Toggle navigation
Campus Access
About MPG.eBooks
Skip to content
Search Tips
Home
>
Search: "Vulnerability"
Language
English
Deutsch
Español
Français
Italiano
日本語
Nederlands
Português
Português (Brasil)
中文(简体)
中文(繁體)
Türkçe
עברית
Gaeilge
Cymraeg
Ελληνικά
Català
Euskara
Русский
Čeština
Suomi
Svenska
polski
Dansk
slovenščina
اللغة العربية
বাংলা
Galego
Tiếng Việt
Hrvatski
हिंदी
All Fields
Title
Person
Topic
ISBN/ISSN
Year
Collection
Advanced
Retain my current filters
dewey-ones:"384 - Communications; telecommunication"
language:"English"
Showing
1
-
20
of
57
Search:
'"Vulnerability"'
,
query time: 0.11s
Book List
0
Sort:
Relevance
Year Descending
Year Ascending
Author
Title
Read Now
1
Nessus network auditing
by
Rogers, Russ
Published 2008
Syngress
Table of Contents:
“
...Ch. 1.
Vulnerability
Assessment -- Ch. 2. Introducing Nessus -- Ch. 3. Installing Nessus -- Ch. 4...
”
Call Number:
TK5105.5
Read Now
2
Mobile malware attacks and defense
by
Dunham, Ken
Published 2009
Syngress Pub.
Table of Contents:
“
..., and vishing -- Operating system and device
vulnerabilities
-- Analyzing mobile malware -- Forensic analysis...
”
Call Number:
TK5102.85
Read Now
3
CompTIA PenTest+ Certification All-In-One Exam Guide, Second Edition (Exam PT0-002)
by
Linn, Heather
,
Nutting, Ray
Published 2022
McGraw-Hill Education
Table of Contents:
“
... -- Chapter 2 Information Gathering and
Vulnerability
Scanning -- Passive Reconnaissance -- Active...
”
Call Number:
QA76.9.A25
Read Now
4
Mastering Linux security and hardening : secure your Linux server and protect it from intruders, malware attacks, and other external threats
by
Tevault, Donald A.
Published 2018
Packt Publishing
Table of Contents:
“
... -- Scanning, auditing, and hardening --
Vulnerability
scanning and intrusion detection -- Security tips...
”
Call Number:
QA76.9.A25
Read Now
5
Ignite : real leadership, real talk, real results
by
Dolan, Gabrielle
Published 2015
John Wiley and Sons Australia, Ltd
Table of Contents:
“
...Strength in
vulnerability
Myth 1:
Vulnerability
is a weakness; Myth 2:
Vulnerability
is letting...
”
Call Number:
HD31
Read Now
6
Cybersecurity of industrial systems
by
Flaus, Jean-Marie
Published 2019
ISTE
Table of Contents:
“
... Control System; 3. IT Security; 4. Threats and Attacks to ICS; 5.
Vulnerabilities
of ICS; 6. Standards...
”
Call Number:
TK5105.59
Read Now
7
Communicate with courage : taking risks to overcome the four hidden challenges
by
Gladieux, Michelle D.
Published 2023
Berrett-Koehler Publishers, Inc.
Table of Contents:
“
...Introduction -- Strength in
Vulnerability
(Saying "Nobody's perfect", and Meaning It) -- Understand...
”
Call Number:
BF637.C45
Read Now
8
Wireless crime and forensic investigation
by
Kipper, Gregory
Published 2007
Auerbach Publications
Table of Contents:
“
...,
Vulnerabilities
, and Security; Chapter 3. Wireless Crime Fighting; Chapter 4. Digital Forensic Principles...
”
Call Number:
TK5103.2
Read Now
9
RFID security
by
Thornton, Frank
Published 2006
Syngress Pub.
Table of Contents:
“
... 12: The Four Disciplines -- Chapter 13:
Vulnerability
Management -- Chapter 14: Identity Management...
