Online copy of the book "Computer Vulnerabilities" covers a complete description of how vulnerabilities can be catagoried, adding great detail to previous works on vulnerability taxonomies. This book is a draft, but because of the dynamic nature of network publications, can be revised at any time.
b017addf7ec81401e5026b13d3fc00546528550c6a103037ac50b5b1932788c8