Common Vulnerabilities and Exposures

Results: 109



#Item
41A Progress Report on the CVE Initiative Robert Martin / Steven Christey / David Baker The MITRE Corporation MOTIVATION FOR CVE Common Vulnerabilities and Exposures (CVE) is an international, community-based effort, inclu

A Progress Report on the CVE Initiative Robert Martin / Steven Christey / David Baker The MITRE Corporation MOTIVATION FOR CVE Common Vulnerabilities and Exposures (CVE) is an international, community-based effort, inclu

Add to Reading List

Source URL: www.cve.mitre.org

Language: English - Date: 2007-09-17 13:56:19
42PERSPECTIVES  Managing Vulnerabilities in Networked Systems

PERSPECTIVES Managing Vulnerabilities in Networked Systems

Add to Reading List

Source URL: www.cve.mitre.org

Language: English - Date: 2007-09-17 13:54:31
43Special Publication[removed]Report on the Third Static Analysis Tool Exposition (SATE[removed]Editors: Vadim Okun

Special Publication[removed]Report on the Third Static Analysis Tool Exposition (SATE[removed]Editors: Vadim Okun

Add to Reading List

Source URL: samate.nist.gov

Language: English - Date: 2013-05-07 16:54:58
44Vulnerability / Open Vulnerability and Assessment Language / Social vulnerability / Common Vulnerabilities and Exposures / Information security / Information assurance / SAINT / Information assurance vulnerability alert / Computer security / Cyberwarfare / Security

Information Assurance Vulnerability Assessment Tool 2. Task Order Title Enterprise License for an automated Information Assurance Vulnerability Management (IAVM) Compliance Tool. Background

Add to Reading List

Source URL: www.cve.mitre.org

Language: English - Date: 2007-09-17 15:17:16
45Mitre Corporation / Failure / Hacking / Software testing / Cross-platform software / Computer security / Cyberwarfare / Common Vulnerabilities and Exposures

A Progress Report on the CVE Initiative Robert Martin / Steven Christey / David Baker The MITRE Corporation

Add to Reading List

Source URL: www.cve.mitre.org

Language: English - Date: 2007-09-17 13:56:42
46The Vulnerabilities of Developing on the NET  Robert A. Martin April 2001 Published in

The Vulnerabilities of Developing on the NET Robert A. Martin April 2001 Published in

Add to Reading List

Source URL: www.cve.mitre.org

Language: English - Date: 2007-09-17 13:52:21
47Microsoft Word - qop12f-okun.doc

Microsoft Word - qop12f-okun.doc

Add to Reading List

Source URL: samate.nist.gov

Language: English - Date: 2013-05-07 16:54:57
48Columns Measuring vs. Modeling D a n Geer a n d M i ch a e l R o y t m a n Dan Geer is the CISO for In-QTel and a security researcher with a quantitative bent. He has

Columns Measuring vs. Modeling D a n Geer a n d M i ch a e l R o y t m a n Dan Geer is the CISO for In-QTel and a security researcher with a quantitative bent. He has

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2015-03-03 06:41:17
49JPCERT/CC Activities Overview [July 1, 2014 – September 30, 2014]

JPCERT/CC Activities Overview [July 1, 2014 – September 30, 2014]

Add to Reading List

Source URL: www.jpcert.or.jp

Language: English - Date: 2014-12-22 00:17:40
50Communication / Canadian Numbering Administration Consortium / North American Numbering Plan / Civil law / Canadian Radio-television and Telecommunications Commission / Common Vulnerabilities and Exposures / Assignment / Telephone numbering plan / Telephone number / Telephone numbers / Identifiers / Law

Canadian Adjunct to the INC[removed]Number Assignment Guidelines Approved: 13 April[removed]Number Assignment Guidelines ATIS[removed] Reissued: March 23, 2004 _____________________________________________________

Add to Reading List

Source URL: www.crtc.gc.ca

Language: English - Date: 2014-12-16 15:55:17