Books on the topic 'Security Vulnerabilities'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 books for your research on the topic 'Security Vulnerabilities.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
Maurushat, Alana. Disclosure of Security Vulnerabilities. Springer London, 2013. http://dx.doi.org/10.1007/978-1-4471-5004-6.
Full textCordner, Lee. Maritime Security Risks, Vulnerabilities and Cooperation. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-62755-7.
Full textRomanosky, Sasha. Managing and auditing IT vulnerabilities. The Institute of Internal Auditors, 2006.
Find full textThermos, Peter. Securing VoIP networks: Threats, vulnerabilities, and countermeasures. Addison-Wesley, 2007.
Find full textMaurushat, Alana. Disclosure of Security Vulnerabilities: Legal and Ethical Issues. Springer London, 2013.
Find full textNational Infrastructure Protection Center (U.S.). Best practices for wireless fidelity (802.11b) network vulnerabilities. National Infrastructure Protection Center, 2002.
Find full textUnited States. Department of Homeland Security. Office of Inspector General. Vulnerabilities highlight the need for more effective web security management. U.S. Dept. of Homeland Security, Office of Inspector General, 2009.
Find full text1977-, McDonald John, and Schuh Justin, eds. The art of software security assessment: Identifying and preventing software vulnerabilities. Addison-Wesley, 2007.
Find full textNational Research Council (U.S.). Committee on Assessing Vulnerabilities Related to the Nation's Chemical Infrastructure., National Research Council (U.S.). Division on Earth and Life Studies., and National Research Council (U.S.). Transportation Research Board., eds. Terrorism and the chemical infrastructure: Protecting people and reducing vulnerabilities. National Academies Press, 2006.
Find full textJohn, Adams. Remaking American security: Supply chain vulnerabilities & national security risks across the U.S. defense industrial base. Alliance for American Manufacturing, 2013.
Find full textAmerican Institute of Chemical Engineers. Center for Chemical Process Safety. Guidelines for analyzing and managing the security vulnerabilities of fixed chemical sites. Center for Chemical Process Safety of the American Institute of Chemical Engineers, 2003.
Find full textservice), SpringerLink (Online, ed. Voice over IP Security: A Comprehensive Survey of Vulnerabilities and Academic Research. The Author, 2011.
Find full textS, Antón Philip, ed. Finding and fixing vulnerabilities in information systems: The vulnerability assessment & mitigation methodology. Rand, 2003.
Find full textOffice, General Accounting. Aviation security: Vulnerabilities and potential improvements for the air cargo system : report to congressional requesters. U.S. General Accounting Office, 2002.
Find full textLopez, Bryan S. An investigation and assessment of Linux Ipchains and its vulnerabilities with respect to network security. Naval Postgraduate School, 2000.
Find full textWan, Ya Shin. Malaysia: Social protection in addressing life cycle vulnerabilities : Human Development Fellowship for young professionals, 2014. Indian Institute of Advanced Study, 2017.
Find full textEastin, Joshua, and Kendra Dupuy, eds. Gender, climate change and livelihoods: vulnerabilities and adaptations. CABI, 2021. http://dx.doi.org/10.1079/9781789247053.0000.
Full textRudra, Kalyan. India ; New Security, Challenges and Vulnerabilities. Bright Law House, 2003.
Find full textCampara, Djenana, and Nikolai Mansourov. System Assurance: Beyond Detecting Vulnerabilities. Elsevier Science & Technology Books, 2010.
Find full textPalmer, Steven. Web Application Vulnerabilities: Detect, Exploit, Prevent. Elsevier Science & Technology Books, 2011.
Find full textJanca, Tanya. Alice and Bob Learn Application Security. Wiley & Sons, Limited, John, 2020.
Find full textJanca, Tanya. Alice and Bob Learn Application Security. Wiley & Sons, Incorporated, John, 2020.
Find full textJanca, Tanya. Alice and Bob Learn Application Security. Wiley & Sons, Incorporated, John, 2020.
Find full textMasys, Anthony J., Ricardo Izurieta, and Miguel Reina Ortiz. Global Health Security: Recognizing Vulnerabilities, Creating Opportunities. Springer International Publishing AG, 2021.
