To see the other types of publications on this topic, follow the link: Security Vulnerabilities.

Books on the topic 'Security Vulnerabilities'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 books for your research on the topic 'Security Vulnerabilities.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse books on a wide variety of disciplines and organise your bibliography correctly.

1

Maurushat, Alana. Disclosure of Security Vulnerabilities. Springer London, 2013. http://dx.doi.org/10.1007/978-1-4471-5004-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Cordner, Lee. Maritime Security Risks, Vulnerabilities and Cooperation. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-62755-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Romanosky, Sasha. Managing and auditing IT vulnerabilities. The Institute of Internal Auditors, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Thermos, Peter. Securing VoIP networks: Threats, vulnerabilities, and countermeasures. Addison-Wesley, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Maurushat, Alana. Disclosure of Security Vulnerabilities: Legal and Ethical Issues. Springer London, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

National Infrastructure Protection Center (U.S.). Best practices for wireless fidelity (802.11b) network vulnerabilities. National Infrastructure Protection Center, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

United States. Department of Homeland Security. Office of Inspector General. Vulnerabilities highlight the need for more effective web security management. U.S. Dept. of Homeland Security, Office of Inspector General, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

1977-, McDonald John, and Schuh Justin, eds. The art of software security assessment: Identifying and preventing software vulnerabilities. Addison-Wesley, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

National Research Council (U.S.). Committee on Assessing Vulnerabilities Related to the Nation's Chemical Infrastructure., National Research Council (U.S.). Division on Earth and Life Studies., and National Research Council (U.S.). Transportation Research Board., eds. Terrorism and the chemical infrastructure: Protecting people and reducing vulnerabilities. National Academies Press, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

John, Adams. Remaking American security: Supply chain vulnerabilities & national security risks across the U.S. defense industrial base. Alliance for American Manufacturing, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
11

American Institute of Chemical Engineers. Center for Chemical Process Safety. Guidelines for analyzing and managing the security vulnerabilities of fixed chemical sites. Center for Chemical Process Safety of the American Institute of Chemical Engineers, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
12

service), SpringerLink (Online, ed. Voice over IP Security: A Comprehensive Survey of Vulnerabilities and Academic Research. The Author, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
13

S, Antón Philip, ed. Finding and fixing vulnerabilities in information systems: The vulnerability assessment & mitigation methodology. Rand, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
14

Office, General Accounting. Aviation security: Vulnerabilities and potential improvements for the air cargo system : report to congressional requesters. U.S. General Accounting Office, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
15

Lopez, Bryan S. An investigation and assessment of Linux Ipchains and its vulnerabilities with respect to network security. Naval Postgraduate School, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
16

Wan, Ya Shin. Malaysia: Social protection in addressing life cycle vulnerabilities : Human Development Fellowship for young professionals, 2014. Indian Institute of Advanced Study, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
17

Eastin, Joshua, and Kendra Dupuy, eds. Gender, climate change and livelihoods: vulnerabilities and adaptations. CABI, 2021. http://dx.doi.org/10.1079/9781789247053.0000.

Full text
Abstract:
Abstract This book applies a gender lens to examine the implications of climate change for livelihoods in vulnerable states. The goals are to enhance awareness of climate change as a gender issue, and to highlight the importance of gender in identifying livelihood vulnerabilities and in designing more robust climate adaptation measures, especially in climate-sensitive industries such as agriculture. The contributions in this book examine how the consequences of climate change affect women and men in different ways, and address the implications of climate change for women's livelihoods and reso
APA, Harvard, Vancouver, ISO, and other styles
18

Rudra, Kalyan. India ; New Security, Challenges and Vulnerabilities. Bright Law House, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
19

Campara, Djenana, and Nikolai Mansourov. System Assurance: Beyond Detecting Vulnerabilities. Elsevier Science & Technology Books, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
20

Palmer, Steven. Web Application Vulnerabilities: Detect, Exploit, Prevent. Elsevier Science & Technology Books, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
21

Janca, Tanya. Alice and Bob Learn Application Security. Wiley & Sons, Limited, John, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
22

Janca, Tanya. Alice and Bob Learn Application Security. Wiley & Sons, Incorporated, John, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
23

