Search results for: Mell, Peter
Showing 1 - 12 results of 12
Refine Results
-
1
Guide to Malware incident prevention and handling
Authors: Mell, Peter
Published: U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 2005Physical Description: 101 unnumbered pages : digital, PDF file.Holdings: Loading…Connect to online resource - All users (Federal Depository Library Program Persistant URL)
Government Document Electronic eBook -
2
Creating a patch and vulnerability management program : recommendations of the National Institute of Standards and Technology (NIST)
Authors: Mell, Peter
Published: U.S. Department of Commerce, Technology Administration, National Institute of Standards and Technology, 2005Physical Description: 1 volume (various pagings) : digital, PDF file.Holdings: Loading…Connect to online resource - All users (Federal Depository Library Program Persistant URL)
Government Document Electronic eBook -
3
Use of the common vulnerabilities and exposures (CVE) vulnerability naming scheme : recommendations of the National Institute of Standards and Technology
Authors: Mell, Peter
Published: U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 2002Physical Description: 4 pages : digital, PDF file.Holdings: Loading…Connect to online resource - All users (Federal Depository Library Program Persistant URL)
Government Document Electronic eBook -
4
The Common Vulnerability Scoring System (CVSS) and its applicability to Federal agency systems
Authors: Mell, Peter
Published: U.S. Dept. of Commerce, National Institute of Standards and Technology, 2007Physical Description: v, 27 pages : digital, PDF file.Holdings: Loading…Connect to online resource - All users (Federal Depository Library Program Persistant URL)
Government Document Electronic eBook -
5
Security Content Automation Protocol (SCAP) version 1.0 validation program test requirements (draft)
Authors: Mell, Peter
Published: U.S. Dept. of Commerce, National Institute of Standards and Technology, 2009Physical Description: 1 online resource (41 unnumbered pages).Holdings: Loading…Connect to online resource - All users (Federal Depository Library Program Persistant URL)
Government Document Electronic eBook -
6
The NIST definition of cloud computing
Authors: Mell, Peter
Published: Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology, 2011Physical Description: 1 online resource (iii, 3 pages).Holdings: Loading…Connect to online resource - All users (Federal Depository Library Program Persistant URL)
Government Document Electronic eBook -
7
Intrusion detection systems
Authors: Bace, Rebecca GurleyOther Authors: “…Mell, Peter…”
Published: [U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology], 2001
Physical Description: 51 pages : digital, PDF fileHoldings: Loading…Connect to online resource - All users (Federal Depository Library Program Persistant URL)
Government Document Electronic eBook -
8
The common configuration scoring system (CCSS) : metrics for software security configuration vulnerabilities (draft)
Authors: Kent, Karen (Karen Ann)Other Authors: “…Mell, Peter…”
Published: U.S. Dept. of Commerce, National Institute of Standards and Technology, 2009
Physical Description: v, 36 pages : digital, PDF file.Holdings: Loading…Connect to online resource - All users (Federal Depository Library Program Persistant URL)
Government Document Electronic eBook -
9
Guide to intrusion detection and prevention systems (IDPS) : recommendations of the National Institute of Standards and Technology
Authors: Kent, Karen (Karen Ann)Other Authors: “…Mell, Peter…”
Published: U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 2007
Physical Description: 1 online resource (127 unnumbered pages) : color illustrations.Holdings: Loading…Connect to online resource - All users (Federal Depository Library Program Persistant URL)
Government Document Electronic eBook -
10
An overview of issues in testing intrusion detection systems
Published: [U.S. Dept. of Commerce, National Institute of Standards and Technology], 2003Other Authors: “…Mell, Peter…”
Physical Description: 1 online resource (21 pages).Holdings: Loading…Connect to online resource - All users (Federal Depository Library Program Persistant URL)
Government Document Electronic eBook -
11
The Common Misuse Scoring System (CMSS) : metrics for software feature misuse vulnerabilities
Authors: LeMay, ElizabethOther Authors:
Published: U.S. Dept. of Commerce, National Institute of Standards and Technology, 2012Physical Description: 1 online resource (vi, 32 pages) : illustrations.Holdings: Loading…Connect to online resource - All users (Federal Depository Library Program Persistant URL)
Government Document Electronic eBook -
12
The common configuration scoring system (CCSS) : metrics for software security configuration vulnerabilities
Authors: Kent, Karen (Karen Ann)Other Authors: “…Mell, Peter…”
Published: U.S. Dept. of Commerce, National Institute of Standards and Technology, 2010
Physical Description: 1 online resource.Holdings: Loading…Connect to online resource - All users (Federal Depository Library Program Persistant URL)
Government Document Electronic eBook
Related Subjects
Computer security
Security measures
Standards
Computer networks
Government policy
Federal government
Information technology
Software configuration management
Access control
Cloud computing
Computer system failures
Computer viruses
Computers
Data protection
Database security
Evaluation
Forecasting
Intrusion detection systems (Computer security)
Management
Safety measures
Spyware (Computer software)