kw.\*:("Vulnerabilidad")
Results 1 to 25 of 6293
Selection :
New climatologists for a new climatologyPERRY, A. H.Progress in physical geography. 1995, Vol 19, Num 2, pp 280-285, issn 0309-1333Article
Assessment of testamentary capacity and vulnerability to undue influenceSHULMAN, Kenneth I; COHEN, Carole A; KIRSH, Felice C et al.The American journal of psychiatry. 2007, Vol 164, Num 5, pp 722-727, issn 0002-953X, 6 p.Article
A Bug Hunter's Diary, T. Klein, No Starch Press (2011)STERGIOPOULOS, George; GRITZALIS, Dimitris.Computers & security. 2014, Vol 43, issn 0167-4048, p. 188Article
Security risk vector for quantitative : Asset assessmentYOON JUNG CHUNG; KIM, Injung; LEE, Namhoon et al.Lecture notes in computer science. 2005, issn 0302-9743, isbn 3-540-25860-4, 4Vol, part II, 274-283Conference Paper
Local prey vulnerability increases with multiple attacks by a predatorQUINN, John L; CRESSWELL, Will.Oikos. 2012, Vol 121, Num 8, pp 1328-1334, issn 0030-1299, 7 p.Article
Evaluation and validation of vulnerability concepts using a physically based approachBROUYERE, S; JEANNIN, P.-Y; DASSARGUES, A et al.Conference on limestone hydrology and fissured mediaColloque d'hydrologie en pays calcaire et milieu fissuré. 2001, pp 67-72, isbn 2-905226-14-5Conference Paper
Assessment of the relative vulnerability of groundwater to pollution: a review and background paper for the conference workshop on vulnerability assessmentBARBER, C; BATES, L.E; BARRON, R et al.Conference Aquifers at risk : Towards a national groundwater quality perspective. 1993, Vol 14, Num 2-3, pp 147-154Conference Paper
La protection des personnes vulnérablesKASS-DANNO, S.TAMBOUR BATTANT. 2013, Num 37, pp 1-4, issn 1771-2890, 4 p., SupplArticle
National Internet Defense: Small States on the Skirmish LineSTAPLETON-GRAY, Ross; WOODCOCK, William.Communications of the ACM. 2011, Vol 54, Num 3, pp 50-55, issn 0001-0782, 6 p.Article
Données actuelles sur le jeu problématiqueBOUJU, G.Numéro spécial jeux. SWAPS. 2011, Num 65, pp 10-12, 3 p.Book Chapter
Prise en compte du sexe social dans les interventions en Afrique subsaharienneAHO, J; MISZKURKA, M; SMITS, P et al.TRANSCRIPTASE. 2008, Num 139, pp 16-19, issn 1166-5300, 4 p.Article
Travaux de la commission : familles, vulnérabilité, pauvretéLa Gazette des communes, des départements, des régions. 2005, Num 21-1791, pp 204-266, issn 0769-3508, 63 p.Article
Vulnérabilités psychologiques des enfants de personnes alcooliques : Une approche empiriqueCLOSSET, M. H; MOTQUIN, A; TORDEURS, D et al.Louvain médical. 2005, Vol 124, Num 2, pp 96-104, issn 0024-6956, 9 p.Article
Small solutions to polynomial equations, and low exponent RSA vulnerabilitiesCOPPERSMITH, D.Journal of cryptology. 1997, Vol 10, Num 4, pp 233-260, issn 0933-2790Article
Gummy and conductive silicone rubber fingers: Importance of vulnerability analysisMATSUMOTO, Tsutomu.Lecture notes in computer science. 2002, pp 574-575, issn 0302-9743, isbn 3-540-00171-9, 2 p.Conference Paper
Stability of groundwater to pollution under various hydrogeological conditions (as exampled by the Ural)GAYEV, A. YA; FETISOV, V. V.International Association of Hydrogeologists congress. 2001, pp 499-501, isbn 90-2651-848-X, 2VolConference Paper
Risk assessment as a framework for management of aquifers - A literature reviewCORRELL, R.L; DILLON, P.J.Conference Aquifers at risk : Towards a national groundwater quality perspective. 1993, Vol 14, Num 2-3, pp 155-159Conference Paper
Existential Vulnerability: Toward a Psychopathology of Limit SituationsFUCHS, Thomas.Psychopathology. 2013, Vol 46, Num 5, pp 301-308, issn 0254-4962, 8 p.Article
TFTP vulnerability finding technique based on fuzzingQIXU LIU; YUQING ZHANG.Computer communications. 2008, Vol 31, Num 14, pp 3420-3426, issn 0140-3664, 7 p.Article
Vieillissement, vulnérabilité perçue et routinisationBOUISSON, J.Retraite et société (Paris). 2007, Num 52, pp 107-128, issn 1167-4687, 22 p.Article
Souffrance, langage et sens : une commune vulnérabilité = Suffering, language and meaning : a common vulnerabilityHIGGINS, Robert William.Medecine palliative. 2007, Vol 6, Num 3, pp 188-194, issn 1636-6522, 7 p.Conference Paper
Security analysis of optical encryptionFRAUEL, Yann; CASTRO, Albertina; NAUGHTON, Thomas J et al.Proceedings of SPIE, the International Society for Optical Engineering. 2005, pp 598603.1-598603.10, issn 0277-786X, isbn 0-8194-6008-7, 1VolConference Paper
Toward an abstract computer virologyBONFANTE, G; KACZMAREK, M; MARION, J.-Y et al.Lecture notes in computer science. 2005, pp 579-593, issn 0302-9743, isbn 3-540-29107-5, 1Vol, 15 p.Conference Paper
Eszrevételek a fleszin alatti vizek szennyezodés-érzékenységi kérdéseihez = Observations on pollution sensivitivity of groundwatersALFOLDI, L.1994, Vol 74, Num 1, pp 15-21, issn 0018-1323Article
Heartbleed 101CARVALHO, Marco; DEMOTT, Jared; FORD, Richard et al.IEEE security & privacy. 2014, Vol 12, Num 4, pp 63-67, issn 1540-7993, 5 p.Article