1
Published 2010
Springer Berlin Heidelberg
Table of Contents: ... Marketplaces -- Vulnerabilities -- Why Johnny Can’t Pentest: An Analysis of Black-Box Web Vulnerability...

2
Published 2011
Springer Berlin Heidelberg
... of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2011, held in Amsterdam, the Netherlands, in July...

3
Published 2018
Springer International Publishing
Table of Contents: ...Part I: Introduction and State of the Art -- Review of the State of the Art of Vulnerability...

5
by Nappa, Antonio, Blázquez, Eduardo
Published 2023
Packt Publishing, Limited
Table of Contents: ... Refrain: AFL + QEMU = CVEs -- Is it so easy to find vulnerabilities? -- Downloading and installing AFL...

6
by Jain, Smita, Lakshmi, Vasantha
Published 2023
Packt Publishing, Limited
Table of Contents: ... inventory -- Risk and vulnerability management -- Continuous threat monitoring -- Operational efficiency...

7
by Norberg, Scott
Published 2020
Apress
... which advocate for certain solutions that are vulnerable to obvious injection attacks....

8
by Rogers, Russ
Published 2008
Syngress
Table of Contents: ...Ch. 1. Vulnerability Assessment -- Ch. 2. Introducing Nessus -- Ch. 3. Installing Nessus -- Ch. 4...

9
Published 2023
Springer Nature Singapore
Table of Contents: ... Timers -- Compositional Vulnerability Detection with Insecurity Separation Logic -- Dynamic Extrapolation...

10
by Bayles, Aaron W.
Published 2005
Syngress Pub.
Table of Contents: ... -- Vulnerability disclosure -- Classes of attack -- Don't trip the sensors : integrate and imitate -- Vulnerability...

11 Table of Contents: ...The Cloud Environment Security Landscape -- Common Attacks and Vulnerabilities in Cloud Storage...

12
by Bhattacharjee, Sravani
Published 2018
Packt Publishing
Table of Contents: ...; Interdependence of critical infrastructures; Industrial threats, vulnerabilities, and risk factors; Threats...

13
by Furnell, Steven M.
Published 2005
Springer London
Table of Contents: ... That Compromise Security -- The Widespread Nature of Vulnerability -- Attack and Exploitation of Systems...

14
Published 2005
Springer US
Table of Contents: ... for Managing Cyber Vulnerabilities and Alerts -- Early Detection of Active Internet Worms -- Sensor Families...

15
Published 2017
Springer International Publishing
Table of Contents: ... and vulnerability --...

16
Published 2022
Springer International Publishing
Table of Contents: ... Probabilistic Principal Component Analysis and Differential Privacy -- ource code vulnerability detection method...

17
Published 2017
Springer International Publishing
Table of Contents: ... for vulnerability discovery and analysis -- Model checking for security -- Verification techniques for security...

18
by Partida, Alberto, Andina, Diego
Published 2010
Springer Netherlands
Table of Contents: ...Vulnerabilities, Threats and Risks in IT -- Security and IT Background -- The Team–Individual...

19
by Young, Carl S.
Published 2022
Springer International Publishing
Table of Contents: ... Vulnerabilities...

20
by Li, Shancang, Xu, Li D.
Published 2017
Syngress, an imprint of Elsevier
Table of Contents: ... of Things -- 3. Security and vulnerability in the Internet of Things -- 4. IoT node authentication -- 5...