Now showing items 1-1 of 1
Protecting computer systems through eliminating or analyzing vulnerabilities
(Georgia Institute of Technology, 2016-08-01)
There have been tremendous efforts to build fully secure computer systems, but it is not an easy goal. Making a simple mistake introduces a vulnerability, which can critically endanger a whole system's security. This ...