|
Vulnerability analysis, also known as vulnerability assessment, is a process that defines, identifies, and classifies the security holes (vulnerabilities) in a computer, network, or an application. In addition, vulnerability analysis can forecast the effectiveness of proposed countermeasures and evaluate their actual effectiveness after they are put into use.
Vulnerability Analysis and Defense for the Internet provides packet captures, flow charts and psuedo code, which enable a user to identify if an application/protocol is vulnerable. If an application is vulnerable, then a user will be able to understand the complexity, and the theory behind the vulnerability. This edited volume also includes case studies where latest exploits are discussed.
Secrets to the Fire Автор: Oliver Mann Год: 2005 |
Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research Автор: David Maynor Год: 2010 |
A Profile of the Public Service of Australia (Public Service Country Profile Series) Автор: Commonwealth Secretariat Год: 1999 |
Writing Security Tools and Exploits Автор: Foster J.C., Liu V. Год: 2006 |
Managing A Network Vulnerability Assessment Автор: Thomas Peltier, Justin Peltier, John A. Blackley Год: 1984 |