National Vulnerability Database

Results: 57



#Item
21National Vulnerability Database Product Ontology Paul Cichonski Booz Allen Hamilton / NIST

National Vulnerability Database Product Ontology Paul Cichonski Booz Allen Hamilton / NIST

Add to Reading List

Source URL: scap.nist.gov

Language: English - Date: 2013-12-31 15:31:49
22NIST SP[removed], Guide to Adopting and Using the Security Content Automation Protocol (SCAP) Version 1.2 (Draft)

NIST SP[removed], Guide to Adopting and Using the Security Content Automation Protocol (SCAP) Version 1.2 (Draft)

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-04-25 15:15:06
23APRIL[removed]REPORT NO[removed]AUDITOR GENERAL DAVID W. MARTIN, CPA

APRIL[removed]REPORT NO[removed]AUDITOR GENERAL DAVID W. MARTIN, CPA

Add to Reading List

Source URL: www.myflorida.com

Language: English - Date: 2008-04-18 08:45:40
24Information Resources Management Policy Manual APPENDIX A – GLOSSARY – July 21, 1987

Information Resources Management Policy Manual APPENDIX A – GLOSSARY – July 21, 1987

Add to Reading List

Source URL: www.epa.gov

Language: English - Date: 2009-12-18 16:06:14
25STANDARD ADMINISTRATIVE PROCEDURE[removed]M1.11 Information Resources – Intrusion Detection Approved July 18, 2005 Revised April 27, 2010

STANDARD ADMINISTRATIVE PROCEDURE[removed]M1.11 Information Resources – Intrusion Detection Approved July 18, 2005 Revised April 27, 2010

Add to Reading List

Source URL: rules-saps.tamu.edu

Language: English - Date: 2013-08-29 19:16:15
26AUGUST[removed]REPORT NO[removed]AUDITOR GENERAL WILLIAM O. MONROE, CPA

AUGUST[removed]REPORT NO[removed]AUDITOR GENERAL WILLIAM O. MONROE, CPA

Add to Reading List

Source URL: www.myflorida.com

Language: English - Date: 2005-09-02 09:07:58
27The Process of Analyzing Failure Reports to Determine the Number of Variables Interacting in a Software Failure

The Process of Analyzing Failure Reports to Determine the Number of Variables Interacting in a Software Failure

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-09-03 21:04:32
28Common Vulnerabilities and Exposures — CVE ® The Standard for Information Security Vulnerability Names CVE is a dictionary of common names for publicly known information security vulnerabilities. CVE’s common

Common Vulnerabilities and Exposures — CVE ® The Standard for Information Security Vulnerability Names CVE is a dictionary of common names for publicly known information security vulnerabilities. CVE’s common

Add to Reading List

Source URL: measurablesecurity.mitre.org

Language: English - Date: 2013-07-08 10:01:53
29Microsoft Word - Syllabus_SC_Ver1.0_clean.doc

Microsoft Word - Syllabus_SC_Ver1.0_clean.doc

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2013-12-03 21:30:32
30NISTIR 7435, The Common Vulnerability Scoring System (CVSS) and Its Applicability to Federal Agency Systems

NISTIR 7435, The Common Vulnerability Scoring System (CVSS) and Its Applicability to Federal Agency Systems

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-02-29 19:00:32