1
by Mesly, Olivier
Published 2017
CRC Press
Table of Contents: ...2.6 The parametric frame2.6.1 Points of vulnerability and the parametric frame; 2.7 Frame of key...

2
Published 2022
Springer International Publishing
Table of Contents: ... Process -- Software Vulnerability Analysis...

3
by Knapp, Eric D., Langill, Joel Thomas
Published 2015
Syngress
Table of Contents: ... -- Attack Trends -- Evolving Vulnerabilities: The Adobe Exploits -- Industrial Application Layer Attacks...

4
by Freund, Jack, Jones, Jack
Published 2015
Butterworth-Heinemann
Table of Contents: ...; VULNERABILITY; THREAT CAPABILITY; DIFFICULTY; LOSS MAGNITUDE; PRIMARY LOSS MAGNITUDE; SECONDARY RISK; SECONDARY...

5
by Dolan, Gabrielle
Published 2015
John Wiley and Sons Australia, Ltd
Table of Contents: ...Strength in vulnerabilityMyth 1: Vulnerability is a weakness; Myth 2: Vulnerability is letting...

6
by Viira, Toomas
Published 2018
IT Governance Publishing
Table of Contents: ...Chapter 9: Focusing and prioritisationPart 3: Threats, vulnerabilities, risks, impacts; Chapter 10...

7
by Knapp, Eric D., Langill, Joel Thomas
Published 2015
Syngress
..., and the evolution to IEC62443, smart grid security; signature-based detection, exploit-based vs. vulnerability-based...

8
by Knapp, Eric
Published 2011
Syngress
Table of Contents: ... Chapter 6: Vulnerability and Risk Assessment Chapter 7: Establishing Secure Enclaves Chapter 8: Exception...

9
by Dalziel, Henry
Published 2015
Elsevier
... readers how to dentify systemic security issues based on the analysis of vulnerability and configuration...

10
Published 2024
Springer International Publishing
Table of Contents: ... - Consumer’s vulnerabilities and potential dignity risks in the context of digital transformation processes...

11
by Prokop, Darren
Published 2017
Butterworth-Heinemann is an imprint of Elsevier
Table of Contents: ... -- Counterfeiting -- Corruption and Maverick Buying -- NATURAL THREATS -- Weather Vulnerabilities -- Hazardous...

12
by Christensen, Mary
Published 2016
AMACOM--American Management Association
Table of Contents: ... the benefits of coaching without sapping your time -- How to guide your vulnerable rookies -- Chief cheerleader...

13
by Trier, Thomas A.
Published 2015
CRC Press
Table of Contents: ...Chapter 14: VulnerabilitiesChapter 15: Planning and Resources; Chapter 16: Conduct an Intelligence...

14
by Collins, David
Published 2018
Routledge
Table of Contents: ... in my stories?; 5 Are my tales bland?; 6 Is my storytelling overly vulnerable to revision...

15
by Thomas, Stephanie R.
Published 2013
Apress

16
by Anderson, Gretchen
Published 2019
O'Reilly Media
Table of Contents: ...Try It, You'll Like ItBuilding Trust Through Vulnerability; Leading Teams Toward Trust; Protect...

17
by Garner, Janine
Published 2015
John Wiley and Sons Australia
Table of Contents: ... -- Full disclosure; Vulnerability is a strength; Tell your story; Involve others in the decision-making...

18
by George, Bill
Published 2015
Wiley
Table of Contents: ...: Journey to Self-Awareness; Peeling Back the Onion; Vulnerability Is Power; Reflection and Introspection...

19
by Harrington, Andy
Published 2015
Capstone
Table of Contents: ... should I listen to you?; Chapter 4: Proving Credibility with a Personal Story; Vulnerability is a...

20
by McCauley, Alison
Published 2019
O'Reilly Media
Table of Contents: ... Broad Range of Industries Are Vulnerable; Implications: A New Balance of Power; Death by Blockchains...