Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
Much debate has been given as to whether computer security is improved through the full disclosure of security vulnerabilities versus keeping the problems private and unspoken. Although there is still tension between those who feel strongly about the subject, a middle ground of responsible disclosure seems to have emerged. Unfortunately, just as we’ve moved into an era with more responsible disclosure, it would seem that a market has emerged for security vulnerabilities and zero day exploits. Disclosure of Security Vulnerabilities: Legal and Ethical Issues considers both the ethical and legal…mehr
Much debate has been given as to whether computer security is improved through the full disclosure of security vulnerabilities versus keeping the problems private and unspoken. Although there is still tension between those who feel strongly about the subject, a middle ground of responsible disclosure seems to have emerged. Unfortunately, just as we’ve moved into an era with more responsible disclosure, it would seem that a market has emerged for security vulnerabilities and zero day exploits. Disclosure of Security Vulnerabilities: Legal and Ethical Issues considers both the ethical and legal issues involved with the disclosure of vulnerabilities and explores the ways in which law might respond to these challenges.
Foreword.- Introduction.- Types of Disclosure.- Methods of Discovering Security Vulnerabilities.- Criminal Offences: Unauthorised Access, Modification or Interference Comprovisions.- Other Legal and Ethical Issues.- Conclusion.- Glossary of Terms.- Appendix: Comparative Tables.
Foreword.- Introduction.- Types of Disclosure.- Methods of Discovering Security Vulnerabilities.- Criminal Offences: Unauthorised Access, Modification or Interference Comprovisions.- Other Legal and Ethical Issues.- Conclusion.- Glossary of Terms.- Appendix: Comparative Tables.
Foreword.- Introduction.- Types of Disclosure.- Methods of Discovering Security Vulnerabilities.- Criminal Offences: Unauthorised Access, Modification or Interference Comprovisions.- Other Legal and Ethical Issues.- Conclusion.- Glossary of Terms.- Appendix: Comparative Tables.
Foreword.- Introduction.- Types of Disclosure.- Methods of Discovering Security Vulnerabilities.- Criminal Offences: Unauthorised Access, Modification or Interference Comprovisions.- Other Legal and Ethical Issues.- Conclusion.- Glossary of Terms.- Appendix: Comparative Tables.
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Shop der buecher.de GmbH & Co. KG Bürgermeister-Wegele-Str. 12, 86167 Augsburg Amtsgericht Augsburg HRA 13309