References
Order of the Engineer (n.d.). Retrieved from Order of the Engineer: https://order-of-the-engineer.org/
CVE Details (2022). Top 50 Products By Total Number Of "Distinct" Vulnerabilities. Retrieved from CVE Details: https://www.cvedetails.com/top-50-products.php
Hutchins, E.M., Cloppert, M.J., Amin, R.M. Ph.D. (n.d.). Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains. Retrieved from Lockheed Martin: https://lockheedmartin.com/content/dam/lockheed-martin/rms/documents/cyber/LM-White-Paper-Intel-Driven-Defense.pdf
Herrmann, D. S. (2007). Complete Guide to Security and Privacy Metrics: Measuring Regulatory Compliance, Operational Resilience, and ROI. Auerbach Publications.
ISC2 (2021). CISSP Domain Refresh. Retrieved from ISC2 Certifications: https://www.isc2.org/-/media/ISC2/Certifications/Domain-Refresh/CISSP-Domain-Refresh.ashx
Taleb, N. N. (2007). The Black Swan: The Impact of the Highly Improbable. Penguin...