by
McGraw, Gary, 1966-
Table of contents only http://www.loc.gov/catdir/toc/ecip062/2005031598.html
Format:
Books
Publication Date
2006
Excerpt:
touchpoints -- 4. Code review with a tool -- 5. Architectural risk analysis -- 6. Software penetration testing
by
Chase, Kate.
Table of contents http://catdir.loc.gov/catdir/enhancements/fy0613/2002113567-t.html
Contributor biographical information http://catdir.loc.gov/catdir/enhancements/fy0613/2002113567-b.html
Publisher description http://catdir.loc.gov/catdir/enhancements/fy0613/2002113567-d.html
Contributor biographical information http://catdir.loc.gov/catdir/enhancements/fy0613/2002113567-b.html
Publisher description http://catdir.loc.gov/catdir/enhancements/fy0613/2002113567-d.html
Format:
Books
Publication Date
2003
Excerpt:
limit the risk of damage and disruption, how to restart a problem PC, what to do when upgrades go wrong
by
Carroll, John Millar.
Format:
Books
Publication Date
1996
Excerpt:
Personal Computers -- Ch. 22. Systems Approach to Risk Management -- Ch. 23. Threat Assessment -- Ch. 24
Limit Search Results
Narrowed by: