581![Knowing Your Weaknesses: The (CWE) Initiative Bob Martin September 27, 2010 Knowing Your Weaknesses: The (CWE) Initiative Bob Martin September 27, 2010](https://www.pdfsearch.io/img/9f3822f27f8a97dc161abd365df1752e.jpg) | Add to Reading ListSource URL: scap.nist.govLanguage: English - Date: 2013-12-31 15:31:52
|
---|
582![Presentation to the SITAC Meeting December 9, 2013 Brynhild Haugland Room State Capitol Building Presentation to the SITAC Meeting December 9, 2013 Brynhild Haugland Room State Capitol Building](https://www.pdfsearch.io/img/dbc8906ad4d4bbdd5191b340f7e5413f.jpg) | Add to Reading ListSource URL: www.nd.govLanguage: English - Date: 2014-05-30 16:41:13
|
---|
583![Microsoft Word - tcm_taxonomy_submission.doc Microsoft Word - tcm_taxonomy_submission.doc](https://www.pdfsearch.io/img/f1d07cc282e1b792eafea8f072e1a0a4.jpg) | Add to Reading ListSource URL: cwe.mitre.orgLanguage: English - Date: 2006-09-13 14:57:23
|
---|
584![Microsoft Word - Vulnerability Type Distributions in CVE.doc Microsoft Word - Vulnerability Type Distributions in CVE.doc](https://www.pdfsearch.io/img/8c360b6147e060c9b37632f5f81c29ed.jpg) | Add to Reading ListSource URL: cwe.mitre.orgLanguage: English - Date: 2007-06-07 12:01:36
|
---|
585![Microsoft Word - Vulnerability Type Distributions in CVE.doc Microsoft Word - Vulnerability Type Distributions in CVE.doc](https://www.pdfsearch.io/img/f08a84a063d40c5b846e19452934fc3e.jpg) | Add to Reading ListSource URL: cve.mitre.orgLanguage: English - Date: 2007-06-07 12:03:43
|
---|
586![Microsoft Word - Martin_CaseForCWEs (final+).doc Microsoft Word - Martin_CaseForCWEs (final+).doc](https://www.pdfsearch.io/img/47bbd4e87ea829ea5840e3ffcb98da75.jpg) | Add to Reading ListSource URL: cwe.mitre.orgLanguage: English - Date: 2006-09-13 14:57:13
|
---|
587![OWASP to WASC to CWE Mapping Correlating Different Industry Taxonomy Jesper Jurcenoks Director, Research Chief Evangelist OWASP to WASC to CWE Mapping Correlating Different Industry Taxonomy Jesper Jurcenoks Director, Research Chief Evangelist](https://www.pdfsearch.io/img/b0779ca792120a08c9e659bc6dd94779.jpg) | Add to Reading ListSource URL: www.criticalwatch.comLanguage: English - Date: 2013-07-10 13:17:08
|
---|
588![A Taxonomy of UNIX System and Network Vulnerabilities Matt Bishop CSE[removed]May 1995 A Taxonomy of UNIX System and Network Vulnerabilities Matt Bishop CSE[removed]May 1995](https://www.pdfsearch.io/img/e0a9aac24a81731e7139a5c213c9f78f.jpg) | Add to Reading ListSource URL: cwe.mitre.orgLanguage: English - Date: 2006-09-13 14:57:15
|
---|
589![A Software Flaw Taxonomy: Aiming Tools At Security Sam Weber Paul A. Karger Amit Paradkar (samweber|karger|paradkar)@watson.ibm.com IBM Research Division A Software Flaw Taxonomy: Aiming Tools At Security Sam Weber Paul A. Karger Amit Paradkar (samweber|karger|paradkar)@watson.ibm.com IBM Research Division](https://www.pdfsearch.io/img/07220385a71ca792b49225617111cbc2.jpg) | Add to Reading ListSource URL: cwe.mitre.orgLanguage: English - Date: 2006-09-13 14:57:13
|
---|
590![State of Tennessee Department of Finance and Administration Office for Information Resources Security Policy and Audit Security Advisory Summary State of Tennessee Department of Finance and Administration Office for Information Resources Security Policy and Audit Security Advisory Summary](https://www.pdfsearch.io/img/3434cef388669764cf024db8e5b548e6.jpg) | Add to Reading ListSource URL: www.nettn.netLanguage: English - Date: 2010-06-17 10:39:22
|
---|