Vulnerability exploitation: the problem of protecting our weakest links

SM Furnell

Research output: Contribution to journalArticlepeer-review

Original languageEnglish
Pages (from-to)12-15
Number of pages3
JournalComputer Fraud & Security
Volume11
Issue number0
Publication statusPublished - 1 Jan 2003

Cite this