Security Content Automation Protocol

Results: 190



#Item
1NIST SP 800-126A, SCAP 1.3 Component Specification Version Updates

NIST SP 800-126A, SCAP 1.3 Component Specification Version Updates

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2016-07-18 13:17:50
2NIST SPRevision 3, The Technical Specification for SCAP Version 1.3

NIST SPRevision 3, The Technical Specification for SCAP Version 1.3

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2016-07-18 13:14:41
3Computer security / Information Security Automation Program / National security / Security Content Automation Protocol

SCAP Conformance Testing Request for Information SCAP Conformance Testing Request for Information

Add to Reading List

Source URL: www.atsec.com

Language: English - Date: 2015-09-14 07:11:13
4ITL Bulletin, Updates to the NIST SCAP Validation Program and Associated Test Requirements (March 2016)

ITL Bulletin, Updates to the NIST SCAP Validation Program and Associated Test Requirements (March 2016)

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2016-03-15 12:05:28
5Draft NISTIR 7511 Revision 4, Security Content Automation Protocol (SCAP) Version 1.2 Validation Program Test Requirements

Draft NISTIR 7511 Revision 4, Security Content Automation Protocol (SCAP) Version 1.2 Validation Program Test Requirements

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2016-01-28 22:18:47
    6Standards in reporting Software Flaws: SCAP, CVE and CWE Robin A. Gandhi, Ph.D. University of Nebraska at Omaha (UNO) College of Information Science and Technology (IS&T) School of Interdisciplinary Informatics (Si2)

    Standards in reporting Software Flaws: SCAP, CVE and CWE Robin A. Gandhi, Ph.D. University of Nebraska at Omaha (UNO) College of Information Science and Technology (IS&T) School of Interdisciplinary Informatics (Si2)

    Add to Reading List

    Source URL: www.nebraskacert.org

    Language: English - Date: 2010-05-19 17:57:00
    7Security Content Metadata Model with an Efficient Search Methodology for Real Time Monitoring and Threat Intelligence Preeti Subramanian  Abstract

    Security Content Metadata Model with an Efficient Search Methodology for Real Time Monitoring and Threat Intelligence Preeti Subramanian Abstract

    Add to Reading List

    Source URL: www.blackhat.com

    Language: English - Date: 2015-05-28 15:50:49
    8Security Content Metadata Model with an Efficient Search Methodology for Real Time Monitoring and Threat Intelligence Preeti Subramanian  Abstract

    Security Content Metadata Model with an Efficient Search Methodology for Real Time Monitoring and Threat Intelligence Preeti Subramanian Abstract

    Add to Reading List

    Source URL: www.secpod.com

    Language: English - Date: 2015-04-02 06:08:19
    9Microsoft Word - Compliance -1 1

    Microsoft Word - Compliance -1 1

    Add to Reading List

    Source URL: www.secpod.com

    Language: English - Date: 2015-03-27 09:58:01
    10Avoiding Inconsistencies in the Security Content Automation Protocol William M. Fitzgerald Computer Science Department University College Cork Ireland

    Avoiding Inconsistencies in the Security Content Automation Protocol William M. Fitzgerald Computer Science Department University College Cork Ireland

    Add to Reading List

    Source URL: www.cs.ucc.ie

    Language: English - Date: 2013-08-16 10:44:34