Common Vulnerabilities and Exposures

Results: 109



#Item
71Software Assurance Countermeasures in Program Protection Planning MARCH[removed]Deputy Assistant Secretary of Defense for Systems Engineering

Software Assurance Countermeasures in Program Protection Planning MARCH[removed]Deputy Assistant Secretary of Defense for Systems Engineering

Add to Reading List

Source URL: www.acq.osd.mil

Language: English - Date: 2014-03-27 16:11:00
72Common Vulnerabilities and Exposures — CVE ® The Standard for Information Security Vulnerability Names CVE is a dictionary of common names for publicly known information security vulnerabilities. CVE’s common

Common Vulnerabilities and Exposures — CVE ® The Standard for Information Security Vulnerability Names CVE is a dictionary of common names for publicly known information security vulnerabilities. CVE’s common

Add to Reading List

Source URL: measurablesecurity.mitre.org

Language: English - Date: 2013-07-08 10:01:53
73Making Security Measurable and Manageable Robert A. Martin The MITRE Corporation S

Making Security Measurable and Manageable Robert A. Martin The MITRE Corporation S

Add to Reading List

Source URL: www.crosstalkonline.org

Language: English - Date: 2010-10-29 19:05:09
74Common Vulnerabilities and Exposures  With CVE Without CVE IBM

Common Vulnerabilities and Exposures With CVE Without CVE IBM

Add to Reading List

Source URL: measurablesecurity.mitre.org

- Date: 2013-07-08 14:41:52
    75Microsoft Word - CVE_Update_2 0.docx

    Microsoft Word - CVE_Update_2 0.docx

    Add to Reading List

    Source URL: www.supermicro.com

    Language: English - Date: 2014-03-19 13:44:29
    76NIST SP[removed],Guide to Adopting and Using the Security Content Automation Protocol (SCAP) Version 1.0

    NIST SP[removed],Guide to Adopting and Using the Security Content Automation Protocol (SCAP) Version 1.0

    Add to Reading List

    Source URL: csrc.nist.gov

    Language: English - Date: 2012-02-09 14:56:16
    77NIST SP[removed]Revision 1, Guide to Using Vulnerability Naming Schemes

    NIST SP[removed]Revision 1, Guide to Using Vulnerability Naming Schemes

    Add to Reading List

    Source URL: csrc.nist.gov

    Language: English - Date: 2012-02-06 10:15:33
    78Incident Taxonomy: Best Current Practice Andrew Cormack JANET-CERT [removed] CERT Co-ordination Meeting, Vienna

    Incident Taxonomy: Best Current Practice Andrew Cormack JANET-CERT [removed] CERT Co-ordination Meeting, Vienna

    Add to Reading List

    Source URL: www.terena.org

    Language: English - Date: 2003-03-12 05:08:39
    7925 Years of Vulnerabilities: [removed]RESEARCH REPORT Yves Younan Senior Research Engineer TM

    25 Years of Vulnerabilities: [removed]RESEARCH REPORT Yves Younan Senior Research Engineer TM

    Add to Reading List

    Source URL: community.qualys.fr

    Language: English - Date: 2014-05-08 22:50:06
    80UNCLASSIFIED  Standards-Based Automated Remediation A Remediation Manager Reference Implementation

    UNCLASSIFIED Standards-Based Automated Remediation A Remediation Manager Reference Implementation

    Add to Reading List

    Source URL: scap.nist.gov

    Language: English - Date: 2013-12-31 15:32:01