National Vulnerability Database

Results: 57



#Item
11Crime prevention / National security / Software testing / Integrity / Vulnerability / Database / Ring / Computer security / Security / Cyberwarfare

ABSTRACT KIL, CHONGKYUNG. Mechanisms for Protecting Software Integrity in Networked Systems. (Under the direction of Associate Professor Peng Ning). Protecting software integrity is a key to successfully maintain its own

Add to Reading List

Source URL: repository.lib.ncsu.edu

Language: English - Date: 2010-10-28 07:21:39
12Security / Crime prevention / National security / Network security / Database security / Vulnerability / Database / Internet security / Threat / Computer network security / Cyberwarfare / Computer security

WH IT E PA P E R An Inside-Out Approach to Enterprise Security When burglars break into a home, they look for electronics,

Add to Reading List

Source URL: www.oracle.com

Language: English
13Federal Information Security Management Act / Security Technical Implementation Guide / Security Content Automation Protocol / Electronics / Law / National Vulnerability Database / Computer security / Computing / Federal Desktop Core Configuration

Federal Desktop Core Configuration (FDCC) FDCC Implementers Workshop January 24, 2008 NIST Computer Security Division

Add to Reading List

Source URL: nvd.nist.gov

Language: English
14Crime prevention / Computer security / Computer network security / Oracle Database / Database security / Vulnerability / Oracle Corporation / Password policy / Physical security / Security / Public safety / National security

ORACLE Series Color profile: Generic CMYK printer profile Composite Default screen

Add to Reading List

Source URL: www.mhprofessional.com

Language: English - Date: 2005-11-17 09:49:18
15Security / Software testing / OWASP / Web application security / Vulnerability / Cross-site scripting / Application security / SQL injection / National Vulnerability Database / Computer security / Cyberwarfare / Computer network security

Preventive Approach for Web Applications Security Testing OWASP[removed]

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2011-12-11 14:43:27
16Computer network security / Secure communication / National security / Crime prevention / Data security / Identity theft / Data breach / Vulnerability / Credit card / Security / Cyberwarfare / Computer security

Metropolitan State University Likely Data Breach Q&A[removed]What happened? Metropolitan State University has learned of a computer security intrusion and a likely data breach. While we don’t believe a database serv

Add to Reading List

Source URL: www.metrostate.edu

Language: English - Date: 2015-01-16 10:12:54
17Security / CVSS / Common Vulnerabilities and Exposures / Vulnerability / National Vulnerability Database / Social vulnerability / Security Content Automation Protocol / SAINT / Computer security / Cyberwarfare / Computer network security

VULN Capability Description v2

Add to Reading List

Source URL: www.us-cert.gov

Language: English - Date: 2014-11-12 16:38:29
18Crime prevention / National security / Cyberwarfare / Information security / Asset / Vulnerability / Federal Information Security Management Act / Database security / Security / Computer security / Data security

PDF Document

Add to Reading List

Source URL: www.cio.ca.gov

Language: English - Date: 2013-06-28 15:17:47
19Cyberwarfare / Information technology audit / Information security / National security / Vulnerability / Audit / IT risk / Database security / Computer security / Security / Data security

NISD-K304-111 Management Standards for Information Security Measures for the Central Government Computer Systems

Add to Reading List

Source URL: www.nisc.go.jp

Language: English - Date: 2013-01-31 20:44:38
20Cyberwarfare / Crime prevention / National security / Information security / Password / Vulnerability / Asset / Information security audit / Database security / Security / Data security / Computer security

EXECUTIVE SUMMARY The State Administrative Manual (SAM) requires each state agency to conduct a comprehensive risk assessment of its information assets every two years and or when ever there is significant change in th

Add to Reading List

Source URL: www.cio.ca.gov

Language: English - Date: 2013-06-28 15:17:37
UPDATE