1
Published 2020
Springer International Publishing
Table of Contents: ....-Understanding Older Adults’ Vulnerability and Reactions to Telecommunication Fraud: The Effects of Personality...

2
Published 2003
Springer US
Table of Contents: ... Computer Networks for Vulnerability Analysis -- 19 On-line Intrusion Protection by Detecting Attacks...

3
by Matthews, Jeanna
Published 2005
Wiley
Table of Contents: ... protocol -- Exercise 2.1. Under the hood of HTTP -- Exercise 2.2. HTTP caching, authorization and cookies...

4
Published 2020
Springer International Publishing
Table of Contents: ... to Adverse Weather Conditions -- 22 Enhancing Availability for Critical Services -- 23 Detection of Attacks...

5
Published 2020
Springer International Publishing
Table of Contents: ...: Focusing on Improving User’s Trust -- Employees’ Vulnerability – the Challenge When Introducing New...

6
Published 2009
Springer Berlin Heidelberg
Table of Contents: ... Transform -- A Scalable, Vulnerability Modeling and Correlating Method for Network Security -- A Self...

7
by Meyers, Mike
Published 2023
McGraw-Hill Education
Table of Contents: ...Quality of Service (QoS), Traffic Shaping -- REVIEW -- 22 QUESTIONS -- 22 ANSWERS -- Objective 23...

8
Published 2006
Springer US
Table of Contents: ...Attacks, Vulnerability Analysis, and Tools -- Analysis and Improvement of Anti-Phishing Schemes...

9
Published 2010
Springer Berlin Heidelberg
Table of Contents: ... -- IntPatch: Automatically Fix Integer-Overflow-to-Buffer-Overflow Vulnerability at Compile-Time -- A Theory...

10
Published 2023
Springer Nature Switzerland
Table of Contents: ... effects of network changes on passenger flows -- Exploiting Security and Privacy Vulnerability in Human...

11
by Ghosh, Sumit
Published 2002
Springer New York
Table of Contents: ... Models -- 6.5 Problems and Exercises -- 7 Complex Vulnerabilities and Highly Sophisticated Attacks -- 7.1...

12
by Birch, Mark, Neil, Ian
Published 2023
Packt Publishing Ltd.
Table of Contents: ... -- Introduction -- Practice Exam Questions -- 2.1 Summarize various security measures and their purposes -- 2.2...

13
Published 2014
Springer International Publishing
Table of Contents: ... for Secondary Lahars and Simulation of 2005 Case of Vascun Valley, Ecuador -- Vulnerability and Protector...

14
by Goswami, Subrata
Published 2003
Springer US
Table of Contents: ... Updates -- 5.4 Secure DNS -- 5.5 DNS Vulnerabilities -- 5.6 IPv6 and DNS -- 5.7 6to4 and DNS -- 5.8...

15
Published 2010
Springer Berlin Heidelberg
Table of Contents: ... -- Design of a Forecasting Service System for Monitoring of Vulnerabilities of Sensor Networks -- A Study...

16
Published 2022
John Wiley & Sons, Inc.
Table of Contents: ... -- 10.1.1 Security Challenge in Networks -- 10.1.2 Attacks Vulnerability in Complex Networks -- 10.2...

17
Published 2022
Packt Publishing
.... In the fourth domain, we have network security at 19%. You will learn about threats, vulnerabilities, exploits...

18
Published 2022
Springer International Publishing
Table of Contents: ... Software Vulnerabilities to EM SideChannel Attacks --...

19
Published 2005
Springer US
Table of Contents: ...-Atomic Keys -- Virtual Analysis and Reduction of Side-Channel Vulnerabilities of Smartcards -- Family...

20
by Ayala, Luis
Published 2016
Apress, Distributed to the book trade worldwide by Springer Science+Business Media New York
Table of Contents: ... 19: R -- Chapter 20: S -- Chapter 21: T -- Chapter 22: U -- Chapter 23: V -- Chapter 24: W -- Chapter...