| Ссылка | Дата | Объем в кбайтах | Число страниц | Справка |
| Computer vulnerability categorization |
2008 |
74 |
17 |
Уязвимости программ и сервисов |
| Understanding Vulnerability Management Life Cycle Functions Gartner |
24 January 2011 |
412 |
12 |
|
| VoIP Vulnerabilities By Kevin Watkins, McAfee |
2010 |
737 |
8 |
|
| Buyer’s Guide to Vulnerability Management Understanding your weak spots will help you pick
the right vulnerability management solution. We’ll offer suggestions on how to weave technologies with policy and process. |
2009 |
959 |
10 |
|
| An Introduction to Network Vulnerability Testing |
2008 |
1128 |
9 |
|
| Are sound attacks extracting decryption keys an enterprise threat or farce? Доступ к данным через шумы, создаваемые компьютером |
2014 |
1553 |
1 |
Nick Lewis, Enterprise Threats |
| Secunia Vulnerability Review Key figures and facts from a global IT-Security perspective |
2014 |
3156 |
20 |
Published February 26, 2014 |
| Ponemon 2014 SSH Security Vulnerability Report |
2014 |
704 |
7 |
Ponemon institute |
| All-in-one printers can be used to control infected air-gapped systems from far away |
2014 |
222 |
2 |
Lucian Constantin |
| Vulnerability scanner tools in the data center |
2015 |
126 |
3 |
Brad Casey |
| Critical vulnerability in NetUSB driver exposes millions of routers to hacking |
May 19, 2015 |
310 |
2 |
Lucian Constantin |
| Getting to the bottom of the software vulnerability disclosure debate |
2016 |
157 |
3 |
Michael Cobb |
| CEO FRAUD: Prevention Manual |
2017 |
2729 |
16 |
KnowBe4 |
| Microsoft admins: Update your systems now to prevent "crazy bad" zero-day bug exploits !!!!! |
May 9, 2017 |
181 |
2 |
Brandon Vigliarolo, TechRepublic |
| Man-in-the-disk attacks: A cheat sheet |
November 30, 2018 |
588 |
2 |
Brandon Vigliarolo, TechRepublic |
| What's powering the unlikely rise of the millionaire hacker? |
September 13, 2019 |
876 |
2 |
Matt Asay, TechRepublic |
|
|
|
|
|