Búsqueda

Decade retrospective : the state of vulnerabilities

<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.loc.gov/MARC21/slim http://www.loc.gov/standards/marcxml/schema/MARC21slim.xsd">
  <record>
    <leader>00000cab a22000004b 4500</leader>
    <controlfield tag="001">MAP20220021807</controlfield>
    <controlfield tag="003">MAP</controlfield>
    <controlfield tag="005">20220820194440.0</controlfield>
    <controlfield tag="008">220820e2022    usa|| p      |0|||b|eng d</controlfield>
    <datafield tag="040" ind1=" " ind2=" ">
      <subfield code="a">MAP</subfield>
      <subfield code="b">spa</subfield>
      <subfield code="d">MAP</subfield>
    </datafield>
    <datafield tag="084" ind1=" " ind2=" ">
      <subfield code="a">86</subfield>
    </datafield>
    <datafield tag="100" ind1="1" ind2=" ">
      <subfield code="0">MAPA20220007344</subfield>
      <subfield code="a">Srinivasan, Shrijin </subfield>
    </datafield>
    <datafield tag="245" ind1="1" ind2="0">
      <subfield code="a">Decade retrospective : the state of vulnerabilities</subfield>
      <subfield code="c">Shrijin Srinivasan,  Alex Rothacker</subfield>
    </datafield>
    <datafield tag="520" ind1=" " ind2=" ">
      <subfield code="a">The last decade has seen a number of defining moments that have had a major impact on the cybersecurity landscape. Severe vulnerabilities massive exploits and widespread cyberattacks have reshaped many aspects of modern security. To take stock of the past 10 years, security vendor Trustwave has published this article which includes a list of what it considers to be the 10 most prominent and notable network security issues of the past 10 years</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20140022700</subfield>
      <subfield code="a">Ciberseguridad</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20140023066</subfield>
      <subfield code="a">Ciberataques</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20080571009</subfield>
      <subfield code="a">Vulnerabilidad</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20080571566</subfield>
      <subfield code="a">Casos prácticos</subfield>
    </datafield>
    <datafield tag="700" ind1="1" ind2=" ">
      <subfield code="0">MAPA20220007368</subfield>
      <subfield code="a">Rothacker, Alex</subfield>
    </datafield>
    <datafield tag="710" ind1="2" ind2=" ">
      <subfield code="0">MAPA20220007351</subfield>
      <subfield code="a">Trustwave Holdings</subfield>
    </datafield>
    <datafield tag="773" ind1="0" ind2=" ">
      <subfield code="t">Trustwave SpiderLabs Blog.- Chicago : Trustwave Holdings</subfield>
      <subfield code="g">July 18, 2022</subfield>
    </datafield>
  </record>
</collection>