Searching Books & More : "Computer security"

Software configuration management X
22 results found in Books & More
RSS
Cover images provided by Open Library

The common configuration scoring system (CCSS) metrics for software security configuration vulnerabilities (draft)

Published: Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology, [2009]
Format: Electronic Resource
Retrieving Holdings Information
Cover images provided by Open Library

Guide to adopting and using the Security Content Automation Protocol (SCAP) (draft) recommendations of the National Institute of Standards and Technology

Published: Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology, [2009]
Format: Electronic Resource
Retrieving Holdings Information
Cover images provided by Open Library

National checklist program for IT products guidelines for checklist users and developers (draft) : recommendations of the National Institute of Standards and Technology

Published: Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology, [2008]
Format: Electronic Resource
Retrieving Holdings Information
Cover images provided by Open Library

Common remediation enumeration (CRE) version 1.0 (draft)

Published: Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology, [2011]
Format: Electronic Resource, Remote
Retrieving Holdings Information
Cover images provided by Open Library

The technical specification for the Security Content Automation Protocol (SCAP), SCAP version 1.1 recommendations of the National Institute of Standards and Technology

Published: Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology, [2011]
Format: Electronic Resource, Remote
Retrieving Holdings Information
Cover images provided by Open Library

The technical specification for the Security Content Automation Protocol (SCAP), SCAP Version 1.2 (draft) recommendations of the National Institute of Standards and Technology

Published: Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology, [2011]
Format: Electronic Resource, Remote
Retrieving Holdings Information
Cover images provided by Open Library

The Common Misuse Scoring System (CMSS) metrics for software feature misuse vulnerabilities

Published: Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology, [2012]
Format: Electronic Resource, Remote
Retrieving Holdings Information
Cover images provided by Open Library

Guide to adopting and using the Security Content Automation Protocol (SCAP) version 1.0 recommendations of the National Institute of Standards and Technology

Published: Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology, [2010]
Format: Electronic Resource, Remote
Retrieving Holdings Information
Cover images provided by Open Library

The technical specification for the Security Content Automation Protocol (SCAP), SCAP version 1.2 recommendations of the National Institute of Standards and Technology

Published: Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology, [2011]
Format: Electronic Resource, Remote
Retrieving Holdings Information
Cover images provided by Open Library

National Checklist Program for IT products guidelines for checklist users and developers : recommendations of the National Institute of Standards and Technology

Published: Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology, [2009]
Format: Electronic Resource, Remote
Retrieving Holdings Information
Cover images provided by Open Library

National Checklist Program for IT products guidelines for checklist users and developers : recommendations of the National Institute of Standards and Technology

Published: Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology, [2011]
Format: Electronic Resource, Remote
Retrieving Holdings Information
Cover images provided by Open Library

The Common Misuse Scoring System (CMSS) metrics for software feature misuse vulnerabilities

Published: Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology, [2009]
Format: Electronic Resource
Retrieving Holdings Information
Cover images provided by Open Library

Group policy fundamentals, security, and troubleshooting

Published: Indianapolis, Ind. : Wiley Pub., c2008
Format: Electronic Resource, Remote
Retrieving Holdings Information
Cover images provided by Open Library

pfSense 2 cookbook

Published: Birmingham, UK : Packt Pub., 2011
Format: Electronic Resource, Remote
Retrieving Holdings Information
Cover images provided by Open Library

Nokia firewall, VPN, and IPSO configuration guide

Published: Burlington, MA : Syngress Pub., c2009
Format: Electronic Resource, Remote
Retrieving Holdings Information