We can't find the internet
Attempting to reconnect
Something went wrong!
Hang in there while we get back on track
£58.00
LAP Lambert Academic Publishing Software Vulnerabilities: Key factors impacting on response time of software vendors in releasing patches for software vulnerabilities
Price data last checked 62 day(s) ago - refreshing...
Price History & Forecast
Last 29 days • 29 data points (No recent data available)
Price Distribution
Price distribution over 29 days • 1 price levels
Price Analysis
Most common price: £58 (29 days, 100.0%)
Price range: £58 - £58
Price levels: 1 different prices over 29 days
Product Specifications
- Format
- paperback
- ASIN
- 3659219576
- Category
- Books > Subjects
- Domain
- Amazon UK
- Release Date
- 17 September 2012
- Listed Since
- 23 September 2012
Barcode
No barcode data available
Similar Products You Might Like
Business Models for Enterprise Software Vendors: What are the major variables that influence the Open Source Software Vendors success?
LAP Lambert Academic Publishing
Penetration Testing Frameworks for Web Applications and APIs: Vulnerability Assessment and Pen Testing Frameworks
Software Vulnerability: Identification and Minimization
VDM Verlag
Identification of NLOS nodes in VANETs for enhancing safety
Vulnerabilities Assessment and Risk Management in Cyber Security
A Framework for Secure Video Streaming in Mobile Ad-Hoc Networks
LAP Lambert Academic Publishing
Soft Computing Frameworks for Adaptive and Intelligent Systems
CYBER SECURITY AND ETHICS
Optimized Deep Learning for Network Intrusion Detection
The Virtual Shark: IT Security and WEB Infrastructure Vulnerabilities
Exploiting Similarity Patterns: To Build Generic Test Case Templates for Software Product Line Testing
LAP Lambert Academic Publishing
Mastering Cybersecurity Principles, Practices, and Emerging Trends: A Quick Practical Approach
Relational Database Management Systems: Database Concepts and Database Management System Software
Software Engineering: Part 1
Raspberry Pi Hacking: Unleashing Ethical Hacking, Pentesting and IoT Exploits
RELIABILITY ASSESSMENT OF COMPLEX SYSTEMS
Retention and Relapse: Procurement To Prevent Reversion
The CTF Playbook: A Guide to Mastering Capture the Flag Challenges
Supporting Reengineering Software Variants into Software Product Lines: Recovering Traceability Links between Software Artifacts
LAP Lambert Academic Publishing
Unravelling the Secrets of Cybersecurity: Hacking the Future
Model-Based Secure Software Development with Modularity, Reusability: A Model-Driven Security Approach
LAP Lambert Academic Publishing
Cybersecurity: Past, Present and Future
Critical Infrastructure Protection in the Light of the Armed Conflicts (Advanced Sciences and Technologies for Security Applications)