Common Vulnerabilities and Exposures

Results: 109



#Item
81Vulnerability / Open Vulnerability and Assessment Language / Social vulnerability / Common Vulnerabilities and Exposures / Information security / Information assurance / SAINT / Information assurance vulnerability alert / Computer security / Cyberwarfare / Security

Information Assurance Vulnerability Assessment Tool 2. Task Order Title Enterprise License for an automated Information Assurance Vulnerability Management (IAVM) Compliance Tool. Background

Add to Reading List

Source URL: oval.mitre.org

Language: English - Date: 2006-04-11 15:56:23
82CVE & CCE Overview David Mann, CVE Project Lead “Seek simplicity, and distrust it.” - A. N. Whitehead  © 2006 The MITRE Corporation. All rights reserved

CVE & CCE Overview David Mann, CVE Project Lead “Seek simplicity, and distrust it.” - A. N. Whitehead © 2006 The MITRE Corporation. All rights reserved

Add to Reading List

Source URL: nvd.nist.gov

Language: English - Date: 2012-07-31 09:52:12
83Standards Development Toolkit: A Standards Theory Overview Dave Mann, Ph.D. JoAnn Brooks, Ph.D.  © 2010 The MITRE Corporation. All rights reserved

Standards Development Toolkit: A Standards Theory Overview Dave Mann, Ph.D. JoAnn Brooks, Ph.D. © 2010 The MITRE Corporation. All rights reserved

Add to Reading List

Source URL: scap.nist.gov

Language: English - Date: 2013-12-31 15:31:52
84FDCC & SCAP Content Challenges Kent Landfield Director, Risk and Compliance Security Research McAfee Labs  Where we have been

FDCC & SCAP Content Challenges Kent Landfield Director, Risk and Compliance Security Research McAfee Labs Where we have been

Add to Reading List

Source URL: scap.nist.gov

Language: English - Date: 2013-12-31 15:31:48
85Security Content Automation  Protocol (SCAP) Introduction Andrew Buttner October 26th, 2009  Goals

Security Content Automation  Protocol (SCAP) Introduction Andrew Buttner October 26th, 2009 Goals

Add to Reading List

Source URL: scap.nist.gov

Language: English - Date: 2013-12-31 15:31:46
86SCAP Overview  Karen Scarfone September 27, 2010  SCAP 101 Tutorial Track

SCAP Overview Karen Scarfone September 27, 2010 SCAP 101 Tutorial Track

Add to Reading List

Source URL: scap.nist.gov

Language: English - Date: 2013-12-31 15:31:52
87Requirements and Recommendations for CVE Compatibility This is a draft report and does not represent an official position of The MITRE Corporation. © 2013, The MITRE Corporation. All rights reserved. Permission is grant

Requirements and Recommendations for CVE Compatibility This is a draft report and does not represent an official position of The MITRE Corporation. © 2013, The MITRE Corporation. All rights reserved. Permission is grant

Add to Reading List

Source URL: cve.mitre.org

Language: English - Date: 2013-07-10 15:37:57
88Microsoft Word - BeingExplicit_WP.doc

Microsoft Word - BeingExplicit_WP.doc

Add to Reading List

Source URL: cwe.mitre.org

Language: English - Date: 2007-07-02 14:11:15
89FROM THE SPONSOR  CrossTalk would like to thank DHS for sponsoring this issue. Our information and communications technology (ICT) assets are under constant attack. Thwarting the active attacker is not something most des

FROM THE SPONSOR CrossTalk would like to thank DHS for sponsoring this issue. Our information and communications technology (ICT) assets are under constant attack. Thwarting the active attacker is not something most des

Add to Reading List

Source URL: www.crosstalkonline.org

Language: English - Date: 2014-03-01 20:52:21
90The Vulnerabilities of Developing on the NET  Robert A. Martin April 2001 Published in

The Vulnerabilities of Developing on the NET Robert A. Martin April 2001 Published in

Add to Reading List

Source URL: cve.mitre.org

Language: English - Date: 2007-09-17 13:52:21