Extreme Exploits: Advanced Defenses Against Hardcore Hacks (Hacking Exposed)
| | ||
| | ||
| | ||
Chapter List
- Chapter 12: Vulnerability and Patch Management
- Chapter 13: A Winning Methodology for Vulnerability Assessments
- Chapter 14: Performing the Assessment, Part I
- Chapter 15: Performing the Assessment, Part II
| | ||
| | ||
| | ||