Vulnerability database

Results: 242



#Item
221Computing / Angela Orebaugh / Federal Information Security Management Act / National Institute of Standards and Technology / Automation / Information security / Information Security Automation Program / National Vulnerability Database / Computer security / Security / Security Content Automation Protocol

September 27 – 29, 2010, Baltimore Convention Center Focusing on Emerging Automation Specifications and Use Cases, Software Assurance, Healthcare IT, Cyber Security, and Regulatory Compliance th Sponsors

Add to Reading List

Source URL: scap.nist.gov

Language: English - Date: 2013-12-31 15:31:49
222CVSS / Vulnerability / National Vulnerability Database / Cross-site request forgery / Social vulnerability / Security Content Automation Protocol / Security risk / Computer security / Cyberwarfare / Security

CVSS Implementation Guidance

Add to Reading List

Source URL: nvlpubs.nist.gov

Language: English - Date: 2014-04-28 10:50:19
223Computer network security / Risk / CVSS / Vulnerability / Social vulnerability / Common Weakness Enumeration / Common Vulnerabilities and Exposures / National Vulnerability Database / Cross-site scripting / Computer security / Cyberwarfare / Security

ITL Bulletin, Release of NIST Interagency Report 7946, CVSS Implementation Guidance (July 2014)

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-07-10 10:49:21
224Security Content Automation Protocol / National Vulnerability Database / CVSS / Vulnerability / Common Vulnerabilities and Exposures / Extensible Configuration Checklist Description Format / Social vulnerability / United States Computer Emergency Readiness Team / Information security / Computer security / Security / Cyberwarfare

ITL BULLETIN FOR DECEMBER 2013 THE NATIONAL VULNERABILITY DATABASE (NVD): OVERVIEW Harold Booth, Doug Rike and Greg Witte, Editors Computer Security Division Information Technology Laboratory National Institute of Standa

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-12-17 16:45:44
225Security Content Automation Protocol / Extensible Configuration Checklist Description Format / Federal Information Security Management Act / National Vulnerability Database / Security controls / National Institute of Standards and Technology / Information security / Open Vulnerability and Assessment Language / Information Security Automation Program / Computer security / Security / Computing

ITL Bulletin January 2012, Advancing Security Automation and Standardization: Revised Technical Specifications Issued for the Security Content Automation Protocol (SCAP)

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-04-16 14:29:27
226Public safety / CVSS / Vulnerability / Security Content Automation Protocol / Social vulnerability / National Vulnerability Database / Information security / Risk / IT risk management / Computer security / Security / Cyberwarfare

Quantitative Assessment of Software Vulnerabilities Based on Economic-Driven Security Metrics Hamza Ghani, Jesus Luna, Neeraj Suri Technische Universit¨at Darmstadt, Germany {ghani, jluna, suri}@deeds.informatik.tu-darm

Add to Reading List

Source URL: www1.deeds.informatik.tu-darmstadt.de

Language: English - Date: 2013-09-23 05:44:22
227Computer network security / Risk / CVSS / Software testing / Vulnerability / Social vulnerability / Countermeasure / National Vulnerability Database / Zero-day attack / Computer security / Cyberwarfare / Security

Predictive Vulnerability Scoring in the Context of Insufficient Information Availability Hamza Ghani, Jesus Luna, Abdelmajid Khelil, Najib Alkadri, Neeraj Suri Technische Universit¨at Darmstadt, Germany {ghani, jluna, k

Add to Reading List

Source URL: www1.deeds.informatik.tu-darmstadt.de

Language: English - Date: 2013-09-23 05:44:28
228Relational database management systems / Computer network security / Database management systems / Hacking / Software testing / SQL injection / Cross-site scripting / Vulnerability / Code injection / Computing / Cyberwarfare / Computer security

How to Secure Your Website 5th Edition Approaches to Improve Web Application and Website Security

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2014-07-10 21:53:24
229Computer network security / Crime prevention / National security / Data security / Xcon / Vulnerability / Application security / Information security / Database security / Security / Computer security / Cyberwarfare

XCon 2014 XFocus Information Security Conference Call for Paper August, 20th –21st , 2014, Beijing, China (http://xcon.xfocus.net) Upholding rigorous work style, XCon sincerely welcomes contributions from information s

Add to Reading List

Source URL: xcon.xfocus.org

Language: English - Date: 2014-03-17 05:16:41
230Proprietary software / Computing / Computer security / Oracle Database / CVSS / Oracle Corporation / IBM DB2 / Vulnerability / Oracle Rdb / Software / Cross-platform software / Relational database management systems

Dennis Yurichev (Curriculum vitae) dennis(a)yurichev.com April 10, 2014 P.O. box 10, Kyiv, Ukraine, 04071

Add to Reading List

Source URL: yurichev.com

Language: English - Date: 2014-04-09 20:03:00
UPDATE