Toggle navigation
Campus Access
About MPG.eBooks
Skip to content
Search Tips
Home
>
Search: "Vulnerability"
Language
English
Deutsch
Español
Français
Italiano
日本語
Nederlands
Português
Português (Brasil)
中文(简体)
中文(繁體)
Türkçe
עברית
Gaeilge
Cymraeg
Ελληνικά
Català
Euskara
Русский
Čeština
Suomi
Svenska
polski
Dansk
slovenščina
اللغة العربية
বাংলা
Galego
Tiếng Việt
Hrvatski
हिंदी
All Fields
Title
Person
Topic
ISBN/ISSN
Year
Collection
Advanced
Retain my current filters
language:"English"
product_txtF_mv:"O'Reilly"
Showing
1
-
20
of
972
Search:
'"Vulnerability"'
,
query time: 0.05s
Book List
0
Sort:
Relevance
Year Descending
Year Ascending
Author
Title
Read Now
1
Mapping
Vulnerability
by
Bankoff, Greg
,
Frerks, Georg
Published 2013
Routledge
Table of Contents:
“
...Chapter 11: Macro-economic Concepts of
Vulnerability
: Dynamics, Complexity and Public PolicyChapter...
”
Call Number:
HV553
Read Now
2
If it's smart, it's
vulnerable
by
Hypponen, Mikko
Published 2022
Wiley
“
... the digital waters? In If It's Smart, It's
Vulnerable
, veteran cybersecurity professional Mikko Hypponen...
”
Call Number:
TK5105.8857
Read Now
3
Vulnerability
management
by
Foreman, Park
Published 2010
Auerbach Publications
Call Number:
QA76.9.A25
Read Now
4
Leading with
vulnerability
: unlock your greatest superpower to transform yourself, your team, and your organization
by
Morgan, Jacob
Published 2024
Wiley
Table of Contents:
“
...Introduction: Where it all begins -- I. Who is a weak [word crossed out]
vulnerable
leader?. Panic...
”
Call Number:
HD57.7
Read Now
5
Vulnerability
Management
by
Foreman, Park
Published 2019
Auerbach Publications
Table of Contents:
“
...The
vulnerability
experience -- Program and organization -- Technology -- Selecting technology...
”
Call Number:
QA76.9.A25
Read Now
6
The
Vulnerability
Researcher's Handbook : A Comprehensive Guide to Discovering, Reporting, and Publishing Security Vulnerabilities
by
Strout, Benjamin
Published 2023
Packt Publishing, Limited
Table of Contents:
“
...Technical requirements -- What is
vulnerability
research? -- Conducting research -- Selecting...
”
Call Number:
HD30.38
Read Now
7
Web application
vulnerabilities
: detect, exploit, prevent
by
Cross, Michael
Published 2007
Syngress Pub.
“
... and exploiting
vulnerabilities
specifically in Web applications. We will describe common security issues in Web...
”
Call Number:
QA76.76.A65
Read Now
8
Introduction to LLM
vulnerabilities
by
Deza, Alfredo
Published 2024
Pragmatic AI Solutions
“
... your large language model (LLM) applications by addressing potential
vulnerabilities
. You will explore...
”
Call Number:
QA76.9.N38
Read Now
9
Effective
vulnerability
management : managing risk in the vulnerable digital ecosystem
by
Hughes, Chris
,
Robinson, Nikki
Published 2024
John Wiley & Sons, Inc.
Table of Contents:
“
... Configuration 53 -- 4 Continuous
Vulnerability
Management 69 -- 5
Vulnerability
Scoring and Software...
”
Call Number:
QA76.9.A25
Read Now
10
Qualitative researcher
vulnerability
: negotiating, experiencing and embracing
Published 2023
Routledge
“
...Qualitative Researcher
Vulnerability
provides conceptual, experiential, and practical insights...
”
Call Number:
H62
Read Now
11
Cybersecurity threats and
vulnerabilities
: NICE framework work roles for K0005
Published 2023
O'Reilly Media, Inc.
“
...This course will provide the foundational knowledge necessary to engage the
vulnerability
...