Find full textMasys, Anthony J., Ricardo Izurieta, and Miguel Reina Ortiz. Global Health Security: Recognizing Vulnerabilities, Creating Opportunities. Springer, 2020.
Find full textManaging Security Information: Incidents, Threats and Vulnerabilities. Unisa Press, 2020.
Find full textThermos, Peter, and Ari Takanen. Securing VoIP Networks: Threats, Vulnerabilities, and Countermeasures. Addison-Wesley Professional, 2007.
Find full textDisclosure of Security Vulnerabilities: Legal and Ethical Issues. Springer London, Limited, 2013.
Find full textVallet, Elisabeth. Borders and Border Walls: In-Security, Symbolism, Vulnerabilities. Taylor & Francis Group, 2020.
Find full textU. S. Government Accountability Offi Gao. Information Security: VA Needs to Address Identified Vulnerabilities. Independently Published, 2019.
Find full textNavias, Martin S. Finance and Security: Global Vulnerabilities, Threats and Responses. C. Hurst and Company (Publishers) Limited, 2019.
Find full textVallet, Elisabeth. Borders and Border Walls: In-Security, Symbolism, Vulnerabilities. Taylor & Francis Group, 2020.
Find full textVallet, Elisabeth. Borders and Border Walls: In-Security, Symbolism, Vulnerabilities. Taylor & Francis Group, 2020.
Find full textVallet, Elisabeth. Borders and Border Walls: In-Security, Symbolism, Vulnerabilities. Routledge, Chapman & Hall, Incorporated, 2021.
Find full textVallet, Elisabeth. Borders and Border Walls: In-Security, Symbolism, Vulnerabilities. Taylor & Francis Group, 2020.
Find full textLevy, Elias. Software Vulnerabilities: Identifying, Avoiding, and Mitigating Exploits. Pearson Education, Limited, 2006.
Find full textSalmani, Hassan. Trusted Digital Circuits: Hardware Trojan Vulnerabilities, Prevention and Detection. Springer, 2018.
Find full textSalmani, Hassan. Trusted Digital Circuits: Hardware Trojan Vulnerabilities, Prevention and Detection. Springer, 2019.
Find full textAgarwal, Shivani, Sandhya Makkar, and Duc-Tan Tran. Privacy Vulnerabilities and Data Security Challenges in the IoT. Taylor & Francis Group, 2020.
Find full textPrivacy Vulnerabilities and Data Security Challenges in the IoT. Taylor & Francis Group, 2020.
Find full textWeitz, Richard, and Strategic Studies Institute. Assessing the Collective Security Treaty Organization: Capabilities and Vulnerabilities. Independently Published, 2018.
Find full textAgarwal, Shivani, Sandhya Makkar, and Duc-Tan Tran. Privacy Vulnerabilities and Data Security Challenges in the Iot. Taylor & Francis Group, 2020.
Find full textAgarwal, Shivani, Sandhya Makkar, and Duc-Tan Tran. Privacy Vulnerabilities and Data Security Challenges in the IoT. Taylor & Francis Group, 2020.
Find full textAgarwal, Shivani, Sandhya Makkar, and Duc-Tan Tran. Privacy Vulnerabilities and Data Security Challenges in the IoT. Taylor & Francis Group, 2020.
Find full textRahalkar, Sagar. Complete Guide to Burp Suite: Learn to Detect Application Vulnerabilities. Apress L. P., 2020.
Find full textDowd, Mark, Justin Schuh, and John McDonald. The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities. Addison-Wesley Professional, 2006.
Find full textBidgoli, Hossein. Handbook of Information Security, Threats, Vulnerabilities, Prevention, Detection, and Management. Wiley & Sons, Incorporated, John, 2006.
Find full textBidgoli, Hossein. Handbook of Information Security, Threats, Vulnerabilities, Prevention, Detection, and Management. Wiley, 2006.
Find full textBidgoli, Hossein. Handbook of Information Security, Threats, Vulnerabilities, Prevention, Detection, and Management. Wiley & Sons, Incorporated, John, 2007.
Find full textR. E. D. Dot RED DOT PUBLICATIONS. Bluetooth Wireless Technology: Security, Low Energy, Vulnerabilities, Threats and Countermeasures. Independently Published, 2017.
Find full text