z-logo
open-access-imgOpen Access
Regulatory Guide on Conducting a Security Vulnerability Assessment
Author(s) -
David R. Ek
Publication year - 2016
Language(s) - English
Resource type - Reports
DOI - 10.2172/1235210
Subject(s) - vulnerability assessment , vulnerability (computing) , computer science , risk analysis (engineering) , business , computer security , environmental planning , environmental resource management , environmental science , medicine , psychiatry , psychological intervention

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here