Pascal and Francis Bibliographic Databases

Help

Search results

Your search

kw.\*:("Vulnerabilidad")

Filter

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Language

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Origin

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 9393

  • Page / 376
Export

Selection :

  • and

New climatologists for a new climatologyPERRY, A. H.Progress in physical geography. 1995, Vol 19, Num 2, pp 280-285, issn 0309-1333Article

Assessment of testamentary capacity and vulnerability to undue influenceSHULMAN, Kenneth I; COHEN, Carole A; KIRSH, Felice C et al.The American journal of psychiatry. 2007, Vol 164, Num 5, pp 722-727, issn 0002-953X, 6 p.Article

Effects of within-patch characteristics on the vulnerability of a plant to herbivoryMILLER, Alison M; MCARTHUR, Clare; SMETHURST, Philip J et al.Oikos. 2007, Vol 116, Num 1, pp 41-52, issn 0030-1299, 12 p.Article

Vulnerability analysis and evaluation within an intranetPARK, Eungki; SEO, Jung-Taek; EUL GYU IM et al.Lecture notes in computer science. 2004, pp 514-515, issn 0302-9743, isbn 3-540-22125-5, 2 p.Conference Paper

A Bug Hunter's Diary, T. Klein, No Starch Press (2011)STERGIOPOULOS, George; GRITZALIS, Dimitris.Computers & security. 2014, Vol 43, issn 0167-4048, p. 188Article

Security risk vector for quantitative : Asset assessmentYOON JUNG CHUNG; KIM, Injung; LEE, Namhoon et al.Lecture notes in computer science. 2005, issn 0302-9743, isbn 3-540-25860-4, 4Vol, part II, 274-283Conference Paper

Local prey vulnerability increases with multiple attacks by a predatorQUINN, John L; CRESSWELL, Will.Oikos. 2012, Vol 121, Num 8, pp 1328-1334, issn 0030-1299, 7 p.Article

La paradoxale protection de la personne vulnérable par elle-même : les contradictions d'un droit de la vulnérabilité en constructionLAVAUD-LEGENDRE, Bénédicte.Revue de droit sanitaire et social. 2010, Num 3, pp 520-534, issn 0245-9469, 15 p.Article

Evaluation and validation of vulnerability concepts using a physically based approachBROUYERE, S; JEANNIN, P.-Y; DASSARGUES, A et al.Conference on limestone hydrology and fissured mediaColloque d'hydrologie en pays calcaire et milieu fissuré. 2001, pp 67-72, isbn 2-905226-14-5Conference Paper

Assessment of the relative vulnerability of groundwater to pollution: a review and background paper for the conference workshop on vulnerability assessmentBARBER, C; BATES, L.E; BARRON, R et al.Conference Aquifers at risk : Towards a national groundwater quality perspective. 1993, Vol 14, Num 2-3, pp 147-154Conference Paper

Réflexions sur la vulnérabilité à l'aléa érosion = The concept of vulnerability and erosion as a natural hazardLIEGEOIS, Marie; WICHEREK, Stanislas; AMAT, Jean-Paul et al.Agricultures (Montrouge). 2004, Vol 13, Num 4, pp 355-361, issn 1166-7699, 7 p.Article

Fault injection tool for network security evaluationWANNER, Paulo César; WEBER, Raul Fernando.Lecture notes in computer science. 2003, pp 127-136, issn 0302-9743, isbn 3-540-20224-2, 10 p.Conference Paper

La vulnérabilité aux infections chez le sujet âgé = Vulnerability to infections in elderlyRUMEAU, P; RAYNAUD-SIMON, A; LESOURD, B et al.La Revue de gériatrie. 2001, Vol 26, Num 7, pp A.5-A.8, issn 0397-7927, SUPAArticle

Aquifer vulnerability assessment through the use of GIS technologyROSENBAUM, M. S; NOWBUTH, M. D.International Symposium on Engineering Geology and the EnvironmentSymposium internationale de la géologie de l'ingénieur et l'environnement. 1997, pp 1475-1477, isbn 90-5410-877-0Conference Paper

Table ronde du 16 0ctobre 1992. Vulnérabilité et protection des aquifères en pays calcaire = Discussion(October 16, 1992). Aquifers vulnerability and protection in a karstic areaCHAUVE, P; GANDOLA, M; GLASEL, Y et al.Colloque d'hydrologie en pays calcaire et en milieu fissuré. 1992, pp 323-339, issn 0759-7517, H.S. 11Conference Paper

THE PSYCHOLOGY OF SECURITYWEST, Ryan.Communications of the ACM. 2008, Vol 51, Num 4, pp 34-40, issn 0001-0782, 7 p.Article

La protection des personnes vulnérablesKASS-DANNO, S.TAMBOUR BATTANT. 2013, Num 37, pp 1-4, issn 1771-2890, 4 p., SupplArticle

National Internet Defense: Small States on the Skirmish LineSTAPLETON-GRAY, Ross; WOODCOCK, William.Communications of the ACM. 2011, Vol 54, Num 3, pp 50-55, issn 0001-0782, 6 p.Article

Données actuelles sur le jeu problématiqueBOUJU, G.Numéro spécial jeux. SWAPS. 2011, Num 65, pp 10-12, 3 p.Book Chapter

Prise en compte du sexe social dans les interventions en Afrique subsaharienneAHO, J; MISZKURKA, M; SMITS, P et al.TRANSCRIPTASE. 2008, Num 139, pp 16-19, issn 1166-5300, 4 p.Article

Travaux de la commission : familles, vulnérabilité, pauvretéLa Gazette des communes, des départements, des régions. 2005, Num 21-1791, pp 204-266, issn 0769-3508, 63 p.Article

Vulnérabilités psychologiques des enfants de personnes alcooliques : Une approche empiriqueCLOSSET, M. H; MOTQUIN, A; TORDEURS, D et al.Louvain médical. 2005, Vol 124, Num 2, pp 96-104, issn 0024-6956, 9 p.Article

Small solutions to polynomial equations, and low exponent RSA vulnerabilitiesCOPPERSMITH, D.Journal of cryptology. 1997, Vol 10, Num 4, pp 233-260, issn 0933-2790Article

Gummy and conductive silicone rubber fingers: Importance of vulnerability analysisMATSUMOTO, Tsutomu.Lecture notes in computer science. 2002, pp 574-575, issn 0302-9743, isbn 3-540-00171-9, 2 p.Conference Paper

Stability of groundwater to pollution under various hydrogeological conditions (as exampled by the Ural)GAYEV, A. YA; FETISOV, V. V.International Association of Hydrogeologists congress. 2001, pp 499-501, isbn 90-2651-848-X, 2VolConference Paper

  • Page / 376