Searching Books & More : "Computer security"

Mell, Peter X
9 results found in Books & More
RSS
Cover images provided by Open Library

The common configuration scoring system (CCSS) metrics for software security configuration vulnerabilities (draft)

Published: Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology, [2009]
Format: Electronic Resource
Retrieving Holdings Information
Cover images provided by Open Library

Use of the common vulnerabilities and exposures (CVE) vulnerability naming scheme recommendations of the National Institute of Standards and Technology

Published: Gaithersburg, MD : U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, [2002]
Format: Electronic Resource
Retrieving Holdings Information
Cover images provided by Open Library

Guide to intrusion detection and prevention systems (IDPS) recommendations of the National Institute of Standards and Technology

Published: Gaithersburg, MD : U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, [2007]
Format: Electronic Resource, Remote
Retrieving Holdings Information
Cover images provided by Open Library

The Common Misuse Scoring System (CMSS) metrics for software feature misuse vulnerabilities

Published: Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology, [2012]
Format: Electronic Resource, Remote
Retrieving Holdings Information
Cover images provided by Open Library

Creating a patch and vulnerability management program recommendations of the National Institute of Standards and Technology (NIST)

Published: Gaithersburg, MD : U.S. Department of Commerce, Technology Administration, National Institute of Standards and Technology, [2005]
Format: Electronic Resource, Remote
Retrieving Holdings Information
Cover images provided by Open Library

Guide to Malware incident prevention and handling

Published: Gaithersburg, MD : U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, [2005]
Format: Electronic Resource, Remote
Retrieving Holdings Information
Cover images provided by Open Library

An overview of issues in testing intrusion detection systems

Published: [Gaithersburg, Md. : U.S. Dept. of Commerce, National Institute of Standards and Technology, 2003?]
Format: Electronic Resource, Remote
Retrieving Holdings Information
Cover images provided by Open Library

The Common Vulnerability Scoring System (CVSS) and its applicability to Federal agency systems

Published: Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology, [2007]
Format: Electronic Resource
Retrieving Holdings Information
Cover images provided by Open Library

Security Content Automation Protocol (SCAP) version 1.0 validation program test requirements (draft)

Published: Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology, [2009]
Format: Electronic Resource, Remote
Retrieving Holdings Information