National Vulnerability Database

Results: 57



#Item
21Ontology / Information science / Technical communication / Data / Science / Resource Description Framework / Agricultural Ontology Service / Semantic Web / Information / Knowledge representation

National Vulnerability Database Product Ontology Paul Cichonski Booz Allen Hamilton / NIST

Add to Reading List

Source URL: scap.nist.gov

Language: English - Date: 2013-12-31 15:31:49
22Computing / Security Content Automation Protocol / National Vulnerability Database / Federal Information Security Management Act / Vulnerability / Information security management system / National Institute of Standards and Technology / Security controls / Configuration management / Computer security / Security / Cyberwarfare

NIST SP[removed], Guide to Adopting and Using the Security Content Automation Protocol (SCAP) Version 1.2 (Draft)

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-04-25 15:15:06
23Data security / Cyberwarfare / Crime prevention / National security / Information security / BearingPoint / Vulnerability / Information technology controls / Database security / Security / Computer security / Information technology audit

APRIL[removed]REPORT NO[removed]AUDITOR GENERAL DAVID W. MARTIN, CPA

Add to Reading List

Source URL: www.myflorida.com

Language: English - Date: 2008-04-18 08:45:40
24Crime prevention / National security / Database management systems / Computer network security / Information security / Vulnerability / Operating system / Automated information system / Information systems / Computing / Security / Computer security

Information Resources Management Policy Manual APPENDIX A – GLOSSARY – July 21, 1987

Add to Reading List

Source URL: www.epa.gov

Language: English - Date: 2009-12-18 16:06:14
25Public safety / Crime prevention / National security / Intrusion detection system / Information security / IT risk / Vulnerability / Physical security / Database security / Security / Data security / Computer security

STANDARD ADMINISTRATIVE PROCEDURE[removed]M1.11 Information Resources – Intrusion Detection Approved July 18, 2005 Revised April 27, 2010

Add to Reading List

Source URL: rules-saps.tamu.edu

Language: English - Date: 2013-08-29 19:16:15
26Cyberwarfare / Information technology audit / Crime prevention / National security / Information security / Security controls / Database security / Vulnerability / Information technology controls / Security / Computer security / Data security

AUGUST[removed]REPORT NO[removed]AUDITOR GENERAL WILLIAM O. MONROE, CPA

Add to Reading List

Source URL: www.myflorida.com

Language: English - Date: 2005-09-02 09:07:58
27Computer security / Computer jargon / National Vulnerability Database / Vulnerability / SQL injection / Error / Software bug / Crash / Database / Computing / Computer errors / Cyberwarfare

The Process of Analyzing Failure Reports to Determine the Number of Variables Interacting in a Software Failure

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-09-03 21:04:32
28Security / Common Vulnerabilities and Exposures / Computer network security / Software testing / Hacking / Security Content Automation Protocol / Vulnerability / National Vulnerability Database / Open Vulnerability and Assessment Language / Computer security / Cyberwarfare / Mitre Corporation

Common Vulnerabilities and Exposures — CVE ® The Standard for Information Security Vulnerability Names CVE is a dictionary of common names for publicly known information security vulnerabilities. CVE’s common

Add to Reading List

Source URL: measurablesecurity.mitre.org

Language: English - Date: 2013-07-08 10:01:53
29Crime prevention / Computer security / Data security / Information security / Application security / Penetration test / Database security / Vulnerability / Physical security / Security / Public safety / National security

Microsoft Word - Syllabus_SC_Ver1.0_clean.doc

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2013-12-03 21:30:32
30CVSS / Vulnerability / Security Content Automation Protocol / Security risk / Social vulnerability / Federal Information Security Management Act / IT risk / National Vulnerability Database / Information security / Computer security / Security / Cyberwarfare

NISTIR 7435, The Common Vulnerability Scoring System (CVSS) and Its Applicability to Federal Agency Systems

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-02-29 19:00:32
UPDATE