Vulnerability database

Results: 242



#Item
231ecfirst Services 2014  © All Rights Reserved || Confidential || ecfirst[removed] || www.ecfirst.com Page 1

ecfirst Services 2014 © All Rights Reserved || Confidential || ecfirst[removed] || www.ecfirst.com Page 1

Add to Reading List

Source URL: www.ecfirst.com

Language: English - Date: 2014-05-12 02:33:20
232ecfirst Services 2014  © All Rights Reserved || Confidential || ecfirst[removed] || www.ecfirst.com Page 1

ecfirst Services 2014 © All Rights Reserved || Confidential || ecfirst[removed] || www.ecfirst.com Page 1

Add to Reading List

Source URL: www.ecfirst.com

Language: English - Date: 2014-06-03 07:38:16
233NIST SP[removed]Revision 1, The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.1

NIST SP[removed]Revision 1, The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.1

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-02-09 17:09:01
234Report on DIMACS∗ Working Group on Challenges for Cryptographers in Health Data Privacy Date of working group meeting: June 30, 2004 Working Group Organizers: Benny Pinkas, HP Labs Kobbi Nissim, Microsoft Research

Report on DIMACS∗ Working Group on Challenges for Cryptographers in Health Data Privacy Date of working group meeting: June 30, 2004 Working Group Organizers: Benny Pinkas, HP Labs Kobbi Nissim, Microsoft Research

Add to Reading List

Source URL: dimacs.rutgers.edu

Language: English - Date: 2004-08-16 11:11:48
23508FNS_FishNetSecurity_logo

08FNS_FishNetSecurity_logo

Add to Reading List

Source URL: www.fishnetsecurity.com

Language: English - Date: 2013-09-17 11:35:14
236Security Content Automation Protocol / National Vulnerability Database / Information Security Automation Program / Federal Information Security Management Act / Extensible Configuration Checklist Description Format / Vulnerability / NIST Special Publication 800-53 / Information security management system / Security controls / Computer security / Security / Cyberwarfare

Information Security Automation Program Automating Vulnerability Management, Security Measurement, and Compliance

Add to Reading List

Source URL: nvd.nist.gov

Language: English - Date: 2012-07-31 09:53:44
237NIST SP[removed]Revision 2, The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.1

NIST SP[removed]Revision 2, The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.1

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-02-09 17:12:26
238NIST SP[removed], The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.0

NIST SP[removed], The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.0

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-02-09 17:04:50
239A Classification of SQL Injection Attacks and Countermeasures William G.J. Halfond, Jeremy Viegas, and Alessandro Orso

A Classification of SQL Injection Attacks and Countermeasures William G.J. Halfond, Jeremy Viegas, and Alessandro Orso

Add to Reading List

Source URL: www.cc.gatech.edu

Language: English - Date: 2007-02-23 14:50:09
240Geological Disaster database in china

Geological Disaster database in china

Add to Reading List

Source URL: www.codata.org

Language: English - Date: 2013-06-23 17:23:09