Toggle navigation
Campus Access
About MPG.eBooks
Skip to content
Search Tips
Home
>
Search: "Vulnerability"
Language
English
Deutsch
Español
Français
Italiano
日本語
Nederlands
Português
Português (Brasil)
中文(简体)
中文(繁體)
Türkçe
עברית
Gaeilge
Cymraeg
Ελληνικά
Català
Euskara
Русский
Čeština
Suomi
Svenska
polski
Dansk
slovenščina
اللغة العربية
বাংলা
Galego
Tiếng Việt
Hrvatski
हिंदी
All Fields
Title
Person
Topic
ISBN/ISSN
Year
Collection
Advanced
Retain my current filters
dewey-ones:"331 - Labor economics"
dewey-ones:"384 - Communications; telecommunication"
language:"English"
Showing
1
-
20
of
32
Search:
'"Vulnerability"'
,
query time: 0.07s
Book List
0
Sort:
Relevance
Year Descending
Year Ascending
Author
Title
Read Now
1
Nessus network auditing
by
Rogers, Russ
Published 2008
Syngress
Table of Contents:
“
...Ch. 1.
Vulnerability
Assessment -- Ch. 2. Introducing Nessus -- Ch. 3. Installing Nessus -- Ch. 4...
”
Call Number:
TK5105.5
Read Now
2
Mobile malware attacks and defense
by
Dunham, Ken
Published 2009
Syngress Pub.
Table of Contents:
“
..., and vishing -- Operating system and device
vulnerabilities
-- Analyzing mobile malware -- Forensic analysis...
”
Call Number:
TK5102.85
Read Now
3
CompTIA PenTest+ Certification All-In-One Exam Guide, Second Edition (Exam PT0-002)
by
Linn, Heather
,
Nutting, Ray
Published 2022
McGraw-Hill Education
Table of Contents:
“
... -- Chapter 2 Information Gathering and
Vulnerability
Scanning -- Passive Reconnaissance -- Active...
”
Call Number:
QA76.9.A25
Read Now
4
Mastering Linux security and hardening : secure your Linux server and protect it from intruders, malware attacks, and other external threats
by
Tevault, Donald A.
Published 2018
Packt Publishing
Table of Contents:
“
... -- Scanning, auditing, and hardening --
Vulnerability
scanning and intrusion detection -- Security tips...
”
Call Number:
QA76.9.A25
Read Now
5
Cybersecurity of industrial systems
by
Flaus, Jean-Marie
Published 2019
ISTE
Table of Contents:
“
... Control System; 3. IT Security; 4. Threats and Attacks to ICS; 5.
Vulnerabilities
of ICS; 6. Standards...
”
Call Number:
TK5105.59
Read Now
6
Mastering Metasploit : take your penetration testing and IT security skills to a whole new level with the secrets of Metasploit
by
Jaswal, Nipun
Published 2018
Packt Publishing
Table of Contents:
“
... -- Preinteractions -- Intelligence gathering/reconnaissance phase -- Threat modeling --
Vulnerability
analysis...
”
Call Number:
QA76.9.A25
Read Now
7
PCI compliance : understand and implement effective PCI data security standard compliance
by
Chuvakin, Anton
Published 2010
Syngress
Table of Contents:
“
... -- Chapter 7: Using Wireless Networking -- Chapter 8:
Vulnerability
Management -- Chapter 9: Logging Events...
”
Call Number:
QA76.9.A25
Read Now
8
The official (ISC)2 guide to the SSCP CBK
Published 2016
Sybex
Table of Contents:
“
...; Designing a Security Architecture; Secure Development and Acquisition Lifecycles; System
Vulnerabilities
...
”
Call Number:
QA76.3
Read Now
9
Mac OS X security
by
Potter, Bruce
Published 2003
New Riders
“
... interoperability with other systems. Along with that increased power comes increased security
vulnerability
. Part I...
”
Call Number:
QA76.76.O63
Read Now
10
The sustainable network : the accidental answer for a troubled planet
by
Sorensen, Sarah
Published 2010
O'Reilly Media
Table of Contents:
“
... -- Network defenses depend on how traffic is sent -- I am on the net, therefore I am
vulnerable
-- Antisocial...
”
Call Number:
TK5105.5
Read Now
11
LAN switch security : what hackers know about your switches
by
Vyncke, Eric
Published 2007
Cisco Press
Table of Contents:
“
...pt. I.
Vulnerabilities
and mitigation techniques -- Ch. 1. Introduction to security -- Ch. 2...
”
Call Number:
TK5105.7
Read Now
12
Computer networking : Internet protocols in action
by
Matthews, Jeanna
Published 2005
Wiley
Table of Contents:
“
.... Encryption -- Exercise 6.2. IP spoofing and TCP session stealing -- Exercise 6.3. System
vulnerabilities
...
”
Call Number:
TK5105.5
Read Now
13
Using the common criteria for IT security evaluation
by
Herrmann, Debra S.
Published 2003
Auerbach Publications
Table of Contents:
“
...
Vulnerability
Analysis and Penetration Testing<BR>Services Contracts<BR>Schedules for New CC...
”
Call Number:
TK5102.85
Read Now
14
Hands-on security in DevOps : ensure continuous security, deployment, and delivery with DevSecOps
by
Hsu, Tony
Published 2018
Packt Publishing
Table of Contents:
“
...; Release gate examples; Common
Vulnerability
Scoring System (CVSS); Security requirements for web...
