Vulnarability

СсылкаДатаОбъем в кбайтахЧисло страницСправка
Computer vulnerability categorization 2008 74 17 Уязвимости программ и сервисов
Understanding Vulnerability Management Life Cycle Functions Gartner 24 January 2011 412 12  
VoIP Vulnerabilities By Kevin Watkins, McAfee 2010 737 8  
Buyer’s Guide to Vulnerability Management Understanding your weak spots will help you pick the right vulnerability management solution. We’ll offer suggestions on how to weave technologies with policy and process. 2009 959 10  
An Introduction to Network Vulnerability Testing 2008 1128 9  
Are sound attacks extracting decryption keys an enterprise threat or farce? Доступ к данным через шумы, создаваемые компьютером 2014 1553 1 Nick Lewis, Enterprise Threats
Secunia Vulnerability Review Key figures and facts from a global IT-Security perspective 2014 3156 20 Published February 26, 2014
Ponemon 2014 SSH Security Vulnerability Report 2014 704 7 Ponemon institute
All-in-one printers can be used to control infected air-gapped systems from far away 2014 222 2 Lucian Constantin
Vulnerability scanner tools in the data center 2015 126 3 Brad Casey
Critical vulnerability in NetUSB driver exposes millions of routers to hacking May 19, 2015 310 2 Lucian Constantin
Getting to the bottom of the software vulnerability disclosure debate 2016 157 3 Michael Cobb
CEO FRAUD: Prevention Manual 2017 2729 16 KnowBe4
Microsoft admins: Update your systems now to prevent "crazy bad" zero-day bug exploits !!!!! May 9, 2017 181 2 Brandon Vigliarolo, TechRepublic
Man-in-the-disk attacks: A cheat sheet November 30, 2018 588 2 Brandon Vigliarolo, TechRepublic
What's powering the unlikely rise of the millionaire hacker? September 13, 2019 876 2 Matt Asay, TechRepublic