Toggle navigation
Campus Access
About MPG.eBooks
Skip to content
Search Tips
Home
>
Search: %22Vulnerability%22
Language
English
Deutsch
Español
Français
Italiano
日本語
Nederlands
Português
Português (Brasil)
中文(简体)
中文(繁體)
Türkçe
עברית
Gaeilge
Cymraeg
Ελληνικά
Català
Euskara
Русский
Čeština
Suomi
Svenska
polski
Dansk
slovenščina
اللغة العربية
বাংলা
Galego
Tiếng Việt
Hrvatski
हिंदी
All Fields
Title
Person
Topic
ISBN/ISSN
Year
Collection
Advanced
Retain my current filters
dewey-ones:"005 - Computer programming, programs & data"
Showing
1
-
20
of
88
Search:
'%22Vulnerability%22'
,
query time: 0.22s
Book List
0
Sort:
Relevance
Year Descending
Year Ascending
Author
Title
Read Now
1
The best damn IT security management book period
by
Susan Snedaker
Published 2007
Syngress
Table of Contents:
“
...pt. 1. From
Vulnerability
to Patch -- Ch. 1. Windows of
Vulnerability
-- Ch. 2.
Vulnerability
...
”
Call Number:
QA76.9.A25
Read Now
2
Asset Attack Vectors : Building Effective Vulnerability Management Strategies to Protect Organizations
by
Haber, Morey J.
,
Hibbert, Brad
Published 2018
Apress
Table of Contents:
“
...Chapter 1: The Attack Chain -- Chapter 2: The
Vulnerability
Landscape -- Chapter 3: Threat...
”
Read Now
3
Research in Attacks, Intrusions and Defenses : 17th International Symposium, RAID 2014, Gothenburg, Sweden, September 17-19, 2014, Proceedings
Published 2014
Springer International Publishing
Table of Contents:
“
... security -- Web application security -- Wireless security --
Vulnerability
analysis...
”
Read Now
4
Information and Operational Technology Security Systems : First International Workshop, IOSec 2018, CIPSEC Project, Heraklion, Crete, Greece, September 13, 2018, Revised Selected P...
Published 2019
Springer International Publishing
Table of Contents:
“
... --
Vulnerability
and Malware Detection...
”
Read Now
5
Risks and Security of Internet and Systems : 10th International Conference, CRiSIS 2015, Mytilene, Lesbos Island, Greece, July 20-22, 2015, Revised Selected Papers
Published 2016
Springer International Publishing
Table of Contents:
“
... Assessment of Infrastructure
Vulnerability
-- Quantifying Security in Web ETL Processes -- A Meta-Model...
”
Read Now
6
CompTIA PenTest+ study guide : exam PT0-002
by
Chapple, Mike
,
Seidl, David
Published 2021
John Wiley & Sons, Inc.
Table of Contents:
“
...Kerberos Exploits 326 -- Exploiting Authorization
Vulnerabilities
327 -- Insecure Direct Object...
”
Call Number:
QA76.9.A25
Read Now
7
Trusted Computing and Information Security : 13th Chinese Conference, CTCIS 2019, Shanghai, China, October 24–27, 2019, Revised Selected Papers
Published 2020
Springer Nature Singapore
Table of Contents:
“
... Reentrancy
Vulnerability
Detection Method -- Identity authentication under Internet of everything based...
”
Read Now
8
ICT Systems Security and Privacy Protection : 36th IFIP TC 11 International Conference, SEC 2021, Oslo, Norway, June 22–24, 2021, Proceedings
Published 2021
Springer International Publishing
Table of Contents:
“
... system based on Verifiable credentials --
Vulnerability
Management -- A Performance Assessment of Free...
”
Read Now
9
CompTIA security+ review guide
by
Stewart, James Michael
Published 2009
Wiley Pub.
Table of Contents:
“
...2.7 Explain the
vulnerabilities
and implement mitigations associated with wireless...
