![Computer security / Computer network security / Vulnerability / Software testing / Vulnerability database / National Vulnerability Database / Zero-day / CVSS / Common Vulnerabilities and Exposures / Attack / Buffer overflow / Social vulnerability Computer security / Computer network security / Vulnerability / Software testing / Vulnerability database / National Vulnerability Database / Zero-day / CVSS / Common Vulnerabilities and Exposures / Attack / Buffer overflow / Social vulnerability](https://www.pdfsearch.io/img/5322a7c0d69c13f1ef586455b7011824.jpg) Date: 2013-01-18 09:24:08Computer security Computer network security Vulnerability Software testing Vulnerability database National Vulnerability Database Zero-day CVSS Common Vulnerabilities and Exposures Attack Buffer overflow Social vulnerability | | SOFTWARE – PRACTICE AND EXPERIENCE Softw. Pract. ExperPublished online in Wiley Online Library (wileyonlinelibrary.com). DOI: spe.2180 Analysis of operating system diversity for intrusion tolerance MigAdd to Reading ListSource URL: www.di.fc.ul.ptDownload Document from Source Website File Size: 932,36 KBShare Document on Facebook
|