Related Books

Vulnerability Analysis and Defense for the Internet
Language: en
Pages: 265
Authors: Abhishek Singh
Categories: Computers
Type: BOOK - Published: 2008-01-24 - Publisher: Springer Science & Business Media

GET EBOOK

Vulnerability analysis, also known as vulnerability assessment, is a process that defines, identifies, and classifies the security holes, or vulnerabilities, in
Finding and Fixing Vulnerabilities in Information Systems
Language: en
Pages: 145
Authors: Philip S. Anton
Categories: Transportation
Type: BOOK - Published: 2004-02-09 - Publisher: Rand Corporation

GET EBOOK

Understanding an organization's reliance on information systems and how to mitigate the vulnerabilities of these systems can be an intimidating challenge--espec
Network Security Assessment
Language: en
Pages: 400
Authors: Chris McNab
Categories: Computers
Type: BOOK - Published: 2004-03-19 - Publisher: "O'Reilly Media, Inc."

GET EBOOK

There are hundreds--if not thousands--of techniques used to compromise both Windows and Unix-based systems. Malicious code and new exploit scripts are released
Modeling and Design of Secure Internet of Things
Language: en
Pages: 704
Authors: Charles A. Kamhoua
Categories: Technology & Engineering
Type: BOOK - Published: 2020-08-04 - Publisher: John Wiley & Sons

GET EBOOK

An essential guide to the modeling and design techniques for securing systems that utilize the Internet of Things Modeling and Design of Secure Internet of Thin
Network Vulnerability Assessment
Language: en
Pages: 243
Authors: Sagar Rahalkar
Categories: Computers
Type: BOOK - Published: 2018-08-31 - Publisher: Packt Publishing Ltd

GET EBOOK

Build a network security threat model with this comprehensive learning guide Key Features Develop a network security threat model for your organization Gain han