Janca, Tanya. Alice and Bob Learn Application Security. Wiley & Sons, Incorporated, John, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
24

Masys, Anthony J., Ricardo Izurieta, and Miguel Reina Ortiz. Global Health Security: Recognizing Vulnerabilities, Creating Opportunities. Springer International Publishing AG, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
25

Masys, Anthony J., Ricardo Izurieta, and Miguel Reina Ortiz. Global Health Security: Recognizing Vulnerabilities, Creating Opportunities. Springer, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
26

Managing Security Information: Incidents, Threats and Vulnerabilities. Unisa Press, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
27

Thermos, Peter, and Ari Takanen. Securing VoIP Networks: Threats, Vulnerabilities, and Countermeasures. Addison-Wesley Professional, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
28

Disclosure of Security Vulnerabilities: Legal and Ethical Issues. Springer London, Limited, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
29

Vallet, Elisabeth. Borders and Border Walls: In-Security, Symbolism, Vulnerabilities. Taylor & Francis Group, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
30

U. S. Government Accountability Offi Gao. Information Security: VA Needs to Address Identified Vulnerabilities. Independently Published, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
31

Navias, Martin S. Finance and Security: Global Vulnerabilities, Threats and Responses. C. Hurst and Company (Publishers) Limited, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
32

Vallet, Elisabeth. Borders and Border Walls: In-Security, Symbolism, Vulnerabilities. Taylor & Francis Group, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
33

Vallet, Elisabeth. Borders and Border Walls: In-Security, Symbolism, Vulnerabilities. Taylor & Francis Group, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
34

Vallet, Elisabeth. Borders and Border Walls: In-Security, Symbolism, Vulnerabilities. Routledge, Chapman & Hall, Incorporated, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
35

Vallet, Elisabeth. Borders and Border Walls: In-Security, Symbolism, Vulnerabilities. Taylor & Francis Group, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
36

Levy, Elias. Software Vulnerabilities: Identifying, Avoiding, and Mitigating Exploits. Pearson Education, Limited, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
37

Salmani, Hassan. Trusted Digital Circuits: Hardware Trojan Vulnerabilities, Prevention and Detection. Springer, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
38

Salmani, Hassan. Trusted Digital Circuits: Hardware Trojan Vulnerabilities, Prevention and Detection. Springer, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
39

Agarwal, Shivani, Sandhya Makkar, and Duc-Tan Tran. Privacy Vulnerabilities and Data Security Challenges in the IoT. Taylor & Francis Group, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
40

Privacy Vulnerabilities and Data Security Challenges in the IoT. Taylor & Francis Group, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
41

Weitz, Richard, and Strategic Studies Institute. Assessing the Collective Security Treaty Organization: Capabilities and Vulnerabilities. Independently Published, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
42

Agarwal, Shivani, Sandhya Makkar, and Duc-Tan Tran. Privacy Vulnerabilities and Data Security Challenges in the Iot. Taylor & Francis Group, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
43

Agarwal, Shivani, Sandhya Makkar, and Duc-Tan Tran. Privacy Vulnerabilities and Data Security Challenges in the IoT. Taylor & Francis Group, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
44

Agarwal, Shivani, Sandhya Makkar, and Duc-Tan Tran. Privacy Vulnerabilities and Data Security Challenges in the IoT. Taylor & Francis Group, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
45

Rahalkar, Sagar. Complete Guide to Burp Suite: Learn to Detect Application Vulnerabilities. Apress L. P., 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
46

Dowd, Mark, Justin Schuh, and John McDonald. The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities. Addison-Wesley Professional, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
47

Bidgoli, Hossein. Handbook of Information Security, Threats, Vulnerabilities, Prevention, Detection, and Management. Wiley & Sons, Incorporated, John, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
48

Bidgoli, Hossein. Handbook of Information Security, Threats, Vulnerabilities, Prevention, Detection, and Management. Wiley, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
49

Bidgoli, Hossein. Handbook of Information Security, Threats, Vulnerabilities, Prevention, Detection, and Management. Wiley & Sons, Incorporated, John, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
50

R. E. D. Dot RED DOT PUBLICATIONS. Bluetooth Wireless Technology: Security, Low Energy, Vulnerabilities, Threats and Countermeasures. Independently Published, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!