Pascal and Francis Bibliographic Databases

Help

Search results

Your search

kw.\*:("Vulnerabilidad")

Filter

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Language

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Origin

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 6293

  • Page / 252
Export

Selection :

  • and

New climatologists for a new climatologyPERRY, A. H.Progress in physical geography. 1995, Vol 19, Num 2, pp 280-285, issn 0309-1333Article

Assessment of testamentary capacity and vulnerability to undue influenceSHULMAN, Kenneth I; COHEN, Carole A; KIRSH, Felice C et al.The American journal of psychiatry. 2007, Vol 164, Num 5, pp 722-727, issn 0002-953X, 6 p.Article

A Bug Hunter's Diary, T. Klein, No Starch Press (2011)STERGIOPOULOS, George; GRITZALIS, Dimitris.Computers & security. 2014, Vol 43, issn 0167-4048, p. 188Article

Security risk vector for quantitative : Asset assessmentYOON JUNG CHUNG; KIM, Injung; LEE, Namhoon et al.Lecture notes in computer science. 2005, issn 0302-9743, isbn 3-540-25860-4, 4Vol, part II, 274-283Conference Paper

Local prey vulnerability increases with multiple attacks by a predatorQUINN, John L; CRESSWELL, Will.Oikos. 2012, Vol 121, Num 8, pp 1328-1334, issn 0030-1299, 7 p.Article

Evaluation and validation of vulnerability concepts using a physically based approachBROUYERE, S; JEANNIN, P.-Y; DASSARGUES, A et al.Conference on limestone hydrology and fissured mediaColloque d'hydrologie en pays calcaire et milieu fissuré. 2001, pp 67-72, isbn 2-905226-14-5Conference Paper

Assessment of the relative vulnerability of groundwater to pollution: a review and background paper for the conference workshop on vulnerability assessmentBARBER, C; BATES, L.E; BARRON, R et al.Conference Aquifers at risk : Towards a national groundwater quality perspective. 1993, Vol 14, Num 2-3, pp 147-154Conference Paper

La protection des personnes vulnérablesKASS-DANNO, S.TAMBOUR BATTANT. 2013, Num 37, pp 1-4, issn 1771-2890, 4 p., SupplArticle

National Internet Defense: Small States on the Skirmish LineSTAPLETON-GRAY, Ross; WOODCOCK, William.Communications of the ACM. 2011, Vol 54, Num 3, pp 50-55, issn 0001-0782, 6 p.Article

Données actuelles sur le jeu problématiqueBOUJU, G.Numéro spécial jeux. SWAPS. 2011, Num 65, pp 10-12, 3 p.Book Chapter

Prise en compte du sexe social dans les interventions en Afrique subsaharienneAHO, J; MISZKURKA, M; SMITS, P et al.TRANSCRIPTASE. 2008, Num 139, pp 16-19, issn 1166-5300, 4 p.Article

Travaux de la commission : familles, vulnérabilité, pauvretéLa Gazette des communes, des départements, des régions. 2005, Num 21-1791, pp 204-266, issn 0769-3508, 63 p.Article

Vulnérabilités psychologiques des enfants de personnes alcooliques : Une approche empiriqueCLOSSET, M. H; MOTQUIN, A; TORDEURS, D et al.Louvain médical. 2005, Vol 124, Num 2, pp 96-104, issn 0024-6956, 9 p.Article

Small solutions to polynomial equations, and low exponent RSA vulnerabilitiesCOPPERSMITH, D.Journal of cryptology. 1997, Vol 10, Num 4, pp 233-260, issn 0933-2790Article

Gummy and conductive silicone rubber fingers: Importance of vulnerability analysisMATSUMOTO, Tsutomu.Lecture notes in computer science. 2002, pp 574-575, issn 0302-9743, isbn 3-540-00171-9, 2 p.Conference Paper

Stability of groundwater to pollution under various hydrogeological conditions (as exampled by the Ural)GAYEV, A. YA; FETISOV, V. V.International Association of Hydrogeologists congress. 2001, pp 499-501, isbn 90-2651-848-X, 2VolConference Paper

Risk assessment as a framework for management of aquifers - A literature reviewCORRELL, R.L; DILLON, P.J.Conference Aquifers at risk : Towards a national groundwater quality perspective. 1993, Vol 14, Num 2-3, pp 155-159Conference Paper

Existential Vulnerability: Toward a Psychopathology of Limit SituationsFUCHS, Thomas.Psychopathology. 2013, Vol 46, Num 5, pp 301-308, issn 0254-4962, 8 p.Article

TFTP vulnerability finding technique based on fuzzingQIXU LIU; YUQING ZHANG.Computer communications. 2008, Vol 31, Num 14, pp 3420-3426, issn 0140-3664, 7 p.Article

Vieillissement, vulnérabilité perçue et routinisationBOUISSON, J.Retraite et société (Paris). 2007, Num 52, pp 107-128, issn 1167-4687, 22 p.Article

Souffrance, langage et sens : une commune vulnérabilité = Suffering, language and meaning : a common vulnerabilityHIGGINS, Robert William.Medecine palliative. 2007, Vol 6, Num 3, pp 188-194, issn 1636-6522, 7 p.Conference Paper

Security analysis of optical encryptionFRAUEL, Yann; CASTRO, Albertina; NAUGHTON, Thomas J et al.Proceedings of SPIE, the International Society for Optical Engineering. 2005, pp 598603.1-598603.10, issn 0277-786X, isbn 0-8194-6008-7, 1VolConference Paper

Toward an abstract computer virologyBONFANTE, G; KACZMAREK, M; MARION, J.-Y et al.Lecture notes in computer science. 2005, pp 579-593, issn 0302-9743, isbn 3-540-29107-5, 1Vol, 15 p.Conference Paper

Eszrevételek a fleszin alatti vizek szennyezodés-érzékenységi kérdéseihez = Observations on pollution sensivitivity of groundwatersALFOLDI, L.1994, Vol 74, Num 1, pp 15-21, issn 0018-1323Article

Heartbleed 101CARVALHO, Marco; DEMOTT, Jared; FORD, Richard et al.IEEE security & privacy. 2014, Vol 12, Num 4, pp 63-67, issn 1540-7993, 5 p.Article

  • Page / 252