National Vulnerability Database

Results: 57



#Item
41National Software Reference Library / Security Content Automation Protocol / National Vulnerability Database / Dynamic-link library / Crypt / Vulnerability / Computer security / Computing / Cyberwarfare

Cyber-Infrastructure Uses for the NIST NSRL Douglas
White Disclaimer

Add to Reading List

Source URL: www.nsrl.nist.gov

Language: English - Date: 2009-05-20 11:51:25
42Federal Information Security Management Act / Security Technical Implementation Guide / Security Content Automation Protocol / Electronics / Law / National Vulnerability Database / Computer security / Computing / Federal Desktop Core Configuration

Federal Desktop Core Configuration (FDCC) FDCC Implementers Workshop January 24, 2008 NIST Computer Security Division

Add to Reading List

Source URL: nvd.nist.gov

Language: English - Date: 2012-07-31 09:55:06
43Security Content Automation Protocol / Extensible Configuration Checklist Description Format / National Vulnerability Database / Validation / Vulnerability / Open Vulnerability and Assessment Language / Test method / CVSS / Information Security Automation Program / Computer security / Cyberwarfare / Security

NISTIR 7511 Revision 1, Security Content Automation Protocol (SCAP) Version 1.0 Validation Program Test Requirements (DRAFT)

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-04-29 11:27:39
44Security Content Automation Protocol / Extensible Configuration Checklist Description Format / National Vulnerability Database / Federal Information Security Management Act / Open Vulnerability and Assessment Language / Vulnerability / McAfee / National Cybersecurity Center / Mitre Corporation / Computer security / Security / Computing

September 27-29, 2010  Baltimore, Maryland Baltimore Convention Center Conference Agenda Monday, September 27 7:00 – 9:00 am

Add to Reading List

Source URL: scap.nist.gov

Language: English - Date: 2013-12-31 15:31:49
45Computing / Angela Orebaugh / Federal Information Security Management Act / National Institute of Standards and Technology / Automation / Information security / Information Security Automation Program / National Vulnerability Database / Computer security / Security / Security Content Automation Protocol

September 27 – 29, 2010, Baltimore Convention Center Focusing on Emerging Automation Specifications and Use Cases, Software Assurance, Healthcare IT, Cyber Security, and Regulatory Compliance th Sponsors

Add to Reading List

Source URL: scap.nist.gov

Language: English - Date: 2013-12-31 15:31:49
46CVSS / Vulnerability / National Vulnerability Database / Cross-site request forgery / Social vulnerability / Security Content Automation Protocol / Security risk / Computer security / Cyberwarfare / Security

CVSS Implementation Guidance

Add to Reading List

Source URL: nvlpubs.nist.gov

Language: English - Date: 2014-04-28 10:50:19
47Computer network security / Risk / CVSS / Vulnerability / Social vulnerability / Common Weakness Enumeration / Common Vulnerabilities and Exposures / National Vulnerability Database / Cross-site scripting / Computer security / Cyberwarfare / Security

ITL Bulletin, Release of NIST Interagency Report 7946, CVSS Implementation Guidance (July 2014)

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-07-10 10:49:21
48Security Content Automation Protocol / National Vulnerability Database / CVSS / Vulnerability / Common Vulnerabilities and Exposures / Extensible Configuration Checklist Description Format / Social vulnerability / United States Computer Emergency Readiness Team / Information security / Computer security / Security / Cyberwarfare

ITL BULLETIN FOR DECEMBER 2013 THE NATIONAL VULNERABILITY DATABASE (NVD): OVERVIEW Harold Booth, Doug Rike and Greg Witte, Editors Computer Security Division Information Technology Laboratory National Institute of Standa

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-12-17 16:45:44
49Security Content Automation Protocol / Extensible Configuration Checklist Description Format / Federal Information Security Management Act / National Vulnerability Database / Security controls / National Institute of Standards and Technology / Information security / Open Vulnerability and Assessment Language / Information Security Automation Program / Computer security / Security / Computing

ITL Bulletin January 2012, Advancing Security Automation and Standardization: Revised Technical Specifications Issued for the Security Content Automation Protocol (SCAP)

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-04-16 14:29:27
50Public safety / CVSS / Vulnerability / Security Content Automation Protocol / Social vulnerability / National Vulnerability Database / Information security / Risk / IT risk management / Computer security / Security / Cyberwarfare

Quantitative Assessment of Software Vulnerabilities Based on Economic-Driven Security Metrics Hamza Ghani, Jesus Luna, Neeraj Suri Technische Universit¨at Darmstadt, Germany {ghani, jluna, suri}@deeds.informatik.tu-darm

Add to Reading List

Source URL: www1.deeds.informatik.tu-darmstadt.de

Language: English - Date: 2013-09-23 05:44:22
UPDATE