Chapter 1 The Importance of Threat Data and Intelligence
Chapter 2 Threat Intelligence in Support of Organizational Security
Chapter 3 Vulnerability Management Activities
Chapter 4 Vulnerability Assessment Tools
Chapter 5 Threats and Vulnerabilities Associated with Specialized Technology
Chapter 6 Threats and Vulnerabilities Associated with Operating in the Cloud
Chapter 7 Mitigating Controls for Attacks and Software Vulnerabilities
3.142.53.68