Lobachova, K.; Kharchenko, V. (ХАІ, 2007)
Modern vulnerability resources are considered, their content, security and recovery time of different software
products are analyzed. To make the process smoother and more efficient three main stages are distinguished:
source ...