Using Google to find security vulnerabilities

http://twimgs.com/darkreading/vulnerabilitymgmt/S4440312_Google_vulnmgmt.pdf

About Prof Looby

Prof James G. Looby
Chair Computing and Information Sciences
Hudson Valley Community College

This entry was posted in Emergent Topics and tagged . Bookmark the permalink.

Leave a Reply