| Ссылка | Дата | Объем в кбайтах | Число страниц | Справка | 
| Computer vulnerability categorization | 2008 | 74 | 17 | Уязвимости программ и сервисов | 
| Understanding Vulnerability Management Life Cycle Functions Gartner | 24 January 2011 | 412 | 12 |  | 
| VoIP Vulnerabilities By Kevin Watkins, McAfee | 2010 | 737 | 8 |  | 
| Buyer’s Guide to Vulnerability Management Understanding your weak spots will help you pick
the right vulnerability management solution. We’ll offer suggestions on how to weave technologies with policy and process. | 2009 | 959 | 10 |  | 
| An Introduction to Network Vulnerability Testing | 2008 | 1128 | 9 |  | 
| Are sound attacks extracting decryption keys an enterprise threat or farce? Доступ к данным через шумы, создаваемые компьютером | 2014 | 1553 | 1 | Nick Lewis, Enterprise Threats | 
| Secunia Vulnerability Review Key figures and facts from a global IT-Security perspective | 2014 | 3156 | 20 | Published February 26, 2014 | 
| Ponemon 2014 SSH Security Vulnerability Report | 2014 | 704 | 7 | Ponemon institute | 
| All-in-one printers can be used to control infected air-gapped systems from far away | 2014 | 222 | 2 | Lucian Constantin | 
| Vulnerability scanner tools in the data center | 2015 | 126 | 3 | Brad Casey | 
| Critical vulnerability in NetUSB driver exposes millions of routers to hacking | May 19, 2015 | 310 | 2 | Lucian Constantin | 
| Getting to the bottom of the software vulnerability disclosure debate | 2016 | 157 | 3 | Michael Cobb | 
| CEO FRAUD: Prevention Manual | 2017 | 2729 | 16 | KnowBe4 | 
| Microsoft admins: Update your systems now to prevent "crazy bad" zero-day bug exploits !!!!! | May 9, 2017 | 181 | 2 | Brandon Vigliarolo, TechRepublic | 
| Man-in-the-disk attacks: A cheat sheet | November 30, 2018 | 588 | 2 | Brandon Vigliarolo, TechRepublic | 
| What's powering the unlikely rise of the millionaire hacker? | September 13, 2019 | 876 | 2 | Matt Asay, TechRepublic | 
|  |  |  |  |  |