Toggle navigation
Campus Access
About MPG.eBooks
Skip to content
Search Tips
Home
>
Search: "Vulnerability"
Language
English
Deutsch
Español
Français
Italiano
日本語
Nederlands
Português
Português (Brasil)
中文(简体)
中文(繁體)
Türkçe
עברית
Gaeilge
Cymraeg
Ελληνικά
Català
Euskara
Русский
Čeština
Suomi
Svenska
polski
Dansk
slovenščina
اللغة العربية
বাংলা
Galego
Tiếng Việt
Hrvatski
हिंदी
All Fields
Title
Person
Topic
ISBN/ISSN
Year
Collection
Advanced
Retain my current filters
dewey-ones:"368 - Insurance"
language:"English"
Showing
1
-
20
of
25
Search:
'"Vulnerability"'
,
query time: 0.14s
Book List
0
Sort:
Relevance
Year Descending
Year Ascending
Author
Title
Read Now
1
Vulnerability
management
by
Foreman, Park
Published 2010
Auerbach Publications
Call Number:
QA76.9.A25
Read Now
2
Metrics and methods for security risk management
by
Young, Carl S.
Published 2010
Syngress/Elsevier
Table of Contents:
“
... Component of Security Risk -- Chapter 5 -- Measuring the
Vulnerability
Component of Security Risk -- Chapter...
”
Call Number:
HD61
Read Now
3
Information Risk Management : A practitioner's guide
by
Sutton, David
Published 2021
BCS, The Chartered Institute for IT
Table of Contents:
“
.... The information risk management programme 4. Risk identification 5. Threat and
vulnerability
assessment 6. Risk...
”
Call Number:
HD30.2
Read Now
4
Financial and fiscal instruments for catastrophe risk management : addressing the losses from flood hazards in Central Europe
by
Pollner, John D.
Published 2012
World Bank
Table of Contents:
“
... -- Central and Eastern Europe catastrophe exposure and
vulnerability
-- Modeling for losses correlated...
”
Read Now
5
Security risk management : the driving force for operational resilience : the firefighting paradox
by
Seaman, Jim
,
Gioia, Michael
Published 2023
CRC Press
Table of Contents:
“
...
Vulnerability
Management. </P></B><P>4.1 The First Aid analogy. 4.2 Introduction to
Vulnerability
Management...
”
Call Number:
HD58.9
Read Now
6
Measuring and managing information risk : a FAIR approach
by
Freund, Jack
,
Jones, Jack
Published 2015
Butterworth-Heinemann
Table of Contents:
“
...;
VULNERABILITY
; THREAT CAPABILITY; DIFFICULTY; LOSS MAGNITUDE; PRIMARY LOSS MAGNITUDE; SECONDARY RISK; SECONDARY...
”
Call Number:
HD61
Read Now
7
Financial cybersecurity risk management : leadership perspectives and guidance for systems and institutions
by
Rohmeyer, Paul
,
Bayuk, Jennifer L.
Published 2019
Springer
Table of Contents:
“
...Chapter 1: What Are We Afraid Of? -- Chapter 2: Where Are We
Vulnerable
? -- Chapter 3: What Would a...
”
Call Number:
QA76.9.A25
Read Now
8
Unveiling the NIST Risk Management Framework (RMF) : A Practical Guide to Implementing RMF and Managing Risks in Your Organization
by
Marsland, Thomas
Published 2024
Packt Publishing Ltd.
Table of Contents:
“
...Recognizing
vulnerabilities
-- Common
vulnerabilities
--
Vulnerability
scanning tools -- NIST...
”
Call Number:
HD61
Read Now
9
Software supply chain security
by
Crossley, Cassie
Published 2024
O'Reilly Media, Inc.
“
... software cybersecurity
vulnerability
can stop entire companies from doing business and cause billions...
”
Call Number:
QA76.754
Read Now
10
Information Risk Management : a Practitioner's Guide
by
Sutton, David
Published 2014
BCS
Table of Contents:
“
... assessments; 5 threat and
vulnerability
assessment; conducting threat assessments; conducting
vulnerability
...
”
Call Number:
HD30.2
Read Now
11
Industrial security : managing security in the 21st century
by
Russell, David L.
Published 2015
John Wiley & Sons
Table of Contents:
“
...Countermeasures for
Vulnerabilities
Sample Threat Scenario NO. 1 (Fig. 1.6); Sample Threat Scenario...
”
Call Number:
HD61.5
Read Now
12
Natech risk assessment and management : reducing the risk of natural-hazard impact on hazardous installations
by
Krausmann, Elisabeth
,
Cruz, Ana Maria
,
Salzano, Ernesto
Published 2017
Elsevier
“
... assessment, such as plant layout, substance hazards, and equipment
vulnerability
. The final section...
