Back to Results
First PageMeta Content
Security / Software testing / Mitre Corporation / Hacking / Common Vulnerabilities and Exposures / Vulnerability / Attack / Qualys / SecurityFocus / Computer security / Cyberwarfare / Computer network security


PERSPECTIVES Managing Vulnerabilities in Networked Systems
Add to Reading List

Document Date: 2007-09-17 13:54:31


Open Document

File Size: 128,74 KB

Share Result on Facebook

City

West Lafayette / Seattle / /

Company

Hewlett-Packard / The MITRE Corp. / SGI / Network Associates / Computer Internet Security Systems / Symantec / Web / Internet Security Systems / IBM / Symantic / Sun Microsystems / CVE / Cisco Systems / Remote Command Execution Vulnerability Software / Enterasys Networks / Harris Corporation / Gartner Group / Compaq / Microsoft / MSNBC / Newsbytes / /

Currency

CVE / USD / /

/

Event

FDA Phase / Second Stock Issuance / Person Communication and Meetings / /

Facility

Institute Network Computing/SANS SecurityFocus X-Force / Babson College / Purdue University / Vulnerability Tower of Babel / Rensselaer Polytechnic Institute / Security Institute / Vulnerability Tower of Babel If / /

IndustryTerm

open source products / advisory services / exposure tools / secure systems / payroll server / accessible systems / e-business technologies / software infrastructure / intrusion detection systems / software errors / consultation services / open source software systems / open source software / software packages / database update services / software product / stand-alone computer systems / software capabilities / outside systems / software customers / software version information / open source software packages / internal systems / software product vulnerabilities / software suppliers / software supplier / software program / large and complex software / notification services / accessed systems / security-relevant software mistake / security coverage / software fixes / software vendors / software products communities / Internet-resident firewalls / software mistakes / weak encryption algorithm / software elements / access software / open source software errors / vulnerability scanning tool / vulnerability services / software product coverage / communications protocols / Alert and advisory services / backroom systems / software delivery sites / software applications / tailored notification services / software environment / mistakes when writing software / prolific and inventive software programmers / Internet-based technologies / software vulnerabilities / security tools / software patch / self-developed software / searching for software vulnerabilities / /

Movie

To Catch a Thief / /

OperatingSystem

Unix / L3 / Windows NT / /

Organization

ACM / Systems Administration / Networking / and Security Institute / AFCEA / NDIA / Rensselaer Polytechnic Institute / An / National Infrastructure Protection Center / Relay Group Systems Administration / IEEE / Federal Bureau of Investigation / Purdue University / Babson College / Purdue University Computer Emergency Response Team Coordination Center / Research in Information and Security / IEEE Computer Society / MITRE’s Information Technologies Directorate / Advisory Bugtraq Center for Education and Research / /

Person

Jordan Hrycaj / Renaud Deraison / Robert A. Martin / /

Position

principal engineer / member / /

Product

CyberCop Scanner / cve / /

ProvinceOrState

Indiana / /

Technology

e-business technologies / communications protocols / CGI / encryption / Internet-based technologies / Unix / operating systems / weak encryption algorithm / http / Web server / /

URL

http /

SocialTag