”
Call Number:
HD30.2
Read Now
15
ISC2 CISSP Certified Information Systems Security Professional Official Study Guide
by
Chapple, Mike
,
Stewart, James Michael
,
Gibson, Darril
Published 2024
John Wiley & Sons, Inc.
Table of Contents:
“
... Concepts -- Risk Terminology and Concepts -- Asset Valuation -- Identify Threats and
Vulnerabilities
...
”
Call Number:
QA76.3
Read Now
16
Gray hat hacking : the ethical hacker's handbook
by
Regalado, Daniel
Published 2015
McGraw-Hill Education
Table of Contents:
“
... --
Vulnerability
Disclosure -- Different Teams and Points of View...
”
Call Number:
QA76.9.A25
Read Now
17
CCSP (ISC)2 CERTIFIED CLOUD SECURITY PROFESSIONAL EXAM GUIDE : build your knowledge to pass the CCSP exam with expert guidance
by
Turner, Omar A.
,
Lakshmana, Navya
Published 2024
Packt Publishing Ltd.
Table of Contents:
“
... Methods -- Tools and Frameworks for Cloud Risk Assessments -- Cloud Attack Surface Area,
Vulnerabilities
...
”
Call Number:
QA76.585
Read Now
18
Mike Meyers' CompTIA Network+ guide to managing and troubleshooting networks : (Exam N10-008)
by
Meyers, Mike
,
Jernigan, Scott
Published 2022
McGraw-Hill
Table of Contents:
“
... Concepts -- Network Threats -- Common
Vulnerabilities
-- Hardening Your Network -- Firewalls -- Chapter 19...
”
Call Number:
TK5105.5
Read Now
19
Smart and sustainable approaches for optimizing performance of wireless networks : real-time applications
Published 2022
John Wiley & Sons, Inc.
Table of Contents:
“
... -- 10.1.1 Security Challenge in Networks -- 10.1.2 Attacks
Vulnerability
in Complex Networks -- 10.2...
”
Call Number:
TK5105.5956
Read Now
20
IPTV delivery networks : next generation architectures for live and video-on-demand services
Published 2018
John Wiley & Sons, Inc.
Table of Contents:
“
...
Vulnerabilities
214 -- 8.3.1.1 IGMP 215 -- 8.3.1.2 PIM 215 -- 8.3.1.3 MBGP 216 -- 8.3.1.4 MSDP 217 -- 8.3.1.5 RTP...
”
Call Number:
TK5105.887
1
2
Back
Narrow Search
Remove Filters
Clear Filter
Classification: 331 - Labor economics
Clear Filter
Classification: 384 - Communications; telecommunication
Clear Filter
Language: English
Year of Publication
From:
To:
Classification
331 - Labor economics
384 - Communications; telecommunication
005 - Computer programming, programs & data
18
374 - Adult education
10
004 - Data processing & computer science
9
620 - Engineering & allied operations
6
more ...
500 - Natural sciences & mathematics
4
364 - Criminology
2
621 - Applied physics
2
658 - General management
2
000 - Computer science, information & general works
1
001 - Knowledge
1
158 - Applied psychology
1
300 - Social sciences
1
304 - Factors affecting social behavior
1
330 - Economics
1
338 - Production
1
380 - Commerce, communications & transportation
1
650 - Management & auxiliary services
1
see all ...
less ...
Language
English
Collection
O'Reilly
32
Author
Harwood, Mike
2
Total Seminars LLC
2
Abu-Nimeh, Saeed
1
Ahad, Mohd Abdul
1
Ali, Syed Imran
1
Azad, Saiful
1
more ...
Benjamin, Henry
1
Bergman, Neil
1
Carey, Mark S.
1
Chapple, Mike
1
Chuvakin, Anton
1
Clark, Champ
1
Clark, Chris
1
Criscuolo, Paul
1
Duncan, Christopher
1
Dunham, Ken
1
Dwivedi, Himanshu
1
Fati, Suliman Mohamed
1
Flaus, Jean-Marie
1
Gibson, Darril
1
Gordon, Adam
1
Hernandez, Steven
1
Herrmann, Debra S.
1
Hsu, Tony
1
Jaswal, Nipun
1
Jernigan, Scott
1
Khan, Shafiullah
1
Kouns, Jake
1
Lakshmana, Navya
1
Linn, Heather
1
Lloret Mauri, Jaime
1
Matthews, Jeanna
1
Mehta, Deepa
1
Meyers, Mike
1
Minoli, Daniel
1
Norvell, Preston
1
Nutting, Ray
1
Paggen, Christopher
1
Pathan, Al-Sakib Khan
1
Petruzzi, Mike
1
Potter, Bruce
1
Regalado, Daniel
1
Rogers, Russ
1
Rouse, Jason
1
Scambray, Joel
1
Sorensen, Sarah
1
Spangenberg, Ward
1
Stanfield, Mike
1
Stewart, James Michael
1
Sullivan, Chad
1
Tevault, Donald A.
1
Thiel, David V.
1
Turner, Omar A.
1
Vyncke, Eric
1
Williams, Branden R.
1
Wotring, Brian
1
Zafar, Sherin
1
see all ...
less ...
Recently Uploaded
Last Month
1
Search Tools
Get RSS Feed
Share Search
https://ebooks.mpdl.mpg.de/ebooks/Search/Results?filter%5B%5D=dewey-ones%3A%22331+-+Labor+economics%22&filter%5B%5D=dewey-ones%3A%22384+-+Communications%3B+telecommunication%22&filter%5B%5D=language%3A%22English%22&lookfor=%22Vulnerability%22&type=AllFields
Send by Email
×
Loading...