nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
An historical perspective of software vulnerability management
|
Gray, Andy |
|
2003 |
8 |
4 |
p. 34-44 11 p. |
artikel |
2 |
An XML-based architecture to perform data integration and data unification in vulnerability assessments
|
Blyth, Andrew |
|
2003 |
8 |
4 |
p. 14-25 12 p. |
artikel |
3 |
Eliminating noise from intrusion detection systems
|
Eschelbeck, Gerhard |
|
2003 |
8 |
4 |
p. 26-33 8 p. |
artikel |
4 |
How to ensure an effective penetration test
|
Midian, Paul |
|
2003 |
8 |
4 |
p. 65-77 13 p. |
artikel |
5 |
Introduction
|
Ciechanowicz, Chez |
|
2003 |
8 |
4 |
p. 5- 1 p. |
artikel |
6 |
Measuring vulnerabilities and their exploitation cycle
|
Morakis, Evangelos |
|
2003 |
8 |
4 |
p. 45-55 11 p. |
artikel |
7 |
Penetration testing and social engineering
|
Barrett, Neil |
|
2003 |
8 |
4 |
p. 56-64 9 p. |
artikel |
8 |
The art of intrusion testing
|
Gunara-Chen, Glenn |
|
2003 |
8 |
4 |
p. 6-13 8 p. |
artikel |
9 |
Useful vulnerability assessment
|
Mollerhaug, Stein |
|
2003 |
8 |
4 |
p. 78-84 7 p. |
artikel |