Ссылка | Дата | Объем в кбайтах | Число страниц | Справка |
Computer vulnerability categorization |
2008 |
74 |
17 |
Уязвимости программ и сервисов |
Understanding Vulnerability Management Life Cycle Functions Gartner |
24 January 2011 |
412 |
12 |
|
VoIP Vulnerabilities By Kevin Watkins, McAfee |
2010 |
737 |
8 |
|
Buyer’s Guide to Vulnerability Management Understanding your weak spots will help you pick
the right vulnerability management solution. We’ll offer suggestions on how to weave technologies with policy and process. |
2009 |
959 |
10 |
|
An Introduction to Network Vulnerability Testing |
2008 |
1128 |
9 |
|
Are sound attacks extracting decryption keys an enterprise threat or farce? Доступ к данным через шумы, создаваемые компьютером |
2014 |
1553 |
1 |
Nick Lewis, Enterprise Threats |
Secunia Vulnerability Review Key figures and facts from a global IT-Security perspective |
2014 |
3156 |
20 |
Published February 26, 2014 |
Ponemon 2014 SSH Security Vulnerability Report |
2014 |
704 |
7 |
Ponemon institute |
All-in-one printers can be used to control infected air-gapped systems from far away |
2014 |
222 |
2 |
Lucian Constantin |
Vulnerability scanner tools in the data center |
2015 |
126 |
3 |
Brad Casey |
Critical vulnerability in NetUSB driver exposes millions of routers to hacking |
May 19, 2015 |
310 |
2 |
Lucian Constantin |
Getting to the bottom of the software vulnerability disclosure debate |
2016 |
157 |
3 |
Michael Cobb |
CEO FRAUD: Prevention Manual |
2017 |
2729 |
16 |
KnowBe4 |
Microsoft admins: Update your systems now to prevent "crazy bad" zero-day bug exploits !!!!! |
May 9, 2017 |
181 |
2 |
Brandon Vigliarolo, TechRepublic |
Man-in-the-disk attacks: A cheat sheet |
November 30, 2018 |
588 |
2 |
Brandon Vigliarolo, TechRepublic |
What's powering the unlikely rise of the millionaire hacker? |
September 13, 2019 |
876 |
2 |
Matt Asay, TechRepublic |
|
|
|
|
|