detection at the Register Transfer Level -- Circuit Vulnerabilities to Hardware Trojans at the Gate Level -- Design Techniques for Hardware Trojans Prevention and Detection at the Gate Level -- Circuit Vulnerabilities to Hardware Trojan at the Layout Level -- Design Techniques for Hardware Trojans Prevention and Detection at the Layout Level -- Trusted Testing Techniques for Hardware Trojan Detection -- Hardware Trojans in Analog and Mixed-Signal Integrated Circuits.…”
    Full-text access
    View in OPAC
    e-Book
  9. 9

    Critical Infrastructures, Key Resources, Key Assets Risk, Vulnerability, Resilience, Fragility, and Perception Governance / by Gheorghe, Adrian V., Vamanu, Dan V., Katina, Polinpapilinho F., Pulfer, Roland

    Published 2018
    Table of Contents: “…Critical Infrastructures, Key Resources, Key Assets -- Chapter 2. Governance Vulnerability  Facets -- Chapter 3. A Physical Analogy for Resilience and Vulnerability -- Chapter 4. …”
    Full-text access
    View in OPAC
    e-Book
  10. 10

    Microbiologically Influenced Corrosion An Engineering Insight / by Javaherdashti, Reza

    Published 2017
    Table of Contents: “…-- Examples of Some Systems Vulnerable to MIC -- Examples of Some Materials Vulnerable to MIC -- How Is MIC Treated?.…”
    Full-text access
    View in OPAC
    e-Book
  11. 11

    Inclusive principles and practices in literacy education /

    Published 2017
    Table of Contents: “…Prelims -- Literacy, inclusion and access to the curriculum: international insights -- Improving student literacy with vulnerable cohorts -- Index.…”
    Full-text access
    View in OPAC
    e-Book
  12. 12

    Security Challenges and Approaches in Internet of Things by Misra, Sridipta, Maheswaran, Muthucumaru, Hashmi, Salman

    Published 2017
    Table of Contents: “…Introduction -- Motivation -- System Model for the Internet of Things -- Vulnerable Features and Threats -- Securing the Internet of Things -- Security Approaches in Internet of Things -- Conclusion.…”
    Full-text access
    View in OPAC
    e-Book
  13. 13

    Urban areas and global climate change

    Published 2012
    Table of Contents: “…Cities in the flood : vulnerability and disaster risk management : evidence from Ibadan, Nigeria / Andrew Onwuemele -- ch. 12. …”
    Full-text access
    View in OPAC
    e-Book
  14. 14

    Ubiquitous Computing and Computing Security of IoT

    Published 2019
    Table of Contents: “…Security Protocols for IoT -- Security in Ubiquitous Computing Environment: Vulnerabilities, Attacks and Defences -- Security of Big Data in Internet of Things -- Trust Management Approaches in Mobile Adhoc Networks -- IoT for Ubiquitous Learning Applications: Current Trends and Future.…”
    Full-text access
    View in OPAC
    e-Book
  15. 15

    Feminism : perspectives, stereotypes/misperceptions and social implications /

    Published 2014
    Table of Contents: “…Roberts -- ch. 4 Black Women and Their Situation of Discrimination and Vulnerability in Brazil / Sonia Beatriz dos Santos -- ch. 5 Examining the Impact of Migration on the Reconfiguration of Family Dynamics: The Experiences of Haitian Immigrant Women in Canada / Louise Racine -- ch. 6 Feminism and Difference: A Pathway to Women's Reconstruction / Maria J. …”
    Full-text access
    View in OPAC
    e-Book
  16. 16

    Global Adaptation and Resilience to Climate Change

    Published 2019
    Table of Contents: “…Chapter 1 Introduction to climate change vulnerability, adaptation, and resiliency -- Chapter 2 Africa -- Chapter 3 Antarctica -- Chapter 4 Asia -- Chapter 5 Australia -- Chapter 6 Europe -- Chapter 7 North America -- Chapter 8 South America -- Chapter 9 The world adapting to climate change.…”
    Full-text access
    View in OPAC
    e-Book
  17. 17

    Practical Information Security A Competency-Based Education Course / by Alsmadi, Izzat, Burdwell, Robert, Aleroud , Ahmed, Wahbeh, Abdallah, Al-Qudah, Mahmoud, Al-Omari, Ahmad

    Published 2018
    Table of Contents: “…Introduction -- Information Systems Security -- Malicious Attacks, Threats, and Vulnerabilities -- Access Controls -- Security Operations and Administration -- Auditing, Testing, and Monitoring -- Risk, Response, and Recovery -- Cryptography -- Networks and Telecommunications Security -- Source Code Security -- Information Security Standards -- Information Systems Security Education and Training -- U.S. …”
    Full-text access
    View in OPAC
    e-Book
  18. 18

    Disaster Risk Reduction Community Resilience and Responses /

    Published 2019
    Table of Contents: “…<women and="" the="" gaps="" in="" framework="" of="" disaster="" risk="" reduction -- mapping="" vulnerable="" earthquake="" class="" i="" cities="" for="" reduction="" community="" resilience="" india -- law="" can="" set="" a="" stage="" reduction:="" study="" on="" nepal -- socio="" -="" economic="" impact="" coastal="" hazards="" fisher-folk="" livelihoods="" kerala -- sustainability="" managed="" projects -- post-disaster="" vulnerability="" female-headed="" households -- child="" centred="" (cc="" drr).…”
    Full-text access
    View in OPAC
    e-Book
  19. 19

    AI in Cybersecurity

    Published 2019
    Table of Contents: “…OWL Ontologies in Cybersecurity: Conceptual Modeling of Cyber-Knowledge -- Knowledge Representation of Network Semantics for Reasoning-Powered Cyber-Situational Awareness -- The Security of Machine Learning Systems -- Patch Before Exploited: An Approach to Identify Targeted Software Vulnerabilities -- Applying Artificial Intelligence Methods to Network Attack Detection -- Machine Learning Algorithms for Network Intrusion Detection -- Android Application Analysis using Machine Learning Techniques.…”
    Full-text access
    View in OPAC
    e-Book
  20. 20

    Innovation for sustainability : small farmers facing new challenges in the evolving food systems /

    Published 2020
    Table of Contents: “…Unpacking food systems / Gianluca Brunori, Tessa Avermaete, Fabio Bartolini, Natalia Brzezina, Terry Marsden, Erik Mathijs, Ana Moragues-Faus, Roberta Sonnino -- Chapter 4. The vulnerability of food systems / Gianluca Brunori, Tessa Avermaete, Fabio Bartolini, Natalia Brzezina, Terry Marsden, Erik Mathijs, Ana Moragues-Faus, Roberta Sonnino -- Chapter 5. …”
    Full-text access
    View in OPAC
    e-Book