11![Goanna[removed]Standards Data Sheet for CWE cwe-datasheet.pdf Common Weakness Enumeration (CWE) Common Weakness Enumeration (CWE) is a collaborative list of software weaknesses. The following tables provide a mapping betwe Goanna[removed]Standards Data Sheet for CWE cwe-datasheet.pdf Common Weakness Enumeration (CWE) Common Weakness Enumeration (CWE) is a collaborative list of software weaknesses. The following tables provide a mapping betwe](https://www.pdfsearch.io/img/0053265e64cd137ee91552d68869c42f.jpg) | Add to Reading ListSource URL: archive.redlizards.comLanguage: English - Date: 2015-03-02 00:34:14
|
---|
12![Studying Software Vulnerabilities Dr. Robin A. Gandhi, Dr. Harvey Siy, and Yan Wu The University of Nebraska at Omaha M Studying Software Vulnerabilities Dr. Robin A. Gandhi, Dr. Harvey Siy, and Yan Wu The University of Nebraska at Omaha M](https://www.pdfsearch.io/img/20d0e7b03b929fb1b2c7fa41f4b09988.jpg) | Add to Reading ListSource URL: www.crosstalkonline.orgLanguage: English - Date: 2010-10-29 15:34:06
|
---|
13![Common Weakness Scoring System — CWSS™ Scoring the Severity of Software Weaknesses CWSS is a mechanism for scoring the severity of Common Weakness Enumeration (CWE™) entries discovered in an enterprise’s software Common Weakness Scoring System — CWSS™ Scoring the Severity of Software Weaknesses CWSS is a mechanism for scoring the severity of Common Weakness Enumeration (CWE™) entries discovered in an enterprise’s software](https://www.pdfsearch.io/img/6bb1dcf3ea4a832473b78c21c7a7143e.jpg) | Add to Reading ListSource URL: measurablesecurity.mitre.orgLanguage: English - Date: 2013-07-08 10:01:54
|
---|
14![Common Weakness Enumeration — CWE™ A Community-Developed Dictionary of Software Weakness Types CWE, targeted to developers and security practitioners, is a formal list of software weaknesses that: Serves as a common Common Weakness Enumeration — CWE™ A Community-Developed Dictionary of Software Weakness Types CWE, targeted to developers and security practitioners, is a formal list of software weaknesses that: Serves as a common](https://www.pdfsearch.io/img/3d4689bbbfda77c852700cef63fce6f3.jpg) | Add to Reading ListSource URL: measurablesecurity.mitre.orgLanguage: English - Date: 2013-07-08 10:01:53
|
---|
15![Knowing Your Weaknesses: The (CWE) Initiative Bob Martin September 27, 2010 Knowing Your Weaknesses: The (CWE) Initiative Bob Martin September 27, 2010](https://www.pdfsearch.io/img/9f3822f27f8a97dc161abd365df1752e.jpg) | Add to Reading ListSource URL: scap.nist.govLanguage: English - Date: 2013-12-31 15:31:52
|
---|
16![Common Weakness Scoring System — CWSS™ Scoring the Severity of Software Weaknesses CWSS is a mechanism for scoring the severity of Common Weakness Enumeration (CWE™) entries discovered in an enterprise’s software Common Weakness Scoring System — CWSS™ Scoring the Severity of Software Weaknesses CWSS is a mechanism for scoring the severity of Common Weakness Enumeration (CWE™) entries discovered in an enterprise’s software](https://www.pdfsearch.io/img/b3fb630815ed1b12756a2edf50221367.jpg) | Add to Reading ListSource URL: makingsecuritymeasurable.mitre.orgLanguage: English - Date: 2013-07-08 10:01:54
|
---|
17![Common Weakness Enumeration — CWE™ A Community-Developed Dictionary of Software Weakness Types CWE, targeted to developers and security practitioners, is a formal list of software weaknesses that: Serves as a common Common Weakness Enumeration — CWE™ A Community-Developed Dictionary of Software Weakness Types CWE, targeted to developers and security practitioners, is a formal list of software weaknesses that: Serves as a common](https://www.pdfsearch.io/img/2e0e219e3d6b22a77d9e62533f30aaf7.jpg) | Add to Reading ListSource URL: makingsecuritymeasurable.mitre.orgLanguage: English - Date: 2013-07-08 10:01:53
|
---|
18![Being Explicit About Weaknesses Robert A. Martin - MITRE Sean Barnum - Cigital Steve Christey - MITRE 1 March 2007 Being Explicit About Weaknesses Robert A. Martin - MITRE Sean Barnum - Cigital Steve Christey - MITRE 1 March 2007](https://www.pdfsearch.io/img/4cee579f0de543bb7e5fbf060e922b4e.jpg) | Add to Reading ListSource URL: cwe.mitre.orgLanguage: English - Date: 2007-07-02 14:30:15
|
---|
19![Software Assurance Pocket Guide Series: Development, Volume II Version 2.3, November 1, 2012
Software Assurance (SwA) Pocket Guide Resources This is a resource for ‘getting started’ in selecting and adopting releva Software Assurance Pocket Guide Series: Development, Volume II Version 2.3, November 1, 2012
Software Assurance (SwA) Pocket Guide Resources This is a resource for ‘getting started’ in selecting and adopting releva](https://www.pdfsearch.io/img/8416086f29175e9118fc1a44ee7090ad.jpg) | Add to Reading ListSource URL: cwe.mitre.orgLanguage: English - Date: 2012-11-01 17:01:27
|
---|
20![The Current State of Vulnerability Reporting The Current State of Vulnerability Reporting](https://www.pdfsearch.io/img/30e98c30f31456c3ebf5f4044f91b57a.jpg) | Add to Reading ListSource URL: csrc.nist.govLanguage: English - Date: 2013-06-04 22:13:42
|
---|