Vulnerable

Xem 1-20 trên 479 kết quả Vulnerable
  • Vulnerability assessment methodologies for information systems have been weakest in their ability to guide the evaluator through a determination of the critical vulnerabilities and to identify appropriate security mitigation techniques to consider for these vulnerabilities. The Vulnerability Assessment and Mitigation (VAM) methodology attempts to fill this gap, building on and expanding the earlier RAND methodology used to secure a system’s minimum essential information infrastructure (MEII).

    pdf0p trinhosieupham 06-02-2013 20 4   Download

  • This article looks at five common Web application attacks, primarily for PHP applications, and then presents a case study of a vulnerable Website that was found through Google and easily exploited. Each of the attacks we'll cover are part of a wide field of study, and readers are advised to follow the references listed in each section for further reading. It is important for Web developers and administrators to have a thorough knowledge of these attacks. It should also be noted that that Web applications can be subjected to many more attacks than just those listed here....

    pdf0p doilan 25-01-2013 22 3   Download

  • This report describes interventions for orphans and vulnerable children (OVC) at four sites in South Africa. The project sites are the Rustenburg and Orkney areas in the North West province, and the Kopanong and Matjhabeng municipalities in the Free State. The report highlights the knowledge, attitudes, practices, prevention, care and support issues concerning HIV/AIDS among the people located in these 4 areas.

    pdf0p chieckhanpieu 19-03-2013 26 2   Download

  • Tham khảo sách 'psychosocial issues affecting orphans and vulnerable children in two south african communities', khoa học xã hội, lịch sử văn hoá phục vụ nhu cầu học tập, nghiên cứu và làm việc hiệu quả

    pdf0p chieckhanpieu 19-03-2013 31 2   Download

  • Tham khảo sách 'a qualitative assessment of orphans and vulnerable children in two zimbabwean districts', khoa học xã hội, lịch sử văn hoá phục vụ nhu cầu học tập, nghiên cứu và làm việc hiệu quả

    pdf0p chieckhanpieu 19-03-2013 19 2   Download

  • Tham khảo sách 'qualitative research report on orphans and vulnerable children in palapye, botswana', khoa học xã hội, lịch sử văn hoá phục vụ nhu cầu học tập, nghiên cứu và làm việc hiệu quả

    pdf0p chieckhanpieu 19-03-2013 31 2   Download

  • Tham khảo sách 'working to support orphans and vulnerable children in southern africa', khoa học xã hội, lịch sử văn hoá phục vụ nhu cầu học tập, nghiên cứu và làm việc hiệu quả

    pdf0p chieckhanpieu 19-03-2013 22 2   Download

  • In 2002, the Human Sciences Research Council was commissioned by the WK Kellogg Foundation to develop and implement a five-year intervention project focusing on orphans and vulnerable children (OVC) in southern Africa. In collaboration with several partner organizations, the project currently focuses on how children, families and communities in Botswana, South Africa and Zimbabwe are coping with the impact of HIV/AIDS. The aim of the project is to develop models of best practise so as to enhance and improve support structures for OVC in the southern African region as a whole....

    pdf0p quatet 12-01-2013 29 1   Download

  • In 2002, the Human Sciences Research Council was commissioned by the WK Kellogg Foundation to develop and implement a five-year intervention project focusing on orphans and vulnerable children (OVC) in southern Africa. In collaboration with several partner organisations, the project currently focuses on how children, families and communities in Botswana, South Africa and Zimbabwe are coping with the impact of HIV/AIDS. The aim of the project is to develop models of best practise so as to enhance and improve support structures for OVC in the southern African region as a whole....

    pdf0p quatet 12-01-2013 22 1   Download

  • This research forms part of a broader project aimed at development and evaluation of interventions for orphaned and vulnerable children. The paper aims to provide a definitional framework and an understanding of orphans and vulnerability.

