Toggle navigation
Campus Access
About MPG.eBooks
Skip to content
Search Tips
Home
>
Search: "Vulnerability"
Language
English
Deutsch
Español
Français
Italiano
日本語
Nederlands
Português
Português (Brasil)
中文(简体)
中文(繁體)
Türkçe
עברית
Gaeilge
Cymraeg
Ελληνικά
Català
Euskara
Русский
Čeština
Suomi
Svenska
polski
Dansk
slovenščina
اللغة العربية
বাংলা
Galego
Tiếng Việt
Hrvatski
हिंदी
All Fields
Title
Person
Topic
ISBN/ISSN
Year
Collection
Advanced
Retain my current filters
dewey-ones:"670 - Manufacturing"
Showing
1
-
20
of
34
Search:
'"Vulnerability"'
,
query time: 0.06s
Book List
0
Sort:
Relevance
Year Descending
Year Ascending
Author
Title
Read Now
1
Project feasibility : tools for uncovering points of vulnerability
by
Mesly, Olivier
Published 2017
CRC Press
Table of Contents:
“
...2.6 The parametric frame2.6.1 Points of
vulnerability
and the parametric frame; 2.7 Frame of key...
”
Call Number:
HD69.P75
Read Now
2
Optimization Models in Software Reliability
Published 2022
Springer International Publishing
Table of Contents:
“
... Process -- Software
Vulnerability
Analysis...
”
Read Now
3
Industrial network security : securing critical infrastructure networks for smart grid, SCADA, and other industrial control systems
by
Knapp, Eric D.
,
Langill, Joel Thomas
Published 2015
Syngress
Table of Contents:
“
... -- Attack Trends -- Evolving
Vulnerabilities
: The Adobe Exploits -- Industrial Application Layer Attacks...
”
Call Number:
TS156.8
Read Now
4
Measuring and managing information risk : a FAIR approach
by
Freund, Jack
,
Jones, Jack
Published 2015
Butterworth-Heinemann
Table of Contents:
“
...;
VULNERABILITY
; THREAT CAPABILITY; DIFFICULTY; LOSS MAGNITUDE; PRIMARY LOSS MAGNITUDE; SECONDARY RISK; SECONDARY...
”
Call Number:
HD61
Read Now
5
Ignite : real leadership, real talk, real results
by
Dolan, Gabrielle
Published 2015
John Wiley and Sons Australia, Ltd
Table of Contents:
“
...Strength in
vulnerability
Myth 1:
Vulnerability
is a weakness; Myth 2:
Vulnerability
is letting...
”
Call Number:
HD31
Read Now
6
Lessons Learned : How to protect critical information infrastructure
by
Viira, Toomas
Published 2018
IT Governance Publishing
Table of Contents:
“
...Chapter 9: Focusing and prioritisationPart 3: Threats,
vulnerabilities
, risks, impacts; Chapter 10...
”
Call Number:
HF5548.37
Read Now
7
Industrial network security : securing critical infrastructure networks for smart grid, SCADA, and other industrial control systems
by
Knapp, Eric D.
,
Langill, Joel Thomas
Published 2015
Syngress
“
..., and the evolution to IEC62443, smart grid security; signature-based detection, exploit-based vs.
vulnerability
-based...
”
Read Now
8
Industrial network security : securing critical infrastructure networks for Smart Grid, SCADA, and other industrial control systems
by
Knapp, Eric
Published 2011
Syngress
Table of Contents:
“
... Chapter 6:
Vulnerability
and Risk Assessment Chapter 7: Establishing Secure Enclaves Chapter 8: Exception...
”
Call Number:
TS156.8
Read Now
9
Next generation red teaming
by
Dalziel, Henry
Published 2015
Elsevier
“
... readers how to dentify systemic security issues based on the analysis of
vulnerability
and configuration...
”
Call Number:
HD61.5
Read Now
10
Management for Digital Transformation
Published 2024
Springer International Publishing
Table of Contents:
“
... - Consumer’s
vulnerabilities
and potential dignity risks in the context of digital transformation processes...
”
Read Now
11
Global supply chain security and management : appraising programs, preventing crimes
by
Prokop, Darren
Published 2017
Butterworth-Heinemann is an imprint of Elsevier
Table of Contents:
“
... -- Counterfeiting -- Corruption and Maverick Buying -- NATURAL THREATS -- Weather
Vulnerabilities
-- Hazardous...
”
Call Number:
HD38.5
Read Now
12
Be a network marketing leader : build a community to build your empire
by
Christensen, Mary
Published 2016
AMACOM--American Management Association
Table of Contents:
“
... the benefits of coaching without sapping your time -- How to guide your
vulnerable
rookies -- Chief cheerleader...
”
Call Number:
HF5415.126
Read Now
13
Intelligence-based security in private industry
by
Trier, Thomas A.
