1
by Peltier, Thomas R.
Published 2003
Auerbach Publications
Table of Contents: ...Introduction -- Project scoping -- Assessing current network concerns -- Network vulnerability...

2
by Fjetland, Kirsten Jæger
Published 2022
Scandinavian University Press (Universitetsforlaget)
..., chronic conditions and dementia in vulnerable situations. How are they recognized as citizens with rights...

3
Published 2022
Palgrave Macmillan
Table of Contents: ... AND WOMEN IN SITUATIONS OF VULNERABILITY IN AFRICA -- 10. Chapter Ten: The invisible woman: Limits...

5
by Tella, José
Published 2022
MDPI - Multidisciplinary Digital Publishing Institute
Subjects: ...vulnerable taxa...

6
by Knaddison, Greg James
Published 2009
Wiley Pub.
Table of Contents: ...pt. I. Anatomy of Vulnerabilities -- Ch. 1. That Horrible Sinking Feeling -- Ch. 2. Security...

7
by Barnett, Ryan C.
Published 2013
Wiley Pub., Inc.
Table of Contents: ... AuditConsole; Recipe 1-8: Ignoring Requests for Static Content; Chapter 2: Vulnerability Identification...

8
by Muniz, Joseph, Lakhani, Aamir
Published 2021
Addison-Wesley Professional
... modeling, vulnerability assessment, incident response, investigation, forensics, and compliance People...

9
by Abiuso, Federico Luis
Published 2023
Palgrave Macmillan
Table of Contents: ... Mean streets -- 6 Violence -- 7 Change of attitudes -- 8 The role of politics -- 9 Vulnerability...

10
by Shannon, Ian
Published 2022
Palgrave Macmillan
Table of Contents: ... and Motivations -- 4 Protecting People, Particularly the Most Vulnerable -- 5 Policing by Consent -- 6 Law...

11
by Oriyano, Sean-Philip
Published 2017
Sybex
Table of Contents: ... Scanning -- Identifying an Operating System -- Scanning for Vulnerabilities -- Using Proxies (Or Keeping...

12
by Ablon, Lillian, Libicki, Martin C., Abler, Andrea M.
Published 2014
RAND Corporation
Table of Contents: ... and botnets -- Zero-day vulnerabilities in the black and gray markets -- Are hacker black markets mature...

13
by Dunham, Ken
Published 2009
Syngress Pub.
Table of Contents: ..., and vishing -- Operating system and device vulnerabilities -- Analyzing mobile malware -- Forensic analysis...

14
by Murray, Conor
Published 2023
Palgrave Macmillan
Table of Contents: ..., Signals and Masculinities -- Chapter 8: Vulnerable young men -- Chapter 9: Conclusion...

15
Published 2024
Palgrave Macmillan
Table of Contents: ...-offender overlap in prisons -- 5 Vulnerability and victimhood in prison -- 6 Independent monitoring...

16
by Grace, Jamie
Published 2022
Springer International Publishing
Table of Contents: ...Chapter 1. Introduction -- Chapter 2. Victim vulnerability, risk prediction and victim blaming...

17
by McLachlan, Katherine J.
Published 2024
Palgrave Macmillan
Table of Contents: ... sentencing of other vulnerable populations -- Chapter 9: Implications for practice and future directions...

18
by Aslaner, Milad
Published 2024
Packt Publishing, Limited
Table of Contents: ... weaknesses and vulnerabilities -- Types of organizational weaknesses -- Types of organizational...

19
by Sutton, David
Published 2022
BCS, The Chartered Institute for IT
Table of Contents: ...Preface1. Introduction 2. The big issues 3. Cyber targets 4. Cyber vulnerabilities and impacts5...

20
by Kipper, Gregory
Published 2007
Auerbach Publications
Table of Contents: ..., Vulnerabilities, and Security; Chapter 3. Wireless Crime Fighting; Chapter 4. Digital Forensic Principles...