National Vulnerability Database

Results: 57



#Item
11ABSTRACT KIL, CHONGKYUNG. Mechanisms for Protecting Software Integrity in Networked Systems. (Under the direction of Associate Professor Peng Ning). Protecting software integrity is a key to successfully maintain its own

ABSTRACT KIL, CHONGKYUNG. Mechanisms for Protecting Software Integrity in Networked Systems. (Under the direction of Associate Professor Peng Ning). Protecting software integrity is a key to successfully maintain its own

Add to Reading List

Source URL: repository.lib.ncsu.edu

Language: English - Date: 2010-10-28 07:21:39
12WH IT E PA P E R  An Inside-Out Approach to Enterprise Security When burglars break into a home, they look for electronics,

WH IT E PA P E R An Inside-Out Approach to Enterprise Security When burglars break into a home, they look for electronics,

Add to Reading List

Source URL: www.oracle.com

Language: English
13Federal Desktop Core Configuration (FDCC) FDCC Implementers Workshop January 24, 2008 NIST Computer Security Division

Federal Desktop Core Configuration (FDCC) FDCC Implementers Workshop January 24, 2008 NIST Computer Security Division

Add to Reading List

Source URL: nvd.nist.gov

Language: English
14ORACLE Series Color profile: Generic CMYK printer profile Composite Default screen

ORACLE Series Color profile: Generic CMYK printer profile Composite Default screen

Add to Reading List

Source URL: www.mhprofessional.com

Language: English - Date: 2005-11-17 09:49:18
15Preventive Approach for Web Applications Security Testing OWASP[removed]

Preventive Approach for Web Applications Security Testing OWASP[removed]

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2011-12-11 14:43:27
16Metropolitan State University Likely Data Breach Q&A[removed]What happened? Metropolitan State University has learned of a computer security intrusion and a likely data breach. While we don’t believe a database serv

Metropolitan State University Likely Data Breach Q&A[removed]What happened? Metropolitan State University has learned of a computer security intrusion and a likely data breach. While we don’t believe a database serv

Add to Reading List

Source URL: www.metrostate.edu

Language: English - Date: 2015-01-16 10:12:54
17VULN Capability Description v2

VULN Capability Description v2

Add to Reading List

Source URL: www.us-cert.gov

Language: English - Date: 2014-11-12 16:38:29
18

PDF Document

Add to Reading List

Source URL: www.cio.ca.gov

Language: English - Date: 2013-06-28 15:17:47
19NISD-K304-111  Management Standards for Information Security Measures for the Central Government Computer Systems

NISD-K304-111 Management Standards for Information Security Measures for the Central Government Computer Systems

Add to Reading List

Source URL: www.nisc.go.jp

Language: English - Date: 2013-01-31 20:44:38
20Cyberwarfare / Crime prevention / National security / Information security / Password / Vulnerability / Asset / Information security audit / Database security / Security / Data security / Computer security

EXECUTIVE SUMMARY The State Administrative Manual (SAM) requires each state agency to conduct a comprehensive risk assessment of its information assets every two years and or when ever there is significant change in th

Add to Reading List

Source URL: www.cio.ca.gov

Language: English - Date: 2013-06-28 15:17:37