    pdf0p quatet 12-01-2013 22 1   Download

  • In 2002, the Human Science Research Concil was commisioned by the WK Kellog Foundation to develop and implement a five-year intervention project focusing on orphans and vulnerable chidren (OVC) in southern Africa. In collaboration with several partner organisations, the project currently focuses on how children, families in Botswana, South Africa and Zimbabwe are coping with the impact of HIV/AIDS. The aim of the project is to develop models of best practise so as to enhance and improve support structures for OVC in the southern African region as a whole....

    pdf0p chieckhanpieu 19-03-2013 28 1   Download

  • This report encompasses a situational analysis which was carried out in seven research sites in Botswana: Palapye, Letlhakeng, Kanye, Mahalapye, Molepolole, Serowe and Maun. Information was collected from orphans and vulnerable children (OVC), their caregivers, community

    pdf0p chieckhanpieu 19-03-2013 23 1   Download

  • In 2002, the Human Sciences Research Council was commissioned by the WK Kellogg Foundation to develop and implement a five-year intervention project focusing on orphans and vulnerable children (OVC) in southern Africa. In collaboration with several partner organizations,

    pdf0p chieckhanpieu 19-03-2013 37 1   Download

  • This report provides a baseline study on psychosocial support of orphans and vulnerable children (OVC) in two villages in Botswana and forms part of a series of reports that examine the work undertaken as part of the Kellogg OVC Intervention Project from 2002 to 2005.The general aim

    pdf0p chieckhanpieu 19-03-2013 33 1   Download

  • Vulnerabilities and Threats in Distributed Systems includes about From Vulnerabilities to Losses, Vulnerabilities and Threats, Vulnerabilities, Threats, Mechanisms to Reduce Vulnerabilities and Threats (Applying Reliability and Fault Tolerance Principles to Security Research, Using Trust in Role-based Access Control,...).

    ppt56p cocacola_17 11-12-2015 17 1   Download

  • Cash transfers for the most vulnerable and poor elderly people in Vietnam: An ex-Ante impact evaluation. This paper applies micro-simulation techniques with a household survey, i.e., Vietnam Household Living Standards Survey (VHLSS) in 2010, to examine how a cash transfer program would have been able to help reduce poverty of the elderly. The results show that any cash transfer programs could have reduced poverty for older people.

    pdf14p tranminhluanluan 28-05-2018 1 0   Download

  • Vulnerability and adaptation of coastal livelihoods to the impacts of climate change: A case study in coastal districts of Nam Dinh, Vietnam. Communities in coastal areas tend to be dependent on climate sensitive resources for their livelihoods which make them vulnerable to the impacts of climate change. Livelihood adaptation plays a vital role in mitigating vulnerabilities, increasing resilience, and achieving sustainable income and food security in the long term.

    pdf22p tranminhluanluan 28-05-2018 1 0   Download

  • LAN and Ethernet switches are usually considered as plumbing. They are easy to install and configure, but it is easy to forget about security when things appear to be simple. Multiple vulnerabilities exist in Ethernet switches. Attack tools to exploit them started to appear a couple of years ago (for example, the well-known dsniff package). By using those attack tools, a hacker can defeat the security myth of a switch, which incorrectly states that sniffing and packet interception are impossible with a switch.

    pdf361p vusuakhonghat 28-05-2009 542 251   Download

  • Google, the most popular search engine worldwide, provides web surfers with an easy-to-use guide to the Internet, with web and image searches, language translation, and a range of features that make web navigation simple enough for even the novice user. What many users don't realize is that the deceptively simple components that make Google so easy to use are the same features that generously unlock security flaws for the malicious hacker.

    pdf529p m3onh0x84 10-04-2011 231 82   Download

  • Describe the fundamentals of the Linux operating system. Describe the vulnerabilities of the Linux operating system...

    ppt26p gaconht 06-06-2011 67 16   Download

CHỦ ĐỀ BẠN MUỐN TÌM

Đồng bộ tài khoản