1
by Misztal, Barbara A.
Published 2011
Palgrave Macmillan UK
...Proposing an aggregative conception of vulnerability, this book provides a new framework...

2
Published 2022
Palgrave Macmillan
Table of Contents: ...PART I. Theoretical and empirical insights into vulnerable people’s digital inclusion -- 1...

3
by Mesly, Olivier
Published 2017
CRC Press
Table of Contents: ...2.6 The parametric frame2.6.1 Points of vulnerability and the parametric frame; 2.7 Frame of key...

4
by Thelandersson, Fredrika
Published 2023
Palgrave Macmillan
Table of Contents: ... and Selena Gomez -- 4. Social Media Sadness: Sad Girls and the Public Display of Vulnerability -- 5...

5
by Williams, Greg, Iyer, Pat
Published 2018
Career Press
Table of Contents: ... -- Targeting the vulnerable in the workplace -- Costs : pinpointing the price of bullying -- Putting it all...

6
by Bryant, John Hope
Published 2009
Jossey-Bass
Table of Contents: ... -- Vulnerability is power -- Giving is getting -- Conclusion: good capitalism and love leadership...

7
by Parker, Matt K.
Published 2022
IT Revolution
Table of Contents: ... gratification -- Imperative #4: Candid vulnerability -- A radical enterprise...

8
by Dolan, Gabrielle
Published 2015
John Wiley and Sons Australia, Ltd
Table of Contents: ...Strength in vulnerabilityMyth 1: Vulnerability is a weakness; Myth 2: Vulnerability is letting...

9
by Freund, Jack, Jones, Jack
Published 2015
Butterworth-Heinemann
Table of Contents: ...; VULNERABILITY; THREAT CAPABILITY; DIFFICULTY; LOSS MAGNITUDE; PRIMARY LOSS MAGNITUDE; SECONDARY RISK; SECONDARY...

10
by Viira, Toomas
Published 2018
IT Governance Publishing
Table of Contents: ...Chapter 9: Focusing and prioritisationPart 3: Threats, vulnerabilities, risks, impacts; Chapter 10...

11
by Gladieux, Michelle D.
Published 2023
Berrett-Koehler Publishers, Inc.
Table of Contents: ...Introduction -- Strength in Vulnerability (Saying "Nobody's perfect", and Meaning It) -- Understand...

12
Published 2009
IT Governance Pub.
Table of Contents: ...; Filtering; Vulnerability management; APPENDIX A: GLOSSARY; APPENDIX B: SOCIAL NETWORKING SCREENSHOTS; ITG...

13
by Sutton, David
Published 2014
BCS
Table of Contents: ... assessments; 5 threat and vulnerability assessment; conducting threat assessments; conducting vulnerability...

14
by Shin, Donghee
Published 2024
Palgrave Macmillan
Table of Contents: ...Part I: The Cognitive Science of Misinformation: Why We Are Vulnerable and How Misinformation...

15
by Oware, Matthew
Published 2018
Palgrave Macmillan
... arrogance to vulnerability, conveying a more complex manhood than previously acknowledged. Women...

16
by Dalziel, Henry
Published 2015
Elsevier
... readers how to dentify systemic security issues based on the analysis of vulnerability and configuration...

17
Published 2016
McGraw-Hill Education
Table of Contents: ... professionalism -- The awesome power of vulnerability...

18
by McGowan, Heather, Shipley, Chris
Published 2020
John Wiley & Sons, Inc.
Table of Contents: ... : modeling vulnerability, learning from failure, and providing the psychological safety that builds trusting...

19
Published 2022
Ascent Audio
... vulnerability and authority? This book explains the role of authenticity in emotionally intelligent leadership...

20
by Heywood, Emma
Published 2024
Palgrave Macmillan
..., internally displaced women, and trauma. Given the social, economic and political vulnerability...