First Page | Document Content | |
---|---|---|
Date: 2013-12-31 15:31:46Computing Extensible Configuration Checklist Description Format Security Content Automation Protocol CVSS Common Vulnerabilities and Exposures Open Vulnerability and Assessment Language Vulnerability Computer security Cyberwarfare Mitre Corporation | Security Content Automation Protocol (SCAP) Introduction Andrew Buttner October 26th, 2009 GoalsAdd to Reading ListSource URL: scap.nist.govDownload Document from Source WebsiteFile Size: 1,47 MBShare Document on Facebook |
NIST SP 800-126A, SCAP 1.3 Component Specification Version UpdatesDocID: 1qnt0 - View Document | |
NIST SPRevision 3, The Technical Specification for SCAP Version 1.3DocID: 1puNg - View Document | |
Standards in reporting Software Flaws: SCAP, CVE and CWE Robin A. Gandhi, Ph.D. University of Nebraska at Omaha (UNO) College of Information Science and Technology (IS&T) School of Interdisciplinary Informatics (Si2)DocID: 1jPC6 - View Document | |
Security Content Metadata Model with an Efficient Search Methodology for Real Time Monitoring and Threat Intelligence Preeti Subramanian AbstractDocID: 19pZG - View Document | |
Security Content Metadata Model with an Efficient Search Methodology for Real Time Monitoring and Threat Intelligence Preeti Subramanian AbstractDocID: 18xYk - View Document |