”
Call Number:
TK5105.59
Read Now
12
Practical
vulnerability
management : a strategic approach to managing cyber risk
by
Magnusson, Andrew
Published 2020
No Starch Press, Inc.
“
... on a budget. It starts by discussing the components of a
vulnerability
management program...
”
Call Number:
TK5105.59
Read Now
13
Network
vulnerability
assessment : identify security loopholes in your network's infrastructure
by
Rahalkar, Sagar
Published 2018
Packt Publishing
Table of Contents:
“
...Types of
vulnerability
assessmentTypes of
vulnerability
assessment based on the location; External...
”
Call Number:
TK5105.59
Read Now
14
Patterns in Node package
vulnerabilities
: essential findings for busy developers
by
Karande, Chetan
Published 2018
O'Reilly Media
“
... package registry and the Node ecosystem's greatest strength. But as the number of detected
vulnerabilities
...
”
Call Number:
QA76.73.J39
Read Now
15
Secure Projects with
vulnerability
scanning in Github
by
Deza, Alfredo
Published 2021
Pragmatic AI Solutions, Safari
“
...Get started with security
vulnerability
scanning and integrating that with Github, Github Actions...
”
Read Now
16
Use Bard to identify code
vulnerabilities
by
Nield, Thomas
Published 2023
O'Reilly Media, Inc.
Call Number:
QA76.76.C52
Read Now
17
Managing a network
vulnerability
assessment
by
Peltier, Thomas R.
Published 2003
Auerbach Publications
Table of Contents:
“
...Introduction -- Project scoping -- Assessing current network concerns -- Network
vulnerability
...
”
Call Number:
TK5105.59
Read Now
18
Project feasibility : tools for uncovering points of vulnerability
by
Mesly, Olivier
Published 2017
CRC Press
Table of Contents:
“
...2.6 The parametric frame2.6.1 Points of
vulnerability
and the parametric frame; 2.7 Frame of key...
”
Call Number:
HD69.P75
Read Now
19
Threat modeling with Owasp Threat Dragon & risk rating a
vulnerability
Published 2022
Manning Publications
Call Number:
TK5105.59
Read Now
20
Using GitHub Copilot to find
vulnerabilities
in Code
Published 2024
O'Reilly Media, Inc.
Call Number:
QA76.76.D47
1
2
3
4
5
6
7
8
9
10
11
Back
Narrow Search
Remove Filters
Clear Filter
Language: English
Clear Filter
Collection: O'Reilly
Year of Publication
From:
To:
Classification
005 - Computer programming, programs & data
532
331 - Labor economics
394
658 - General management
212
330 - Economics
131
500 - Natural sciences & mathematics
111
000 - Computer science, information & general works
89
more ...
374 - Adult education
88
004 - Data processing & computer science
66
620 - Engineering & allied operations
66
338 - Production
61
384 - Communications; telecommunication
58
302 - Social interaction
47
300 - Social sciences
45
364 - Criminology
31
670 - Manufacturing
28
368 - Insurance
24
158 - Applied psychology
23
006 - Special computer methods
18
363 - Other social problems & services
18
650 - Management & auxiliary services
15
153 - Mental processes & intelligence
13
332 - Financial economics
13
381 - Commerce
13
303 - Social processes
12
621 - Applied physics
12
745 - Decorative arts
11
380 - Commerce, communications & transportation
10
174 - Occupational ethics
6
629 - Other branches of engineering
6
155 - Differential & developmental psychology
5
170 - Ethics
5
001 - Knowledge
3
025 - Library operations
3
150 - Psychology
3
305 - Social groups
3
352 - General considerations of public administration
3
355 - Military science
3
600 - Technology
3
307 - Communities
2
333 - Economics of land & energy
2
342 - Constitutional & administrative law
2
346 - Private law
2
510 - Mathematics
2
610 - Medicine & health
2
003 - Systems
1
008 - [Unassigned]
1
011 - Bibliographies
1
100 - Philosophy & psychology
1
152 - Perception, movement, emotions & drives
1
304 - Factors affecting social behavior
1
306 - Culture & institutions
1
327 - International relations
1
339 - Macroeconomics & related topics
1
343 - Military, tax, trade & industrial law
1
345 - Criminal law
1
361 - Social problems & social welfare in general
1
362 - Social welfare problems & services
1
371 - Schools & their activities; special education
1
378 - Higher education
1
511 - General principles of mathematics
1
519 - Probabilities & applied mathematics
1
571 - Physiology & related subjects
1
609 - Historical, geographic & persons treatment
1
623 - Military & nautical engineering
1
632 - Plant injuries, diseases & pests
1
652 - Processes of written communication
1
657 - Accounting
1
659 - Advertising & public relations
1
660 - Chemical engineering
1
see all ...
