August 2018
Intermediate to advanced
254 pages
6h 20m
English
This book is for security analysts, threat analysts, and any security professionals responsible for developing a network threat model for an organization. This book is also for any individual who is or wants to be part of a vulnerability management team and implement an end-to-end robust vulnerability management program.
Read now
Unlock full access