”
Call Number:
TK5105
Read Now
10
Communication the Cleveland Clinic way : how to drive a relationship-centered strategy for superior patient experience
Published 2016
McGraw-Hill Education
Table of Contents:
“
... professionalism -- The awesome power of
vulnerability
...
”
Call Number:
R727.3
Read Now
11
Mastering Metasploit : take your penetration testing and IT security skills to a whole new level with the secrets of Metasploit
by
Jaswal, Nipun
Published 2018
Packt Publishing
Table of Contents:
“
... -- Preinteractions -- Intelligence gathering/reconnaissance phase -- Threat modeling --
Vulnerability
analysis...
”
Call Number:
QA76.9.A25
Read Now
12
PCI compliance : understand and implement effective PCI data security standard compliance
by
Chuvakin, Anton
Published 2010
Syngress
Table of Contents:
“
... -- Chapter 7: Using Wireless Networking -- Chapter 8:
Vulnerability
Management -- Chapter 9: Logging Events...
”
Call Number:
QA76.9.A25
Read Now
13
The manager's guide to web application security : a concise guide to the weaker side of the web
by
Lepofsky, Ron
Published 2014
Apress, Distributed to the Book trade worldwide by Springer
“
... with those issues quickly and effectively. Often, security
vulnerabilities
are difficult to understand...
”
Call Number:
QA76.76.A65
Read Now
14
The official (ISC)2 guide to the SSCP CBK
Published 2016
Sybex
Table of Contents:
“
...; Designing a Security Architecture; Secure Development and Acquisition Lifecycles; System
Vulnerabilities
...
”
Call Number:
QA76.3
Read Now
15
Mac OS X security
by
Potter, Bruce
Published 2003
New Riders
“
... interoperability with other systems. Along with that increased power comes increased security
vulnerability
. Part I...
”
Call Number:
QA76.76.O63
Read Now
16
The sustainable network : the accidental answer for a troubled planet
by
Sorensen, Sarah
Published 2010
O'Reilly Media
Table of Contents:
“
... -- Network defenses depend on how traffic is sent -- I am on the net, therefore I am
vulnerable
-- Antisocial...
”
Call Number:
TK5105.5
Read Now
17
Secure development for mobile apps : how to design and code secure mobile applications with PHP and JavaScript
by
Glaser, J. D.
Published 2014
Auerbach Publications
Table of Contents:
“
...
Vulnerability
Points; Appendix; Back Cover...
”
Call Number:
QA76.9.A25
Read Now
18
LAN switch security : what hackers know about your switches
by
Vyncke, Eric
Published 2007
Cisco Press
Table of Contents:
“
...pt. I.
Vulnerabilities
and mitigation techniques -- Ch. 1. Introduction to security -- Ch. 2...
”
Call Number:
TK5105.7
Read Now
19
Computer networking : Internet protocols in action
by
Matthews, Jeanna
Published 2005
Wiley
Table of Contents:
“
.... Encryption -- Exercise 6.2. IP spoofing and TCP session stealing -- Exercise 6.3. System
vulnerabilities
...
”
Call Number:
TK5105.5
Read Now
20
Stories for management success : the power of talk in organizations
by
Collins, David
Published 2018
Routledge
Table of Contents:
“
... in my stories?; 5 Are my tales bland?; 6 Is my storytelling overly
vulnerable
to revision...
”
Call Number:
HD30.17
1
2
3
Back
Narrow Search
Remove Filters
Clear Filter
Classification: 384 - Communications; telecommunication
Clear Filter
Language: English
Year of Publication
From:
To:
Classification
384 - Communications; telecommunication
331 - Labor economics
31
005 - Computer programming, programs & data
26
500 - Natural sciences & mathematics
14
620 - Engineering & allied operations
14
658 - General management
12
more ...