less ...
Language
English
Collection
O'Reilly
Author
Santos, Omar
16
Lowrie, Daniel
15
Messier, Ric
11
ACI Learning
10
Chapple, Mike
9
Seidl, David
9
more ...
Gupta, Sunil
7
Singh, Glen D.
6
Beaver, Kevin
5
Calder, Alan
5
Goodwin, Sophie
5
Ozkaya, Erdal
5
Rahalkar, Sagar
5
Deza, Alfredo
4
Gregg, Michael
4
Lakhani, Aamir
4
Liska, Allan
4
Rogers, Russ
4
Sharma, Himanshu
4
Stewart, James Michael
4
Sutton, David
4
Vacca, John R.
4
Velu, Vijay Kumar
4
Ansari, Juned Ahmed
3
Bidgoli, Hossein
3
Bryan, Wes
3
Computing Technology Industry Association
3
Cosentino, Scott
3
Crawley, Kim
3
Dalziel, Henry
3
Dennison, Justin
3
Diogenes, Yuri
3
Elisan, Christopher C.
3
Fisher, Derek
3
Gibson, Darril
3
Gift, Noah
3
Gordon, Adam
3
Haber, Morey J.
3
Long, Johnny
3
Meyers, Mike
3
Oriyano, Sean-Philip
3
Pfleeger, Charles P.
3
Pfleeger, Shari Lawrence
3
Rawat, Romil
3
Rice, Liz
3
Seacord, Robert C.
3
Singh, Abhinav
3
Viega, John
3
Weisman, Steve
3
Wiles, Jack
3
Williams, Branden R.
3
Wong, Ronnie
3
Academy, Cyber
2
Ackerman, Pascal
2
Ahmed, Alexis
2
Ali, Shakeel
2
Allen, Lee
2
Anderson, Hyrum S.
2
Andress, Jason
2
Aslaner, Milad
2
Ayala, Luis
2
Barnett, Ryan C.
2
Birch, Mark
2
Bodungen, Clint E.
2
Calderon, Paulino
2
Chan, Sheena Yap
2
Chuvakin, Anton
2
Clarke, Glen E.
2
Clarke, Justin
2
Coombs, Ted
2
Copeland, Marshall
2
Cross, Michael
2
Danielyan, Edgar
2
Dion, Jason
2
Dolan, Gabrielle
2
Dubrawsky, Ido
2
Dulaney, Emmett A.
2
Dunham, Ken
2
Dunkerley, Dawn
2
Dunkerley, Mark
2
Foreman, Park
2
Foster, James C.
2
Gamlem, Cornelia
2
Gentil, Hortense le
2
Gregory, Peter H.
2
Grimes, Roger A.
2
Harkins, Malcolm
2
Hartman, Shane
2
Harwood, Mike
2
Henning, Daniel
2
Heriyanto, Tedi
2
Hernandez, Steven
2
Hibbert, Brad
2
Howard, Michael
2
Hughes, Chris
2
Hurley, Chris
2
Hypponen, Mikko
2
Janca, Tanya
2
Jaswal, Nipun
2
Kalsi, Tajinder
2
see all ...
less ...
Recently Uploaded
Last Month
18
Search Tools
Get RSS Feed
Share Search
https://ebooks.mpdl.mpg.de/ebooks/Search/Results?filter%5B%5D=language%3A%22English%22&filter%5B%5D=product_txtF_mv%3A%22O%27Reilly%22&lookfor=%22Vulnerability%22&type=AllFields
Send by Email
×
Loading...