Ññûëêà | Äàòà | Îáúåì â êá. | ×èñëî ñòð. | Ñïðàâêà |
How to develop a bug bounty program | July 14, 2016 | 241 | 3 | Scott Matteson, TechRepublic |
Ethical hacker, 86, rises to Santander’s challenge | 01 Jun 2018 | 136 | 3 | Karl Flinders, ComputerWeekly |
Zero in on your zero-day vulnerabilities | 2017 | 139 | 2 | Graeme Park, ComputerWeekly |
Marcus Ranum decodes hardware vulnerabilities with Joe Grand | 2018 | 131 | 5 | Marcus Ranum, TechTarget |