1
by Bankoff, Greg, Frerks, Georg
Published 2013
Routledge
Table of Contents: ...Chapter 11: Macro-economic Concepts of Vulnerability: Dynamics, Complexity and Public PolicyChapter...

2
by Hypponen, Mikko
Published 2022
Wiley
... the digital waters? In If It's Smart, It's Vulnerable, veteran cybersecurity professional Mikko Hypponen...

3
by Foreman, Park
Published 2010
Auerbach Publications

4
by Morgan, Jacob
Published 2024
Wiley
Table of Contents: ...Introduction: Where it all begins -- I. Who is a weak [word crossed out] vulnerable leader?. Panic...

5
by Foreman, Park
Published 2019
Auerbach Publications
Table of Contents: ...The vulnerability experience -- Program and organization -- Technology -- Selecting technology...

6
by Strout, Benjamin
Published 2023
Packt Publishing, Limited
Table of Contents: ...Technical requirements -- What is vulnerability research? -- Conducting research -- Selecting...

7
by Cross, Michael
Published 2007
Syngress Pub.
... and exploiting vulnerabilities specifically in Web applications. We will describe common security issues in Web...

8
by Deza, Alfredo
Published 2024
Pragmatic AI Solutions
... your large language model (LLM) applications by addressing potential vulnerabilities. You will explore...

9
by Hughes, Chris, Robinson, Nikki
Published 2024
John Wiley & Sons, Inc.
Table of Contents: ... Configuration 53 -- 4 Continuous Vulnerability Management 69 -- 5 Vulnerability Scoring and Software...

10
Published 2023
Routledge
...Qualitative Researcher Vulnerability provides conceptual, experiential, and practical insights...

11
Published 2023
O'Reilly Media, Inc.
...This course will provide the foundational knowledge necessary to engage the vulnerability...

12
by Magnusson, Andrew
Published 2020
No Starch Press, Inc.
... on a budget. It starts by discussing the components of a vulnerability management program...

13
by Rahalkar, Sagar
Published 2018
Packt Publishing
Table of Contents: ...Types of vulnerability assessmentTypes of vulnerability assessment based on the location; External...

14
by Karande, Chetan
Published 2018
O'Reilly Media
... package registry and the Node ecosystem's greatest strength. But as the number of detected vulnerabilities...

15
by Deza, Alfredo
Published 2021
Pragmatic AI Solutions, Safari
...Get started with security vulnerability scanning and integrating that with Github, Github Actions...

16
by Nield, Thomas
Published 2023
O'Reilly Media, Inc.

17
by Peltier, Thomas R.
Published 2003
Auerbach Publications
Table of Contents: ...Introduction -- Project scoping -- Assessing current network concerns -- Network vulnerability...

18
by Mesly, Olivier
Published 2017
CRC Press
Table of Contents: ...2.6 The parametric frame2.6.1 Points of vulnerability and the parametric frame; 2.7 Frame of key...

19
Published 2022
Manning Publications

20
Published 2024
O'Reilly Media, Inc.