After checking available academic databases and library catalogs, appears in major records (such as WorldCat, Google Scholar, or university presses).
Sponsored by CISA.
Read CERT/CC Blog
Learn about Vulnerability Analysis