CWE

Results: 336



#Item
261Cyberwarfare / Computer network security / CWE / Attack patterns / Vulnerability / Penetration test / Software testing / Hacking / Computer security

Software Assurance Engineering for Attacks Known Threat Actors

Add to Reading List

Source URL: measurablesecurity.mitre.org

Language: English - Date: 2013-07-08 14:41:53
262Software bugs / Software testing / Directory traversal attack / Improper input validation / Canonicalization / UTF-8 / Pointer / Buffer overflow / File system / Computing / Cyberwarfare / Computer security

PDF Document

Add to Reading List

Source URL: cwe.mitre.org

Language: English - Date: 2014-07-31 15:32:17
263Organizational psychology / Testament of Pope Paul VI / Keirsey Temperament Sorter / Rational temperament / The Organ

What Students Say About CWE

Add to Reading List

Source URL: www.mendocino.edu

Language: English - Date: 2006-12-15 13:35:00
264Cooperative education / Internships / Northeastern University / Pedagogy / Rochester Institute of Technology / British Columbia Institute of Technology / Workplace bullying / Education / Learning / Employment

Centre for Workplace Education (CWE) Workplace Education / Co-op Employer Handbook Table of Contents Introduction .........................................................................................................

Add to Reading List

Source URL: www.bcit.ca

Language: English - Date: 2014-06-19 17:25:17
265National Environmental Policy Act / Council on Environmental Quality / Healthy Forests Initiative / Environmental impact statement / Wildfire / Environmental impact assessment / United States Forest Service / Endangered Species Act / Air pollution / Impact assessment / Environment / Prediction

CWE Ch 1 Ryan_LaFa with final edits 08_19_09

Add to Reading List

Source URL: www.na.fs.fed.us

Language: English - Date: 2012-10-15 19:30:15
266Computer network security / Mitre Corporation / United States Department of Defense / National security / Vulnerability / Cross-site scripting / Directory traversal attack / Common Weakness Enumeration / United States Department of Homeland Security / Cyberwarfare / Computer security / Failure

Knowing Your Weaknesses: The (CWE) Initiative Bob Martin September 27, 2010

Add to Reading List

Source URL: scap.nist.gov

Language: English - Date: 2013-12-31 15:31:52
267English phonology / Latin alphabets

Im p ro p e r ch o ice o f in itia l p ro te ctio n d o m a in i ncor r ect init ial ass i g nment of s ecuri ty or int egri ty l evel at s ys t em init ial i zat i on or generation; a s ec urity c ritic al func tion m a

Add to Reading List

Source URL: cwe.mitre.org

Language: English - Date: 2006-09-13 14:57:18
268Software testing / Computer network security / Common Weakness Enumeration / Hacking / Software quality / Electronic commerce / Vulnerability / CWE / Buffer overflow / Computer security / Cyberwarfare / Software

Common Weakness Scoring System — CWSS™ Scoring the Severity of Software Weaknesses CWSS is a mechanism for scoring the severity of Common Weakness Enumeration (CWE™) entries discovered in an enterprise’s software

Add to Reading List

Source URL: makingsecuritymeasurable.mitre.org

Language: English - Date: 2013-07-08 10:01:54
269Occitan phonology / English phonology / Language / English orthography

B u ffe r o ve rflo w A buffer overflow condition exists when a program attem pts to put m ore data in a buffer than it can hold or when a program attem pts to put data in a m em ory area past a buffer. In this case, a b

Add to Reading List

Source URL: cwe.mitre.org

Language: English - Date: 2006-09-13 14:57:15
270CWE / Software quality

CWE Mapping Analysis  Introduction As CWE grows, it is important to understand how it is used, and if the usage can be affected by the amount and quality of coverage. To attempt to measure coverage, the mapping of ind

Add to Reading List

Source URL: cwe.mitre.org

Language: English - Date: 2008-09-03 15:50:00
UPDATE