1
by Deza, Alfredo
Published 2024
Pragmatic AI Solutions
... your large language model (LLM) applications by addressing potential vulnerabilities. You will explore...

2
Published 2023
Routledge
...Qualitative Researcher Vulnerability provides conceptual, experiential, and practical insights...

3
by Rahalkar, Sagar
Published 2018
Packt Publishing
Table of Contents: ...Types of vulnerability assessmentTypes of vulnerability assessment based on the location; External...

4
by Battipaglia, Giovanna
Published 2020
Frontiers Media SA
Subjects: ...forest vulnerability...

5
by Mesly, Olivier
Published 2017
CRC Press
Table of Contents: ...2.6 The parametric frame2.6.1 Points of vulnerability and the parametric frame; 2.7 Frame of key...

6
by Li, Vickie
Published 2021
No Starch Press
..., the book then dives into how to prevent, exploit, and escalate specific vulnerabilities before concluding...

7
by Bathrellos, George D.
Published 2023
MDPI - Multidisciplinary Digital Publishing Institute
Subjects: ...social vulnerability...

8
by Creaco, Enrico
Published 2019
MDPI - Multidisciplinary Digital Publishing Institute
Subjects: ...vulnerability...

9
by Sidorov, Denis N.
Published 2020
MDPI - Multidisciplinary Digital Publishing Institute
Subjects: ...vulnerability...

10
by Ouillon, Sylvain
Published 2019
MDPI - Multidisciplinary Digital Publishing Institute
Subjects: ...delta vulnerability...

11
by Kenawy, Ahmed El
Published 2023
MDPI - Multidisciplinary Digital Publishing Institute
Subjects: ...groundwater vulnerability...

12
by Klevinsky, T. J.
Published 2002
Addison-Wesley
Table of Contents: ... -- The tool kit -- Automated vulnerability scanners -- Discovery tools -- Port scanners -- Sniffers...

13
by Evron, Gadi
Published 2007
Syngress Pub.
Table of Contents: ...Ch. 1. Introduction to Vulnerability Research -- Ch. 2. Fuzzing -- What's That? -- Ch. 3. Building...

14
by Bhattacharjee, Sravani
Published 2018
Packt Publishing
Table of Contents: ...; Interdependence of critical infrastructures; Industrial threats, vulnerabilities, and risk factors; Threats...

15
by Schneier, Bruce
Published 2015
John Wiley & Sons, Inc.
Table of Contents: ...: -- Vulnerabilities and the vulnerability landscape -- Threat modeling and risk assessment -- Security policies...

16
by Bryant, John Hope
Published 2009
Jossey-Bass
Table of Contents: ... -- Vulnerability is power -- Giving is getting -- Conclusion: good capitalism and love leadership...

17
by Baloch, Rafay
Published 2015
CRC Press
Table of Contents: ... and port scanning techniques -- Vulnerability assessment -- Network sniffing -- Remote exploitation...

18
by Easttom, Chuck
Published 2011
Pearson
Table of Contents: ... -- Encryption -- Computer security software -- Security policies -- Network scanning and vulnerability scanning...

19
by Miller, DeMond Shondell
Published 2011
CRC Press
... demonstrates ways to recognize and reduce regional infrastructure vulnerability by building secure networks...

20
by Lucas, Julie
Published 2004
Addison-Wesley
... vulnerability, at any time. The Effective Incident Response Team will guide readers through the critical...