380 - Commerce, communications & transportation
10
004 - Data processing & computer science
9
330 - Economics
9
374 - Adult education
9
302 - Social interaction
7
300 - Social sciences
5
364 - Criminology
3
621 - Applied physics
3
000 - Computer science, information & general works
2
153 - Mental processes & intelligence
2
338 - Production
2
670 - Manufacturing
2
001 - Knowledge
1
006 - Special computer methods
1
158 - Applied psychology
1
170 - Ethics
1
174 - Occupational ethics
1
304 - Factors affecting social behavior
1
342 - Constitutional & administrative law
1
352 - General considerations of public administration
1
363 - Other social problems & services
1
381 - Commerce
1
610 - Medicine & health
1
650 - Management & auxiliary services
1
659 - Advertising & public relations
1
see all ...
less ...
Language
English
Collection
O'Reilly
57
Author
Dolan, Gabrielle
2
Harwood, Mike
2
Total Seminars LLC
2
Abu-Nimeh, Saeed
1
Ahad, Mohd Abdul
1
Akila, M.
1
more ...
Ali, Syed Imran
1
Apps, Judy
1
Ayanoglu, Emrah
1
Aytaş, Yusuf
1
Azad, Saiful
1
Barnett, Ryan C.
1
Benjamin, Henry
1
Bergman, Neil
1
Bhargava, Hersh
1
Boissy, Adrienne
1
Brown, Karen A.
1
Calder, Alan
1
Carey, Mark S.
1
Castro-Leon, Enrique
1
Chapple, Mike
1
Chuvakin, Anton
1
Clark, Champ
1
Clark, Chris
1
Coffin, David
1
Collins, David
1
Criscuolo, Paul
1
Das, Anand M.
1
Davis, Joe
1
Dubrawsky, Ido
1
Duncan, Christopher
1
Dunham, Ken
1
Dwivedi, Himanshu
1
Egnal, Bart
1
Ettenson, Richard
1
Fati, Suliman Mohamed
1
Flaus, Jean-Marie
1
Gibson, Darril
1
Gilligan, Timothy
1
Gladieux, Michelle D.
1
Glaser, J. D.
1
Gordon, Adam
1
Gregory, Peter H.
1
Haines, Brad
1
Hernandez, Steven
1
Herrmann, Debra S.
1
Hill, Alison
1
Hill, Darren
1
Hsu, Tony
1
Hyer, Nancy Lea
1
Jaswal, Nipun
1
Jernigan, Scott
1
Khan, Shafiullah
1
Kipper, Gregory
1
Kouns, Jake
1
Lee, Mordecai
1
Lepofsky, Ron
1
Linn, Heather
1
Lloret Mauri, Jaime
1
Maheswar, R.
1
Malik, Ajay
1
Matthews, Jeanna
1
Mehta, Deepa
1
Meyers, Mike
1
Minoli, Daniel
1
Nahum, Dotan
1
Neeley, Grant
1
Noonan, Wesley J.
1
Norvell, Preston
1
Nutting, Ray
1
Paggen, Christopher
1
Pathan, Al-Sakib Khan
1
Petruzzi, Mike
1
Potter, Bruce
1
Rathee, Geetanjali
1
Regalado, Daniel
1
Richardson, Sean
1
Rogers, Russ
1
Rouse, Jason
1
Scambray, Joel
1
Sorensen, Sarah
1
Sountharrajan, S.
1
Spangenberg, Ward
1
Stanfield, Mike
1
Stewart, James Michael
1
Stewart, Kendra B.
1
Sullivan, Chad
1
Tevault, Donald A.
1
Thiel, David V.
1
Thornton, Frank
1
Vyncke, Eric
1
Williams, Branden R.
1
Wotring, Brian
1
Wrightson, Tyler
1
Yarali, Abdulrahman
1
Yeluri, Raghu
1
Zafar, Sherin
1
see all ...
less ...
Search Tools
Get RSS Feed
Share Search
https://ebooks.mpdl.mpg.de/ebooks/Search/Results?filter%5B%5D=dewey-ones%3A%22384+-+Communications%3B+telecommunication%22&filter%5B%5D=language%3A%22English%22&lookfor=%22Vulnerability%22&type=AllFields
Send by Email
×
Loading...