1
Published 2014
Syngress
Table of Contents: .... Penetration testing / Sanjay Bavisi -- 8. What is vulnerability assessment? / Almantas Kakareka -- 9. Cyber...

2
by Vacca, John R.
Published 2007
Springer US
Table of Contents: ... the Web Client -- Threats and Vulnerabilities -- Protecting Your Web Browser -- Network Interconnections...

3
by Vacca, John R.
Published 2009
Elsevier
...Chapter coverage includes identifying vulnerabilities and implementing appropriate countermeasures...

4
by Vacca, John R.
Published 2013
Syngress
..., vulnerability assessments and audits, cryptography, and operational and organizational security, as well...

5
by Vacca, John R.
Published 2013
Morgan Kaufmann Publishers is an imprint of Elsevier
Table of Contents: ... Network Vulnerability Analysis -- 6.Summary -- Chapter Review Questions/Exercises -- Exercise...

6
Published 2017
CRC Press
... potentially vulnerable areas have become a priority for organizations of all sizes across the globe. Research...

7
by Vacca, John R.
Published 2006
Springer US
... network vulnerabilities. With a defined policy in place, IT staff can turn their attentions to protecting...