Cargando…
Cyberspace and cybersecurity
Vulnerabilities in Information SystemsIntroductionMeasuring VulnerabilityAvoiding Vulnerabilities through Secure CodingMistakes Can Be GoodThreats ClassificationThreat Modeling ProcessSecurity Starts at HomeSecurity in ApplicationsInternational AwarenessExercisesVulnerabilities in the OrganizationIn...
Autor principal: | |
---|---|
Lenguaje: | eng |
Publicado: |
CRC Press
2012
|
Materias: | |
Acceso en línea: | http://cds.cern.ch/record/2018845 |
Sumario: | Vulnerabilities in Information SystemsIntroductionMeasuring VulnerabilityAvoiding Vulnerabilities through Secure CodingMistakes Can Be GoodThreats ClassificationThreat Modeling ProcessSecurity Starts at HomeSecurity in ApplicationsInternational AwarenessExercisesVulnerabilities in the OrganizationIntroductionCommon Organizational VulnerabilitiesAccess Authorization and AuthenticationHuman FactorsSecurity ServicesExternal TechnologiesWireless NetworksBluetooth Passive Vulnerabilities Active Vulnerabilities PrecautionsWireless Fidelity Wi-Fi Precautions at Home Wi-Fi Precauti |
---|