71![Software Assurance Countermeasures in Program Protection Planning MARCH[removed]Deputy Assistant Secretary of Defense for Systems Engineering Software Assurance Countermeasures in Program Protection Planning MARCH[removed]Deputy Assistant Secretary of Defense for Systems Engineering](https://www.pdfsearch.io/img/c30da5b4b0012040c5f35e4933bdcf50.jpg) | Add to Reading ListSource URL: www.acq.osd.milLanguage: English - Date: 2014-03-27 16:11:00
|
---|
72![Common Vulnerabilities and Exposures — CVE ® The Standard for Information Security Vulnerability Names CVE is a dictionary of common names for publicly known information security vulnerabilities. CVE’s common Common Vulnerabilities and Exposures — CVE ® The Standard for Information Security Vulnerability Names CVE is a dictionary of common names for publicly known information security vulnerabilities. CVE’s common](https://www.pdfsearch.io/img/bf8b49e05711b06b446cea001aa165d4.jpg) | Add to Reading ListSource URL: measurablesecurity.mitre.orgLanguage: English - Date: 2013-07-08 10:01:53
|
---|
73![Making Security Measurable and Manageable Robert A. Martin The MITRE Corporation S Making Security Measurable and Manageable Robert A. Martin The MITRE Corporation S](https://www.pdfsearch.io/img/543c7521b4ad0fe931c2f2c128218f8d.jpg) | Add to Reading ListSource URL: www.crosstalkonline.orgLanguage: English - Date: 2010-10-29 19:05:09
|
---|
74![Common Vulnerabilities and Exposures With CVE Without CVE IBM Common Vulnerabilities and Exposures With CVE Without CVE IBM](https://www.pdfsearch.io/img/9c8aabdf85f460eae60033c55c6cbb5d.jpg) | Add to Reading ListSource URL: measurablesecurity.mitre.org- Date: 2013-07-08 14:41:52
|
---|
75![Microsoft Word - CVE_Update_2 0.docx Microsoft Word - CVE_Update_2 0.docx](https://www.pdfsearch.io/img/07d86dabd4ab3306644f3ea971848d7f.jpg) | Add to Reading ListSource URL: www.supermicro.comLanguage: English - Date: 2014-03-19 13:44:29
|
---|
76![NIST SP[removed],Guide to Adopting and Using the Security Content Automation Protocol (SCAP) Version 1.0 NIST SP[removed],Guide to Adopting and Using the Security Content Automation Protocol (SCAP) Version 1.0](https://www.pdfsearch.io/img/f436c6636d35bd5367dd3f96c5b2e3e6.jpg) | Add to Reading ListSource URL: csrc.nist.govLanguage: English - Date: 2012-02-09 14:56:16
|
---|
77![NIST SP[removed]Revision 1, Guide to Using Vulnerability Naming Schemes NIST SP[removed]Revision 1, Guide to Using Vulnerability Naming Schemes](https://www.pdfsearch.io/img/3407ffc26dff4852412b38323c964948.jpg) | Add to Reading ListSource URL: csrc.nist.govLanguage: English - Date: 2012-02-06 10:15:33
|
---|
78![Incident Taxonomy: Best Current Practice Andrew Cormack JANET-CERT [removed] CERT Co-ordination Meeting, Vienna Incident Taxonomy: Best Current Practice Andrew Cormack JANET-CERT [removed] CERT Co-ordination Meeting, Vienna](https://www.pdfsearch.io/img/a60ff710bf8eaedcc1df77c7f8f36ba6.jpg) | Add to Reading ListSource URL: www.terena.orgLanguage: English - Date: 2003-03-12 05:08:39
|
---|
79![25 Years of Vulnerabilities: [removed]RESEARCH REPORT Yves Younan Senior Research Engineer TM 25 Years of Vulnerabilities: [removed]RESEARCH REPORT Yves Younan Senior Research Engineer TM](https://www.pdfsearch.io/img/43844aa88fd3656c12a0f3b493eddac8.jpg) | Add to Reading ListSource URL: community.qualys.frLanguage: English - Date: 2014-05-08 22:50:06
|
---|
80![UNCLASSIFIED Standards-Based Automated Remediation A Remediation Manager Reference Implementation UNCLASSIFIED Standards-Based Automated Remediation A Remediation Manager Reference Implementation](https://www.pdfsearch.io/img/fa58d95dc5a118f612b17167e03ac2f9.jpg) | Add to Reading ListSource URL: scap.nist.govLanguage: English - Date: 2013-12-31 15:32:01
|
---|