Published 2015
CRC Press
Table of Contents:
“
...Chapter 14:
Vulnerabilities
Chapter 15: Planning and Resources; Chapter 16: Conduct an Intelligence...
”
Call Number:
HV8290
Read Now
14
Stories for management success : the power of talk in organizations
by
Collins, David
Published 2018
Routledge
Table of Contents:
“
... in my stories?; 5 Are my tales bland?; 6 Is my storytelling overly
vulnerable
to revision...
”
Call Number:
HD30.17
Read Now
15
Compensating your employees fairly : a guide to internal pay equity
by
Thomas, Stephanie R.
Published 2013
Apress
Call Number:
HD6061
Read Now
16
Mastering collaboration : make working together less painful and more productive
by
Anderson, Gretchen
Published 2019
O'Reilly Media
Table of Contents:
“
...Try It, You'll Like ItBuilding Trust Through
Vulnerability
; Leading Teams Toward Trust; Protect...
”
Call Number:
HD66
Read Now
17
From me to we : why commercial collaboration will future-proof business, leaders and personal success
by
Garner, Janine
Published 2015
John Wiley and Sons Australia
Table of Contents:
“
... -- Full disclosure;
Vulnerability
is a strength; Tell your story; Involve others in the decision-making...
”
Call Number:
HD30.28
Read Now
18
The discover your true north fieldbook : a personal guide to finding your authentic leadership
by
George, Bill
Published 2015
Wiley
Table of Contents:
“
...: Journey to Self-Awareness; Peeling Back the Onion;
Vulnerability
Is Power; Reflection and Introspection...
”
Call Number:
HD57.7
Read Now
19
Passion Into profit : how to make big money from who you are and what you know
by
Harrington, Andy
Published 2015
Capstone
Table of Contents:
“
... should I listen to you?; Chapter 4: Proving Credibility with a Personal Story;
Vulnerability
is a...
”
Call Number:
HD62.5
Read Now
20
Unblocked : how blockchains will change your business (and what to do about it)
by
McCauley, Alison
Published 2019
O'Reilly Media
Table of Contents:
“
... Broad Range of Industries Are
Vulnerable
; Implications: A New Balance of Power; Death by Blockchains...
”
Call Number:
QA76.9.B56
1
2
Back
Narrow Search
Remove Filters
Clear Filter
Classification: 670 - Manufacturing
Year of Publication
From:
To:
Classification
670 - Manufacturing
658 - General management
27
330 - Economics
24
500 - Natural sciences & mathematics
23
300 - Social sciences
22
302 - Social interaction
22
more ...
338 - Production
10
331 - Labor economics
7
368 - Insurance
3
153 - Mental processes & intelligence
2
158 - Applied psychology
2
303 - Social processes
2
380 - Commerce, communications & transportation
2
384 - Communications; telecommunication
2
005 - Computer programming, programs & data
1
381 - Commerce
1
620 - Engineering & allied operations
1
650 - Management & auxiliary services
1
see all ...
less ...
Language
English
33
Spanish
1
Collection
O'Reilly
30
Springer eBooks 2005-
3
Elsevier ScienceDirect eBooks
1
Author
Knapp, Eric D.
3
Evans, Christopher
2
Langill, Joel Thomas
2
Aggarwal, Anu G.
1
Anderson, Gretchen
1
Bernard, Alain
1
more ...
Christensen, Mary
1
Clarke, Richard A.
1
Collins, David
1
Craig, Nick
1
Dalziel, Henry
1
Davim, J. Paulo
1
Dolan, Gabrielle
1
Dolgui, Alexandre
1
Feuer, Michael J.
1
Freund, Jack
1
Garner, Janine
1
George, Bill
1
Goldberg, Caren
1
Harrington, Andy
1
Huang, Chongfu
1
International Conference on Risk Analysis and Crisis Response ( 2013, Istanbul, Turkey)
1
Jones, Jack
1
Kahraman, Cengiz
1
Kang, Meng-Chow
1
Kegan, Robert
1
King, Dan E.
1
Klein, Dustin S.
1
Knapp, Eric
1
Lahey, Lisa Laskow
1
Lemoine, David
1
Machado, Carolina
1
McCauley, Alison
1
Meghouar, Hicham
1
Mesly, Olivier
1
Pham, Hoang
1
Prokop, Darren
1
Rothrock, Ray A.
1
Saporito, Patricia L.
1
Shafer, Ross
1
Snook, Scott A.
1
Tandon, Abhishek
1
Thomas, Stephanie R.
1
Thorne, Stephen R.
1
Trier, Thomas A.
1
Viira, Toomas
1
von Cieminski, Gregor
1
see all ...
less ...
Recently Uploaded
Last Month
1
Search Tools
Get RSS Feed
Share Search
https://ebooks.mpdl.mpg.de/ebooks/Search/Results?filter%5B%5D=dewey-ones%3A%22670+-+Manufacturing%22&lookfor=%22Vulnerability%22&type=AllFields
Send by Email
×
Loading...