1
by Foreman, Park
Published 2010
Auerbach Publications

2
by Young, Carl S.
Published 2010
Syngress/Elsevier
Table of Contents: ... Component of Security Risk -- Chapter 5 -- Measuring the Vulnerability Component of Security Risk -- Chapter...

3
by Sutton, David
Published 2021
BCS, The Chartered Institute for IT
Table of Contents: .... The information risk management programme 4. Risk identification 5. Threat and vulnerability assessment 6. Risk...

4
by Pollner, John D.
Published 2012
World Bank
Table of Contents: ... -- Central and Eastern Europe catastrophe exposure and vulnerability -- Modeling for losses correlated...

5
by Seaman, Jim, Gioia, Michael
Published 2023
CRC Press
Table of Contents: ... Vulnerability Management. </P></B><P>4.1 The First Aid analogy. 4.2 Introduction to Vulnerability Management...

6
by Freund, Jack, Jones, Jack
Published 2015
Butterworth-Heinemann
Table of Contents: ...; VULNERABILITY; THREAT CAPABILITY; DIFFICULTY; LOSS MAGNITUDE; PRIMARY LOSS MAGNITUDE; SECONDARY RISK; SECONDARY...

7
by Rohmeyer, Paul, Bayuk, Jennifer L.
Published 2019
Springer
Table of Contents: ...Chapter 1: What Are We Afraid Of? -- Chapter 2: Where Are We Vulnerable? -- Chapter 3: What Would a...

8
by Marsland, Thomas
Published 2024
Packt Publishing Ltd.
Table of Contents: ...Recognizing vulnerabilities -- Common vulnerabilities -- Vulnerability scanning tools -- NIST...

9
by Crossley, Cassie
Published 2024
O'Reilly Media, Inc.
... software cybersecurity vulnerability can stop entire companies from doing business and cause billions...

10
by Sutton, David
Published 2014
BCS
Table of Contents: ... assessments; 5 threat and vulnerability assessment; conducting threat assessments; conducting vulnerability...

11
by Russell, David L.
Published 2015
John Wiley & Sons
Table of Contents: ...Countermeasures for VulnerabilitiesSample Threat Scenario NO. 1 (Fig. 1.6); Sample Threat Scenario...

12 ... assessment, such as plant layout, substance hazards, and equipment vulnerability. The final section...

13
by Smith, Eric N.
Published 2014
Butterworth-Heinemann
Table of Contents: ... -- Building Skills with Basics: Learning to Identify Threats -- Playing with Blocks: Vulnerabilities...

14
by Planchette, Guy
Published 2021
ISTE Ltd.
Table of Contents: ... of the Work of IMdR-AFPCN: "Vulnerability of Networks and Natural Disasters" -- The New Cindynics Concepts...

15
by Brumfield, Cynthia, Haugli, Brian
Published 2022
John Wiley & Sons, Inc.
Table of Contents: ... through Software Code Inspection and Vulnerability Assessments 65 --...

16
by Jaquith, Andrew
Published 2007
Addison-Wesley

18
by Kang, Meng-Chow
Published 2014
CRC Press/Taylor & Francis
..."Technology and business change along with information flows, vulnerabilities, exposures, and risks...

19
by Munson, Chuck
Published 2013
Pearson
... refocused executive management on the issue of reducing supply vulnerabilities. It reviews Jacket's fluid...

20
by Johnson, Leighton
Published 2016
Syngress is an imprint of Elsevier
... and systems. If a system is subject to external or internal threats and vulnerabilities--which most...