1
by Knapp, Eric D., Langill, Joel Thomas
Published 2015
Syngress
..., and the evolution to IEC62443, smart grid security; signature-based detection, exploit-based vs. vulnerability-based...

2
by Andress, Jason
Published 2014
Syngress
Table of Contents: ..., vulnerabilities, and risk; Threats; Vulnerabilities; Risk...

3
by Lionello, P.
Published 2012
Elsevier Science
Table of Contents: ... and Main Vulnerabilities; I.3 The Mediterranean Region; I.4 Paleoclimate Reconstruction; I.5 The Climate...

4
by Grimnes, Sverre, Martinsen, Ørian
Published 2014
Academic Press
Table of Contents: ... Vulnerable Electrode Technology; 7.14 Problems; Chapter 8 -- Instrumentation and Measurements; 8.1 General...

5
by Vacca, John R.
Published 2013
Morgan Kaufmann Publishers is an imprint of Elsevier
Table of Contents: ... Network Vulnerability Analysis -- 6.Summary -- Chapter Review Questions/Exercises -- Exercise...

6
by Bathurst, Robert
Published 2012
Syngress
... of the OS X environment and its vulnerabilities. Including but limited to; application porting...

7
Published 2015
Butterworth-Heinemann
... across Europe, with specific attention to the most vulnerable coastal environments such as deltas...