Related Books
Language: en
Pages: 243
Pages: 243
Type: BOOK - Published: 2018-08-31 - Publisher: Packt Publishing Ltd
Build a network security threat model with this comprehensive learning guide Key Features Develop a network security threat model for your organization Gain han
Language: en
Pages: 396
Pages: 396
Type: BOOK - Published: 2004 - Publisher: "O'Reilly Media, Inc."
Covers offensive technologies by grouping and analyzing them at a higher level--from both an offensive and defensive standpoint--helping you design and deploy n
Language: en
Pages: 412
Pages: 412
Type: BOOK - Published: 2006-12-02 - Publisher: Elsevier
This book will take readers from the discovery of vulnerabilities and the creation of the corresponding exploits, through a complete security assessment, all th
Language: en
Pages: 265
Pages: 265
Type: BOOK - Published: 2008-01-24 - Publisher: Springer Science & Business Media
Vulnerability analysis, also known as vulnerability assessment, is a process that defines, identifies, and classifies the security holes, or vulnerabilities, in
Language: en
Pages: 334
Pages: 334
Type: BOOK - Published: 2005-11-23 - Publisher: Springer Science & Business Media
Modern society depends critically on computers that control and manage the systems on which we depend in many aspects of our daily lives. While this provides co