Is Your Vulnerability Management Program Keeping Pace With Risks?
Best Practice Next-Generation Vulnerability Management to Identify Threats, Eliminate Risk and Prevent Attacks
Chapter 22: Input/Output Copyright © 2008 W. W. Norton & Company. All rights reserved. 1 Chapter 22 Input/Output.