National Vulnerability Database

Results: 57



#Item
1Security / Cyberwarfare / Computer security / Computer network security / Hacking / Vulnerability / Risk / Common Weakness Enumeration / Vulnerability database / CVSS / National Vulnerability Database / Cross-site scripting

Journal of Communications Vol. 10, No. 2, FebruaryASVC: An Automatic Security Vulnerability Categorization Framework Based on Novel Features of Vulnerability Data Tao Wen1, Yuqing Zhang1,2, Qianru Wu2, and Gang Ya

Add to Reading List

Source URL: www.jocm.us

Language: English - Date: 2015-03-08 23:14:44
2Computer security / Security / Computing / Data security / Computer network security / Cryptography / National security / Security controls / Information security / Vulnerability / Security management / Database security

PDF Document

Add to Reading List

Source URL: examples.complianceforge.com

Language: English - Date: 2016-07-28 21:18:18
3Computer security / Data security / Computer network security / Cryptography / National security / Security controls / Information security / Vulnerability / Security management / Security / Database security / ISO/IEC JTC 1/SC 27

PDF Document

Add to Reading List

Source URL: examples.complianceforge.com

Language: English - Date: 2016-07-28 21:18:05
4Computer security / Security Content Automation Protocol / Extensible Configuration Checklist Description Format / Federal Information Security Management Act / National Vulnerability Database / National Institute of Standards and Technology / Angela Orebaugh / Open Vulnerability and Assessment Language / Vulnerability / CVSS / Information Security Automation Program

NIST SPRevision 3, The Technical Specification for SCAP Version 1.3

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2016-07-18 13:14:41
5Computer security / Computer network security / Vulnerability / Software testing / Vulnerability database / National Vulnerability Database / Zero-day / CVSS / Common Vulnerabilities and Exposures / Attack / Buffer overflow / Social vulnerability

SOFTWARE – PRACTICE AND EXPERIENCE Softw. Pract. ExperPublished online in Wiley Online Library (wileyonlinelibrary.com). DOI: spe.2180 Analysis of operating system diversity for intrusion tolerance Mig

Add to Reading List

Source URL: www.di.fc.ul.pt

Language: English - Date: 2013-01-18 09:24:08
6Cross-platform software / Computer security / Code injection / Machine code / Malware / Vulnerability scanner / Nmap / National Vulnerability Database / Ping / Software / Computing / System software

Basic Web Security About Me • Working with Web Developer Since 1996
 • Working with Unix (FreeBSD, Linux) System Admin Since 1996

Add to Reading List

Source URL: ton.packetlove.com

Language: English
7Computer security / Crime prevention / National security / Database security / Application security / Vulnerability / Network security / Information security audit / CompTIA / Security / Cyberwarfare / Computer network security

Security Engineer Location: Burlington, VT or Denver, CO or Boston, MA or Washington DC Term: Permanent Travel Required: Yes – up to 50% Telecommute: Occasionally

Add to Reading List

Source URL: www.nuharborsecurity.com

Language: English - Date: 2015-05-04 21:25:48
8Computer security / Crime prevention / National security / Database security / Vulnerability / Application security / Network security / Cisco Career Certifications / Information security audit / Security / Cyberwarfare / Computer network security

Senior Security Engineer Location: Burlington, VT or Denver, CO or Boston, MA or Washington DC Term: Permanent Travel Required: Yes – up to 50% Telecommute: Occasionally

Add to Reading List

Source URL: www.nuharborsecurity.com

Language: English - Date: 2015-05-04 21:34:25
9Disaster preparedness / Humanitarian aid / Natural disasters / Development / Disaster risk reduction / Social vulnerability / Adaptation to global warming / Database / Disaster / Management / Public safety / Emergency management

Anguilla Interim national progress report on the implementation of the Hyogo Framework for Action Name of focal point : Mrs. Elizabeth Klute Organization : Department of Disaster Management

Add to Reading List

Source URL: www.eird.org

Language: English - Date: 2009-03-06 10:47:09
10Security Content Automation Protocol / Vulnerability / Countermeasure / Open Vulnerability and Assessment Language / Social vulnerability / Ontology / National Vulnerability Database / Attack / Cisco IOS / Computer security / Cyberwarfare / Security

Avoiding Inconsistencies in the Security Content Automation Protocol William M. Fitzgerald Computer Science Department University College Cork Ireland

Add to Reading List

Source URL: www.cs.ucc.ie

Language: English - Date: 2013-08-16 10:44:34
UPDATE