”
Call Number:
QA76.3
Read Now
10
Product-Focused Software Process Improvement : 22nd International Conference, PROFES 2021, Turin, Italy, November 26, 2021, Proceedings
Published 2021
Springer International Publishing
Table of Contents:
“
... on debiasing architectural decision-making - a pilot study.-Communicating Cybersecurity
Vulnerability
...
”
Read Now
11
How to attack and defend your website
by
Dalziel, Henry
Published 2015
Syngress
Table of Contents:
“
... and structures -- 1.
22
-- Understanding an application -- Chapter 2 -- Exploitation -- 2.1 -- Bypassing client...
”
Call Number:
QA76.9.A25
Read Now
12
Perspectives in Business Informatics Research : 22nd International Conference on Business Informatics Research, BIR 2023, Ascoli Piceno, Italy, September 13–15, 2023, Proceedings
Published 2023
Springer Nature Switzerland
Table of Contents:
“
... -- Predicting Patterns of Firms’
Vulnerability
to Economic Crises Using Open Data, Synthetic Minority...
”
Read Now
13
Principles of Security and Trust : 6th International Conference, POST 2017, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2017, Uppsala,...
Published 2017
Springer Berlin Heidelberg
Table of Contents:
“
...
vulnerability
of secret generation using hyper-distributions -- A Principled Approach to Tracking Information...
”
Read Now
14
IT Security Risk Control Management : An Audit Preparation Plan
by
Pompon, Raymond
Published 2016
Apress
Table of Contents:
“
... Controls. Chapter 14:
Vulnerability
Management. Chapter 15: People Controls. Chapter 16: Logical Access...
”
Read Now
15
Cyber Resilience : Defence-In-depth Principles
by
Calder, Alan
Published 2023
IT Governance Ltd
Table of Contents:
“
...Chapter 25: Supply chain security -- Chapter 26: System security -- Chapter 27:
Vulnerability
...
”
Call Number:
QA76.9.A25
Read Now
16
The IDA pro book : the unofficial guide to the world's most popular disassembler
by
Eagle, Chris
Published 2008
No Starch Press
Table of Contents:
“
.... 20. Compiler Variations -- Ch. 21. Obfuscated Code Analysis -- Ch.
22
.
Vulnerability
Analysis -- Ch...
”
Call Number:
QA76.76.D57
Read Now
17
Information Systems Security and Privacy : 4th International Conference, ICISSP 2018, Funchal - Madeira, Portugal, January 22-24, 2018, Revised Selected Papers
Published 2019
Springer International Publishing
“
...; security testing;
vulnerability
analysis and countermeasures; web applications and services...
”
Read Now
18
International Symposium on Fundamentals of Software Engineering : International Symposium, FSEN 2007, Tehran, Iran, April 17-19, 2007, Proceedings
Published 2007
Springer Berlin Heidelberg
Table of Contents:
“
... of a Dynamic-Reconfigurable Architecture for Protocol Stack --
Vulnerability
Analysis in VGBPS Using...
”
Read Now
19
Secure development for mobile apps : how to design and code secure mobile applications with PHP and JavaScript
by
Glaser, J. D.
Published 2014
Auerbach Publications
Table of Contents:
“
... Authentication and SSL cURL; Chapter 21: Secure AJAX Shopping Cart; Chapter
22
: Common Facebook Canvas...
”
Call Number:
QA76.9.A25
Read Now
20
Human Aspects of IT for the Aged Population. Technology and Society : 6th International Conference, ITAP 2020, Held as Part of the 22nd HCI International Conference, HCII 2020, Cop...
Published 2020
Springer International Publishing
Table of Contents:
“
....-Understanding Older Adults’
Vulnerability
and Reactions to Telecommunication Fraud: The Effects of Personality...
”
1
2
3
4
5
Back
Narrow Search
Remove Filters
Clear Filter
Classification: 005 - Computer programming, programs & data
Year of Publication
From:
To:
Classification
005 - Computer programming, programs & data
331 - Labor economics
16
374 - Adult education
8
658 - General management
7
500 - Natural sciences & mathematics
5
004 - Data processing & computer science
4
more ...
