Vulnerability database

Results: 242



#Item
121Cyberwarfare / Crime prevention / National security / Information security / Password / Vulnerability / Asset / Information security audit / Database security / Security / Data security / Computer security

EXECUTIVE SUMMARY The State Administrative Manual (SAM) requires each state agency to conduct a comprehensive risk assessment of its information assets every two years and or when ever there is significant change in th

Add to Reading List

Source URL: www.cio.ca.gov

Language: English - Date: 2013-06-28 15:17:37
122Software / Companies listed on the New York Stock Exchange / Database activity monitoring / Database security / Health Insurance Portability and Accountability Act / Vulnerability / Database / Guardium /  an IBM Company / Host Based Security System / Computer security / Computing / McAfee

Business Brief HIPAA/HITECH Compliance for Databases Comply fully and reduce database security risk SC Magazine 2012 Best Database

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-01-10 01:03:44
123Ontology / Information science / Technical communication / Data / Science / Resource Description Framework / Agricultural Ontology Service / Semantic Web / Information / Knowledge representation

National Vulnerability Database Product Ontology Paul Cichonski Booz Allen Hamilton / NIST

Add to Reading List

Source URL: scap.nist.gov

Language: English - Date: 2013-12-31 15:31:49
124Computer security / Software / Companies listed on the New York Stock Exchange / Database security / Database activity monitoring / Database / Vulnerability / Guardium /  an IBM Company / Host Based Security System / Computing / Database management systems / McAfee

Business Brief Secure Your Databases for Sustainable SOX Compliance Key Advantages

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-01-10 01:04:09
125McAfee / Computer security / Companies listed on the New York Stock Exchange / Database security / Database / Oracle Corporation / Vulnerability / Sentrigo / McAfee VirusScan / Database management systems / Computing / Software

Business Brief Defend Legacy Databases and Operating Systems Extend protection and compliance to EOL servers and databases

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-01-10 01:03:35
126Computing / Security Content Automation Protocol / National Vulnerability Database / Federal Information Security Management Act / Vulnerability / Information security management system / National Institute of Standards and Technology / Security controls / Configuration management / Computer security / Security / Cyberwarfare

NIST SP[removed], Guide to Adopting and Using the Security Content Automation Protocol (SCAP) Version 1.2 (Draft)

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-04-25 15:15:06
127Management / Disaster preparedness / International Decade for Natural Disaster Reduction / Disaster / Pacific Disaster Center / World Conference on Disaster Reduction / ReliefWeb / Office of Foreign Disaster Assistance / Social vulnerability / Humanitarian aid / Public safety / Emergency management

3-2. Database on Disaster Risk Reduction The ADRC has been disseminating many different types of information related to disaster risk reduction on its website (http://www.adrc.asia) aiming at ensuring an appropriate disa

Add to Reading List

Source URL: web.adrc.asia

Language: English - Date: 2010-09-03 02:35:45
128Computer network security / Vulnerability database / Vulnerability / Social vulnerability / Firefox / Patch / Application security / Attack / Software / Cyberwarfare / Computer security

Software diversity: Security, Entropy and Game Theory Saran Neti Carleton University [removed] Anil Somayaji

Add to Reading List

Source URL: people.scs.carleton.ca

Language: English - Date: 2013-07-18 12:34:36
129Relational database management systems / Software testing / Oracle Corporation / Auditing / Oracle Database / Oracle Applications / Oracle E-Business Suite / Vulnerability / Penetration test / Computing / Software / Business

AppSentry Application and Database Security Auditing May 2014 Stephen Kost

Add to Reading List

Source URL: www.integrigy.com

Language: English - Date: 2014-05-22 12:43:20
130Computer security / Software / Companies listed on the New York Stock Exchange / Database security / Database activity monitoring / Database / Vulnerability / Guardium /  an IBM Company / Host Based Security System / Computing / Database management systems / McAfee

Business Brief Secure Your Databases for Sustainable SOX Compliance Key Advantages

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-01-10 01:04:09
UPDATE