Back to Results
First PageMeta Content
Security Content Automation Protocol / Open Vulnerability and Assessment Language / Vulnerability / CVSS / Common Vulnerabilities and Exposures / Penetration test / Information security management system / Information security / Critical infrastructure protection / Computer security / Security / Cyberwarfare


Making Security Measurable and Manageable Robert A. Martin The MITRE Corporation S
Add to Reading List

Document Date: 2010-10-29 19:05:09


Open Document

File Size: 386,41 KB

Share Result on Facebook

City

New York / Washington / D.C. / Bedford / /

Company

MIT Press / The MITRE Corporation / International Studies Corporation / Resilient Software / Red Hat Inc. / National Academies Press / Microsoft / John Wiley & Sons / /

Country

United States / /

/

Facility

National Institute of Standards and Technology / Rensselaer Polytechnic Institute / SANS Institute / National Institute / Babson College / Building Blocks / /

/

IndustryTerm

appropriate technology / Web application ty flaws / assessment tool / threat management / software-based technologies / Web application security flaws / vendor technologies / information technology systems / Web application / wide groups / Web Application Security Project / technology choices / security products / Web security attack classes / sustainment tools / software assurance / security management / much more powerful and productive solutions / compliance management / software assurance space / software weakness types / Web attack classes / mercial tool / vulnerability analysis Web security attack classes / installed software / operational network management / forthose Internet / cybersecurity solutions / enterprise risk management / enterprise information technology landscape / software weakness / cyber systems / change management / secure system software configuration / mission systems / /

OperatingSystem

XP / Microsoft Windows / Microsoft Vista / /

Organization

CERT CVE / National Institute / MIT / U.S. government / Defense Information Systems Agency / Center for Strategic / CIS Security Configuration Benchmarks National Security Agency / office of Management and Budget / Commission on Cybersecurity / IEEE / Center for Internet Security / Babson College / Association for Computing Machinery / National Institute of Standards and Technology / Computing Machinery / Armed Forces Communications and Electronics Association / federal government / Enumerations Name Security Division / Rensselaer Polytechnic Institute / US Federal Reserve / IT / Department of Homeland Security / Department of Defense / Enterprise Mission Assurance Support Service / Center for Strategic and International Studies Corporation / IEEE Computer Society / /

Person

Geoffrey C. Bowker / Robert A. Martin / Neal / Stephen D. Quinn / Herbert S. Lin / /

/

Position

original author / Author / Chief Information Officers and Chief / principal engineer / member / /

Product

Windows XP / /

ProgrammingLanguage

XML / /

ProvinceOrState

Massachusetts / /

Technology

XML / information technologies / appropriate technology / information technology / operating systems / vendor technologies / software-based technologies / /

URL

www.stsc.hill.af.mil / /

SocialTag