The following text field will produce suggestions that follow it as you type.

Barnes and Noble

Software Vulnerability Discovery Process: Concepts and Applications

Unfortunately, this item is no longer available, but we found some similar items you might like.
Exploring Vulnerability

Exploring Vulnerability

Barnes and Noble
Creating a Patch and Vulnerability Management Program

Creating a Patch and Vulnerability Management Program

Barnes and Noble
Application of Large Language Models (LLMs) for Software Vulnerability Detection

Application of Large Language Models (LLMs) for Software Vulnerability Detection

Barnes and Noble
The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws

The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws

Barnes and Noble
Effective Vulnerability Management: Managing Risk the Vulnerable Digital Ecosystem

Effective Vulnerability Management: Managing Risk the Vulnerable Digital Ecosystem

Barnes and Noble
A Complete Guide to Burp Suite: Learn Detect Application Vulnerabilities

A Complete Guide to Burp Suite: Learn Detect Application Vulnerabilities

Barnes and Noble
Information Security Science: Measuring the Vulnerability to Data Compromises

Information Security Science: Measuring the Vulnerability to Data Compromises

Barnes and Noble
Technology Development for Security Practitioners

Technology Development for Security Practitioners

Barnes and Noble
network Protocols for Security Professionals: Probe and identify network-based vulnerabilities safeguard against protocol breaches

network Protocols for Security Professionals: Probe and identify network-based vulnerabilities safeguard against protocol breaches

Barnes and Noble
Practical Vulnerability Management: A Strategic Approach to Managing Cyber Risk

Practical Vulnerability Management: A Strategic Approach to Managing Cyber Risk

Barnes and Noble
Schl�sselwerke der Vulnerabilit�tsforschung

Schl�sselwerke der Vulnerabilit�tsforschung

Barnes and Noble
Bug Bounty from Scratch: A comprehensive guide to discovering vulnerabilities and succeeding in cybersecurity

Bug Bounty from Scratch: A comprehensive guide to discovering vulnerabilities and succeeding in cybersecurity

Barnes and Noble
Human Being @ Risk: Enhancement, Technology, and the Evaluation of Vulnerability Transformations

Human Being @ Risk: Enhancement, Technology, and the Evaluation of Vulnerability Transformations

Barnes and Noble
Cloud Security: Concepts, Applications and Practices

Cloud Security: Concepts, Applications and Practices

Barnes and Noble
Network Attacks and Exploitation: A Framework / Edition 1

Network Attacks and Exploitation: A Framework / Edition 1

Barnes and Noble
Software Security: Building Security In / Edition 1

Software Security: Building Security In / Edition 1

Barnes and Noble
Powered by Adeptmind