”
Call Number:
GB5014
Read Now
13
Workplace Security Essentials : a Guide for Helping Organizations Create Safe Work Environments
by
Smith, Eric N.
Published 2014
Butterworth-Heinemann
Table of Contents:
“
... -- Building Skills with Basics: Learning to Identify Threats -- Playing with Blocks:
Vulnerabilities
...
”
Call Number:
HF5351
Read Now
14
Cindynics, the science of danger : a wake-up call
by
Planchette, Guy
Published 2021
ISTE Ltd.
Table of Contents:
“
... of the Work of IMdR-AFPCN: "
Vulnerability
of Networks and Natural Disasters" -- The New Cindynics Concepts...
”
Call Number:
HD61
Read Now
15
Cybersecurity risk management : mastering the fundamentals using the NIST cybersecurity framework
by
Brumfield, Cynthia
,
Haugli, Brian
Published 2022
John Wiley & Sons, Inc.
Table of Contents:
“
... through Software Code Inspection and
Vulnerability
Assessments 65 --...
”
Call Number:
QA76.9.A25
Read Now
16
Security metrics : replacing fear, uncertainty, and doubt
by
Jaquith, Andrew
Published 2007
Addison-Wesley
Call Number:
HD61
Read Now
17
Mastering cyber intelligence : gain comprehensive knowledge and skills to conduct threat intelligence for effective system defense
by
Dahj, Jean Nestor M.
Published 2022
Packt Publishing, Limited
Call Number:
HD61.5
Read Now
18
Responsive security : be ready to be secure
by
Kang, Meng-Chow
Published 2014
CRC Press/Taylor & Francis
“
..."Technology and business change along with information flows,
vulnerabilities
, exposures, and risks...
”
Call Number:
HF5548.37
Read Now
19
Improving Preparedness in Supply Chain Risk Management at Jacket
by
Munson, Chuck
Published 2013
Pearson
“
... refocused executive management on the issue of reducing supply
vulnerabilities
. It reviews Jacket's fluid...
”
Read Now
20
Security controls evaluation, testing, and assessment handbook
by
Johnson, Leighton
Published 2016
Syngress is an imprint of Elsevier
“
... and systems. If a system is subject to external or internal threats and
vulnerabilities
--which most...
”
Call Number:
QA76.9.A25
1
2
Back
Narrow Search
Remove Filters
Clear Filter
Classification: 368 - Insurance
Clear Filter
Language: English
Year of Publication
From:
To:
Classification
368 - Insurance
658 - General management
24
330 - Economics
11
005 - Computer programming, programs & data
6
300 - Social sciences
5
331 - Labor economics
5
more ...
500 - Natural sciences & mathematics
5
338 - Production
4
670 - Manufacturing
4
302 - Social interaction
3
153 - Mental processes & intelligence
2
363 - Other social problems & services
2
000 - Computer science, information & general works
1
006 - Special computer methods
1
see all ...
less ...
Language
English
Collection
O'Reilly
24
World Bank E-Library Archive
1
Author
Sutton, David
2
Allen, Gregory
1
Arlow, Pieter
1
Bayuk, Jennifer L.
1
Brumfield, Cynthia
1
Bushmiller, Dean
1
more ...
Crossley, Cassie
1
Cruz, Ana Maria
1
Dahj, Jean Nestor M.
1
Derr, Rachel
1
Foreman, Park
1
Freund, Jack
1
Gibian, Davey
1
Gioia, Michael
1
Haugli, Brian
1
Jaquith, Andrew
1
Johnson, Leighton
1
Jones, Jack
1
Kang, Meng-Chow
1
Krausmann, Elisabeth
1
Marsland, Thomas
1
Munson, Chuck
1
Oni, Alexander
1
Parks, Tom
1
Planchette, Guy
1
Pollner, John D.
1
Rohmeyer, Paul
1
Russell, David L.
1
Salzano, Ernesto
1
Saporito, Patricia L.
1
Scott, Jaclyn
1
Seaman, Jim
1
Smith, Eric N.
1
Young, Carl S.
1
see all ...
less ...
Recently Uploaded
Last Month
1
Search Tools
Get RSS Feed
Share Search
https://ebooks.mpdl.mpg.de/ebooks/Search/Results?filter%5B%5D=dewey-ones%3A%22368+-+Insurance%22&filter%5B%5D=language%3A%22English%22&lookfor=%22Vulnerability%22&type=AllFields
Send by Email
×
Loading...