1
by Susan Snedaker
Published 2007
Syngress
Table of Contents: ...pt. 1. From Vulnerability to Patch -- Ch. 1. Windows of Vulnerability -- Ch. 2. Vulnerability...

2
by Haber, Morey J., Hibbert, Brad
Published 2018
Apress
Table of Contents: ...Chapter 1: The Attack Chain -- Chapter 2: The Vulnerability Landscape -- Chapter 3: Threat...

3
Published 2014
Springer International Publishing
Table of Contents: ... security -- Web application security -- Wireless security -- Vulnerability analysis...

4
Published 2019
Springer International Publishing
Table of Contents: ... -- Vulnerability and Malware Detection...

5
Published 2016
Springer International Publishing
Table of Contents: ... Assessment of Infrastructure Vulnerability -- Quantifying Security in Web ETL Processes -- A Meta-Model...

6
by Chapple, Mike, Seidl, David
Published 2021
John Wiley & Sons, Inc.
Table of Contents: ...Kerberos Exploits 326 -- Exploiting Authorization Vulnerabilities 327 -- Insecure Direct Object...

7
Published 2020
Springer Nature Singapore
Table of Contents: ... Reentrancy Vulnerability Detection Method -- Identity authentication under Internet of everything based...

8
Published 2021
Springer International Publishing
Table of Contents: ... system based on Verifiable credentials -- Vulnerability Management -- A Performance Assessment of Free...

9
by Stewart, James Michael
Published 2009
Wiley Pub.
Table of Contents: ...2.7 Explain the vulnerabilities and implement mitigations associated with wireless...

10
Published 2021
Springer International Publishing
Table of Contents: ... on debiasing architectural decision-making - a pilot study.-Communicating Cybersecurity Vulnerability...

11
by Dalziel, Henry
Published 2015
Syngress
Table of Contents: ... and structures -- 1.22 -- Understanding an application -- Chapter 2 -- Exploitation -- 2.1 -- Bypassing client...

12
Published 2023
Springer Nature Switzerland
Table of Contents: ... -- Predicting Patterns of Firms’ Vulnerability to Economic Crises Using Open Data, Synthetic Minority...

13
Published 2017
Springer Berlin Heidelberg
Table of Contents: ... vulnerability of secret generation using hyper-distributions -- A Principled Approach to Tracking Information...

14
by Pompon, Raymond
Published 2016
Apress
Table of Contents: ... Controls. Chapter 14: Vulnerability Management. Chapter 15: People Controls. Chapter 16: Logical Access...

15
by Calder, Alan
Published 2023
IT Governance Ltd
Table of Contents: ...Chapter 25: Supply chain security -- Chapter 26: System security -- Chapter 27: Vulnerability...

16
by Eagle, Chris
Published 2008
No Starch Press
Table of Contents: .... 20. Compiler Variations -- Ch. 21. Obfuscated Code Analysis -- Ch. 22. Vulnerability Analysis -- Ch...

17
Published 2019
Springer International Publishing
...; security testing; vulnerability analysis and countermeasures; web applications and services...

18
Published 2007
Springer Berlin Heidelberg
Table of Contents: ... of a Dynamic-Reconfigurable Architecture for Protocol Stack -- Vulnerability Analysis in VGBPS Using...

19
by Glaser, J. D.
Published 2014
Auerbach Publications
Table of Contents: ... Authentication and SSL cURL; Chapter 21: Secure AJAX Shopping Cart; Chapter 22: Common Facebook Canvas...

20
Published 2020
Springer International Publishing
Table of Contents: ....-Understanding Older Adults’ Vulnerability and Reactions to Telecommunication Fraud: The Effects of Personality...