1
by Mesly, Olivier
Published 2017
CRC Press
Table of Contents: ...2.6 The parametric frame2.6.1 Points of vulnerability and the parametric frame; 2.7 Frame of key...

2
Published 2022
Springer International Publishing
Table of Contents: ... Process -- Software Vulnerability Analysis...

3
by Knapp, Eric D., Langill, Joel Thomas
Published 2015
Syngress
Table of Contents: ... -- Attack Trends -- Evolving Vulnerabilities: The Adobe Exploits -- Industrial Application Layer Attacks...

4
by Freund, Jack, Jones, Jack
Published 2015
Butterworth-Heinemann
Table of Contents: ...; VULNERABILITY; THREAT CAPABILITY; DIFFICULTY; LOSS MAGNITUDE; PRIMARY LOSS MAGNITUDE; SECONDARY RISK; SECONDARY...

5
by Dolan, Gabrielle
Published 2015
John Wiley and Sons Australia, Ltd
Table of Contents: ...Strength in vulnerabilityMyth 1: Vulnerability is a weakness; Myth 2: Vulnerability is letting...

6
by Viira, Toomas
Published 2018
IT Governance Publishing
Table of Contents: ...Chapter 9: Focusing and prioritisationPart 3: Threats, vulnerabilities, risks, impacts; Chapter 10...

7
by Knapp, Eric D., Langill, Joel Thomas
Published 2015
Syngress
..., and the evolution to IEC62443, smart grid security; signature-based detection, exploit-based vs. vulnerability-based...

8
by Knapp, Eric
Published 2011
Syngress
Table of Contents: ... Chapter 6: Vulnerability and Risk Assessment Chapter 7: Establishing Secure Enclaves Chapter 8: Exception...

9
by Sutton, David
Published 2014
BCS
Table of Contents: ... assessments; 5 threat and vulnerability assessment; conducting threat assessments; conducting vulnerability...

10
by Dalziel, Henry
Published 2015
Elsevier
... readers how to dentify systemic security issues based on the analysis of vulnerability and configuration...

11
Published 2024
Springer International Publishing
Table of Contents: ... - Consumer’s vulnerabilities and potential dignity risks in the context of digital transformation processes...

12
by Christensen, Mary
Published 2016
AMACOM--American Management Association
Table of Contents: ... the benefits of coaching without sapping your time -- How to guide your vulnerable rookies -- Chief cheerleader...

13
by Trier, Thomas A.
Published 2015
CRC Press
Table of Contents: ...Chapter 14: VulnerabilitiesChapter 15: Planning and Resources; Chapter 16: Conduct an Intelligence...

14
by Collins, David
Published 2018
Routledge
Table of Contents: ... in my stories?; 5 Are my tales bland?; 6 Is my storytelling overly vulnerable to revision...

15
by Thomas, Stephanie R.
Published 2013
Apress

16
by Anderson, Gretchen
Published 2019
O'Reilly Media
Table of Contents: ...Try It, You'll Like ItBuilding Trust Through Vulnerability; Leading Teams Toward Trust; Protect...

17
by Garner, Janine
Published 2015
John Wiley and Sons Australia
Table of Contents: ... -- Full disclosure; Vulnerability is a strength; Tell your story; Involve others in the decision-making...

18
by Harrington, Andy
Published 2015
Capstone
Table of Contents: ... should I listen to you?; Chapter 4: Proving Credibility with a Personal Story; Vulnerability is a...

19
by George, Bill
Published 2015
Wiley
Table of Contents: ...: Journey to Self-Awareness; Peeling Back the Onion; Vulnerability Is Power; Reflection and Introspection...

20
by McCauley, Alison
Published 2019
O'Reilly Media
Table of Contents: ... Broad Range of Industries Are Vulnerable; Implications: A New Balance of Power; Death by Blockchains...