Information security risks management framework - A step towards mitigating security risks in university network
暂无分享,去创建一个
[1] M. Varun Kumar,et al. Preventing SQL Injection Attacks , 2012 .
[2] Kapil Tarey,et al. A Review on Taxonomies of Attacks and Vulnerability in Computer and Network System , 2015 .
[3] S LakshmanaPandian.,et al. Cross Site Request Forgery: Preventive Measures , 2014 .
[4] C. V. Guru Rao,et al. Preventing input type validation vulnerabilities using network based intrusion detection systems , 2014, 2014 International Conference on Contemporary Computing and Informatics (IC3I).
[5] Umesh Singh,et al. Information Security Assessment by Quantifying Risk Level of Network Vulnerabilities , 2016 .
[6] Umesh Singh,et al. Quantifying Security Risk by Critical Network Vulnerabilities Assessment , 2016 .
[7] Umesh Singh,et al. ADMIT- A Five Dimensional Approach towards Standardization of Network and Computer Attack Taxonomies , 2014 .
[8] David Kennedy,et al. Metasploit: The Penetration Tester's Guide , 2011 .