Vulnerable

Xem 1-20 trên 470 kết quả Vulnerable
  • Vulnerability assessment methodologies for information systems have been weakest in their ability to guide the evaluator through a determination of the critical vulnerabilities and to identify appropriate security mitigation techniques to consider for these vulnerabilities. The Vulnerability Assessment and Mitigation (VAM) methodology attempts to fill this gap, building on and expanding the earlier RAND methodology used to secure a system’s minimum essential information infrastructure (MEII).

    pdf0p trinhosieupham 06-02-2013 16 3   Download

  • This article looks at five common Web application attacks, primarily for PHP applications, and then presents a case study of a vulnerable Website that was found through Google and easily exploited. Each of the attacks we'll cover are part of a wide field of study, and readers are advised to follow the references listed in each section for further reading. It is important for Web developers and administrators to have a thorough knowledge of these attacks. It should also be noted that that Web applications can be subjected to many more attacks than just those listed here....

    pdf0p doilan 25-01-2013 16 2   Download

  • This report describes interventions for orphans and vulnerable children (OVC) at four sites in South Africa. The project sites are the Rustenburg and Orkney areas in the North West province, and the Kopanong and Matjhabeng municipalities in the Free State. The report highlights the knowledge, attitudes, practices, prevention, care and support issues concerning HIV/AIDS among the people located in these 4 areas.

    pdf0p chieckhanpieu 19-03-2013 21 2   Download

  • Tham khảo sách 'psychosocial issues affecting orphans and vulnerable children in two south african communities', khoa học xã hội, lịch sử văn hoá phục vụ nhu cầu học tập, nghiên cứu và làm việc hiệu quả

    pdf0p chieckhanpieu 19-03-2013 31 2   Download

  • Tham khảo sách 'a qualitative assessment of orphans and vulnerable children in two zimbabwean districts', khoa học xã hội, lịch sử văn hoá phục vụ nhu cầu học tập, nghiên cứu và làm việc hiệu quả

    pdf0p chieckhanpieu 19-03-2013 12 2   Download

  • Tham khảo sách 'qualitative research report on orphans and vulnerable children in palapye, botswana', khoa học xã hội, lịch sử văn hoá phục vụ nhu cầu học tập, nghiên cứu và làm việc hiệu quả

    pdf0p chieckhanpieu 19-03-2013 30 2   Download

  • Tham khảo sách 'working to support orphans and vulnerable children in southern africa', khoa học xã hội, lịch sử văn hoá phục vụ nhu cầu học tập, nghiên cứu và làm việc hiệu quả

    pdf0p chieckhanpieu 19-03-2013 20 2   Download

  • In 2002, the Human Sciences Research Council was commissioned by the WK Kellogg Foundation to develop and implement a five-year intervention project focusing on orphans and vulnerable children (OVC) in southern Africa. In collaboration with several partner organizations, the project currently focuses on how children, families and communities in Botswana, South Africa and Zimbabwe are coping with the impact of HIV/AIDS. The aim of the project is to develop models of best practise so as to enhance and improve support structures for OVC in the southern African region as a whole....

    pdf0p quatet 12-01-2013 24 1   Download

  • In 2002, the Human Sciences Research Council was commissioned by the WK Kellogg Foundation to develop and implement a five-year intervention project focusing on orphans and vulnerable children (OVC) in southern Africa. In collaboration with several partner organisations, the project currently focuses on how children, families and communities in Botswana, South Africa and Zimbabwe are coping with the impact of HIV/AIDS. The aim of the project is to develop models of best practise so as to enhance and improve support structures for OVC in the southern African region as a whole....

    pdf0p quatet 12-01-2013 17 1   Download

  • This research forms part of a broader project aimed at development and evaluation of interventions for orphaned and vulnerable children. The paper aims to provide a definitional framework and an understanding of orphans and vulnerability.

    pdf0p quatet 12-01-2013 16 1   Download

  • In 2002, the Human Science Research Concil was commisioned by the WK Kellog Foundation to develop and implement a five-year intervention project focusing on orphans and vulnerable chidren (OVC) in southern Africa. In collaboration with several partner organisations, the project currently focuses on how children, families in Botswana, South Africa and Zimbabwe are coping with the impact of HIV/AIDS. The aim of the project is to develop models of best practise so as to enhance and improve support structures for OVC in the southern African region as a whole....

    pdf0p chieckhanpieu 19-03-2013 23 1   Download

  • This report encompasses a situational analysis which was carried out in seven research sites in Botswana: Palapye, Letlhakeng, Kanye, Mahalapye, Molepolole, Serowe and Maun. Information was collected from orphans and vulnerable children (OVC), their caregivers, community

    pdf0p chieckhanpieu 19-03-2013 20 1   Download

  • In 2002, the Human Sciences Research Council was commissioned by the WK Kellogg Foundation to develop and implement a five-year intervention project focusing on orphans and vulnerable children (OVC) in southern Africa. In collaboration with several partner organizations,

    pdf0p chieckhanpieu 19-03-2013 32 1   Download

  • This report provides a baseline study on psychosocial support of orphans and vulnerable children (OVC) in two villages in Botswana and forms part of a series of reports that examine the work undertaken as part of the Kellogg OVC Intervention Project from 2002 to 2005.The general aim

    pdf0p chieckhanpieu 19-03-2013 30 1   Download

  • Vulnerabilities and Threats in Distributed Systems includes about From Vulnerabilities to Losses, Vulnerabilities and Threats, Vulnerabilities, Threats, Mechanisms to Reduce Vulnerabilities and Threats (Applying Reliability and Fault Tolerance Principles to Security Research, Using Trust in Role-based Access Control,...).

    ppt56p cocacola_17 11-12-2015 6 1   Download

  • LAN and Ethernet switches are usually considered as plumbing. They are easy to install and configure, but it is easy to forget about security when things appear to be simple. Multiple vulnerabilities exist in Ethernet switches. Attack tools to exploit them started to appear a couple of years ago (for example, the well-known dsniff package). By using those attack tools, a hacker can defeat the security myth of a switch, which incorrectly states that sniffing and packet interception are impossible with a switch.

    pdf361p vusuakhonghat 28-05-2009 524 250   Download

  • Google, the most popular search engine worldwide, provides web surfers with an easy-to-use guide to the Internet, with web and image searches, language translation, and a range of features that make web navigation simple enough for even the novice user. What many users don't realize is that the deceptively simple components that make Google so easy to use are the same features that generously unlock security flaws for the malicious hacker.

    pdf529p m3onh0x84 10-04-2011 211 79   Download

  • Describe the fundamentals of the Linux operating system. Describe the vulnerabilities of the Linux operating system...

    ppt26p gaconht 06-06-2011 61 16   Download

  • This study analyzes and provides empirical tests of early warning indicators of banking and currency crises in emerging economies. The aim is to identify key empirical regularities in the run-up to banking and currency crises that would enable officials and private market participants to recognize vulnerability to financial crises at an earlier stage. This, in turn, should make it easier to motivate the corrective policy actions that would prevent such crises from actually taking place.

    pdf113p conrepcon 12-04-2012 29 15   Download

  • The adoption by DFID of the 1997 White Paper priorities has brought a new determination to focus on poverty reduction in UK assistance to developing and transition countries. The White Paper recognised the significance of socio-economic factors in making people vulnerable to disaster. It sets out the objectives of protecting and rebuilding livelihoods and communities after disasters, and reducing vulnerability to future disasters. conditions.

    doc61p tvhieuagu 17-08-2009 135 13   Download

CHỦ ĐỀ BẠN MUỐN TÌM

Đồng bộ tài khoản