Vulnerability database

Results: 242



#Item
231Data security / Computer network security / Data privacy / Information Risk Management / Health Insurance Portability and Accountability Act / Information security / Vulnerability / Database security / Payment Card Industry Data Security Standard / Computer security / Security / Cyberwarfare

ecfirst Services 2014 © All Rights Reserved || Confidential || ecfirst[removed] || www.ecfirst.com Page 1

Add to Reading List

Source URL: www.ecfirst.com

Language: English - Date: 2014-05-12 02:33:20
232Data security / Computer network security / Data privacy / Information Risk Management / Health Insurance Portability and Accountability Act / Information security / Vulnerability / Database security / Payment Card Industry Data Security Standard / Computer security / Security / Cyberwarfare

ecfirst Services 2014 © All Rights Reserved || Confidential || ecfirst[removed] || www.ecfirst.com Page 1

Add to Reading List

Source URL: www.ecfirst.com

Language: English - Date: 2014-06-03 07:38:16
233Extensible Configuration Checklist Description Format / Federal Information Security Management Act / National Vulnerability Database / Angela Orebaugh / NIST Special Publication 800-53 / HTML / National Institute of Standards and Technology / Specification / Open Vulnerability and Assessment Language / Computer security / Computing / Security Content Automation Protocol

NIST SP[removed]Revision 1, The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.1

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-02-09 17:09:01
234Cryptographic protocols / Secure multi-party computation / Trusted Computing / Information privacy / Privacy / Internet privacy / Statistical database / Secure two-party computation / Vulnerability / Cryptography / Computer security / Ethics

Report on DIMACS∗ Working Group on Challenges for Cryptographers in Health Data Privacy Date of working group meeting: June 30, 2004 Working Group Organizers: Benny Pinkas, HP Labs Kobbi Nissim, Microsoft Research

Add to Reading List

Source URL: dimacs.rutgers.edu

Language: English - Date: 2004-08-16 11:11:48
235Computer network security / Data security / Crime prevention / National security / Application security / Database security / Information security / Vulnerability / Security controls / Computer security / Security / Cyberwarfare

08FNS_FishNetSecurity_logo

Add to Reading List

Source URL: www.fishnetsecurity.com

Language: English - Date: 2013-09-17 11:35:14
236Security Content Automation Protocol / National Vulnerability Database / Information Security Automation Program / Federal Information Security Management Act / Extensible Configuration Checklist Description Format / Vulnerability / NIST Special Publication 800-53 / Information security management system / Security controls / Computer security / Security / Cyberwarfare

Information Security Automation Program Automating Vulnerability Management, Security Measurement, and Compliance

Add to Reading List

Source URL: nvd.nist.gov

Language: English - Date: 2012-07-31 09:53:44
237Security / Technology / Extensible Configuration Checklist Description Format / Federal Information Security Management Act / National Vulnerability Database / Angela Orebaugh / Specification / Portable Document Format / Open Vulnerability and Assessment Language / Computer security / Computing / Security Content Automation Protocol

NIST SP[removed]Revision 2, The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.1

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-02-09 17:12:26
238Security Content Automation Protocol / Extensible Configuration Checklist Description Format / Federal Information Security Management Act / National Vulnerability Database / Angela Orebaugh / Open Vulnerability and Assessment Language / XML / Portable Document Format / National Information Exchange Model / Computing / Computer security / Information

NIST SP[removed], The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.0

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-02-09 17:04:50
239Data / SQL / Relational database management systems / Software testing / SQL injection / Microsoft SQL Server / Stored procedure / Password / Vulnerability / Data management / Computing / Database management systems

A Classification of SQL Injection Attacks and Countermeasures William G.J. Halfond, Jeremy Viegas, and Alessandro Orso

Add to Reading List

Source URL: www.cc.gatech.edu

Language: English - Date: 2007-02-23 14:50:09
240Geographic information system / Earthquake engineering / Social vulnerability / Database / Seismic analysis / Civil engineering / Construction / Engineering

Geological Disaster database in china

Add to Reading List

Source URL: www.codata.org

Language: English - Date: 2013-06-23 17:23:09
UPDATE