330 - Economics
4
620 - Engineering & allied operations
4
384 - Communications; telecommunication
3
338 - Production
2
003 - Systems
1
364 - Criminology
1
368 - Insurance
1
745 - Decorative arts
1
see all ...
less ...
Language
English
85
German
2
Undetermined
1
Collection
Springer eBooks 2005-
49
O'Reilly
32
Springer Book Archives -2004
6
Elsevier ScienceDirect eBooks
1
Author
Dolev, Shlomi
3
Haber, Morey J.
3
Hibbert, Brad
3
Calder, Alan
2
Chapple, Mike
2
Christianson, Bruce
2
more ...
Lambrinoudakis, Costas
2
Li, Keqiu
2
Matyáš, Vashek
2
Ryan, Mark
2
Stewart, James Michael
2
Tari, Zahir
2
Wu, Hongyi
2
Yung, Moti
2
Zhang, Yudi
2
ACI Learning
1
Amberg, Eric
1
Anderson, Jonathan
1
Arbab, Farhad
1
Ardito, Luca
1
Armknecht, Frederik
1
Aslan, Heba K.
1
Au, Man Ho
1
Ayala, Luis
1
Batina, Lejla
1
Berman, Jules J.
1
Boose, Cherokee
1
Bos, Herbert
1
Boyd, Colin
1
Brumfield, Cynthia
1
Camp, Olivier
1
Chen, Liqun
1
Chen, Xiaofeng
1
Cobb, Jorge
1
Coburn, Andrew
1
Coffin, David
1
Conklin, Wm. Arthur
1
Cothren, Chuck
1
Cruz-Cunha, Maria Manuela
1
Cunningham, Bryan
1
Cuppens, Frederic
1
Cuppens, Frédéric
1
Cuppens, Nora
1
Dalziel, Henry
1
Daswani, Neil
1
Davis, Roger
1
De Decker, Bart
1
Deswarte, Yves
1
Dinur, Itai
1
Dittmann, Jana
1
Dunkerley, Dawn
1
Eagle, Chris
1
El-Hadidi, Mahmoud T.
1
Enbody, Richard J.
1
Fischer, Michael
1
Flusser, Jan
1
Foresti, Sara
1
Fournaris, Apostolos P.
1
Friedewald, Michael
1
Furnell, Steven
1
Futcher, Lynn
1
Gabillon, Alban
1
Gallagher, Tom
1
Gao, Qin
1
Ghonaimy, M. Adeeb
1
Ghosh, R.K.
1
Gibson, Darril
1
Glaser, J. D.
1
Gordon, Adam
1
Gritzalis, Dimitris
1
Guo, Fuchun
1
Gupta, P. K.
1
Hagen, Janne
1
Halpert, Ben
1
Han, Weili
1
Haugli, Brian
1
Hinkelmann, Knut
1
Jajodia, Sushil
1
Jedlitschka, Andreas
1
Jeffries, Bryan
1
Jøsang, Audun
1
Katsikas, Sokratis K.
1
Kern, Christoph
1
Kesavan, Anita
1
Ko, Ryan
1
Krenn, Stephan
1
Krömker, Heidi
1
Lampropoulos, Konstantinos
1
Landauer, Lawrence
1
Lee, Martin
1
Leverett, Eireann
1
Li, Zengpeng
1
Lievens, Eva
1
Lim, Chae Hoon
1
Lin, Jingqiang
1
Lincke, Susan
1
Linkov, Igor
1
Linthicum, Steven W.
1
Livraga, Giovanni
1
Lodha, Sachin
1
see all ...
less ...
Search Tools
Get RSS Feed
Share Search
https://ebooks.mpdl.mpg.de/ebooks/Search/Results?filter%5B%5D=dewey-ones%3A%22005+-+Computer+programming%2C+programs+%26+data%22&lookfor=%2522Vulnerability%2522&type=AllFields
Send by Email
×
Loading...