Common Vulnerabilities and Exposures

Results: 109



#Item
81Vulnerability / Open Vulnerability and Assessment Language / Social vulnerability / Common Vulnerabilities and Exposures / Information security / Information assurance / SAINT / Information assurance vulnerability alert / Computer security / Cyberwarfare / Security

Information Assurance Vulnerability Assessment Tool 2. Task Order Title Enterprise License for an automated Information Assurance Vulnerability Management (IAVM) Compliance Tool. Background

Add to Reading List

Source URL: oval.mitre.org

Language: English - Date: 2006-04-11 15:56:23
82Computer network security / CVSS / Vulnerability / Open Vulnerability and Assessment Language / Common Vulnerabilities and Exposures / Security Content Automation Protocol / Computer security / Cyberwarfare / Mitre Corporation

CVE & CCE Overview David Mann, CVE Project Lead “Seek simplicity, and distrust it.” - A. N. Whitehead © 2006 The MITRE Corporation. All rights reserved

Add to Reading List

Source URL: nvd.nist.gov

Language: English - Date: 2012-07-31 09:52:12
83Library science / Information science / Mitre Corporation / Semantic Web / Common Vulnerabilities and Exposures / Controlled vocabulary / Thesaurus / Communications protocol / Mitre / Information / Science / Knowledge representation

Standards Development Toolkit: A Standards Theory Overview Dave Mann, Ph.D. JoAnn Brooks, Ph.D. © 2010 The MITRE Corporation. All rights reserved

Add to Reading List

Source URL: scap.nist.gov

Language: English - Date: 2013-12-31 15:31:52
84Security Content Automation Protocol / Extensible Configuration Checklist Description Format / Federal Information Security Management Act / Vulnerability / Open Vulnerability and Assessment Language / Security controls / Federal Desktop Core Configuration / IT risk / Common Vulnerabilities and Exposures / Computer security / Cyberwarfare / Security

FDCC & SCAP Content Challenges Kent Landfield Director, Risk and Compliance Security Research McAfee Labs Where we have been

Add to Reading List

Source URL: scap.nist.gov

Language: English - Date: 2013-12-31 15:31:48
85Computing / Extensible Configuration Checklist Description Format / Security Content Automation Protocol / CVSS / Common Vulnerabilities and Exposures / Open Vulnerability and Assessment Language / Vulnerability / Computer security / Cyberwarfare / Mitre Corporation

Security Content Automation  Protocol (SCAP) Introduction Andrew Buttner October 26th, 2009 Goals

Add to Reading List

Source URL: scap.nist.gov

Language: English - Date: 2013-12-31 15:31:46
86Security Content Automation Protocol / Extensible Configuration Checklist Description Format / Open Vulnerability and Assessment Language / CVSS / Vulnerability / Common Vulnerabilities and Exposures / Patch / Information Security Automation Program / Computer security / Cyberwarfare / Computing

SCAP Overview Karen Scarfone September 27, 2010 SCAP 101 Tutorial Track

Add to Reading List

Source URL: scap.nist.gov

Language: English - Date: 2013-12-31 15:31:52
87Software testing / Hacking / Cross-platform software / Vulnerability / Debian / Capability-based security / Requirement / Common Vulnerabilities and Exposures / Computer security / Software / Cyberwarfare

Requirements and Recommendations for CVE Compatibility This is a draft report and does not represent an official position of The MITRE Corporation. © 2013, The MITRE Corporation. All rights reserved. Permission is grant

Add to Reading List

Source URL: cve.mitre.org

Language: English - Date: 2013-07-10 15:37:57
88Software testing / Software quality / Computer network security / Hacking / Vulnerability / Software assurance / Veracode / CWE / Common Vulnerabilities and Exposures / Computer security / Cyberwarfare / Computing

Microsoft Word - BeingExplicit_WP.doc

Add to Reading List

Source URL: cwe.mitre.org

Language: English - Date: 2007-07-02 14:11:15
89Computer network security / Hacking / Software testing / Software quality / Vulnerability / Software assurance / Common Vulnerabilities and Exposures / Attack / Malware / Cyberwarfare / Computer security / Security

FROM THE SPONSOR CrossTalk would like to thank DHS for sponsoring this issue. Our information and communications technology (ICT) assets are under constant attack. Thwarting the active attacker is not something most des

Add to Reading List

Source URL: www.crosstalkonline.org

Language: English - Date: 2014-03-01 20:52:21
90Hacking / Computer network security / Mitre Corporation / Software testing / Common Vulnerabilities and Exposures / Vulnerability / White hat / Hacker / Social vulnerability / Computer security / Cyberwarfare / Security

The Vulnerabilities of Developing on the NET Robert A. Martin April 2001 Published in

Add to Reading List

Source URL: cve.mitre.org

Language: English - Date: 2007-09-17 13:52:21
UPDATE