<--- Back to Details
First PageDocument Content
Cyberwarfare / Computer network security / CWE / Attack patterns / Vulnerability / Penetration test / Software testing / Hacking / Computer security
Date: 2013-07-08 14:41:53
Cyberwarfare
Computer network security
CWE
Attack patterns
Vulnerability
Penetration test
Software testing
Hacking
Computer security

Software Assurance Engineering for Attacks Known Threat Actors

Add to Reading List

Source URL: measurablesecurity.mitre.org

Download Document from Source Website

File Size: 3,65 MB

Share Document on Facebook

Similar Documents

PDF Document

DocID: 1vNuf - View Document

CWE Flow-based Market Coupling Project 1 Agenda

DocID: 1uYMq - View Document

CWE Enhanced Flow-Based MC feasibility report Version 2.0

DocID: 1uMEG - View Document

Im p ro p e r ch o ice o f in itia l p ro te ctio n d o m a in i ncor r ect init ial ass i g nment of s ecuri ty or int egri ty l evel at s ys t em init ial i zat i on or generation; a s ec urity c ritic al func tion m a

DocID: 1uE8i - View Document

Scoles di rfondou walon d’ Bive do 14 di måssSicole Les årtikes nén definixhants Cwè çki c’ est d’ ça po ene biesse ?

DocID: 1uB63 - View Document