Abstract
This article presents the results of an investigation of literature and the development of a method that management can use to understand and prioritise software vulnerabilities.
| Original language | English |
|---|---|
| Pages | 1-11 |
| Number of pages | 11 |
| Specialist publication | Computer Weekly |
| Publication status | Published - Mar 2015 |
Keywords
- Computer Weekly Royal Holloway info security thesis series
- software vulnerabilities
- THREAT
- business risks
Cite this
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver