Ссылка | Дата | Объем в кбайтах | Число страниц | Справка |
The Application Usage and Risk Report An Analysis of End User Application Trends in the Enterprise | 2010 | 404 | 21 | |
The Application Usage and Risk Report An Analysis of End User Application Trends in the Enterprise | 2009 | 452 | 19 | |
High-Risk User Monitoring Using ArcSight IdentityView to Combat Insider Threats | 2010 | 1049 | 6 | |
Closing the Four Security Risk Gaps of Mainframe Console Access | November 2008 | 423 | 12 | |
Risk Management: Bridging Policies and Procedures – Fundamental Security Concepts | 2009 | 146 | 6 | |
Expert Tips for Eliminating Linux Security Risks | 2009 | 445 | 6 | |
The 10 Most Dangerous Risks to Microsoft Security | 2009 | 126 | 8 | |
SecureSphere and OWASP 2010 Top Ten Most Critical Web Application Security Risks | 2010 | 70 | 6 | |
New Security Challenges Redefine Risk and Vulnerability White paper | 2017 | 1921 | 8 | Fortinet |