Search results for: Mell, Peter

Showing 1 - 12 results of 12 Refine Results
  1. 1

    Guide to Malware incident prevention and handling

    Authors: Mell, Peter
    Published: U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 2005
    Physical Description: 101 unnumbered pages : digital, PDF file.
    Connect to online resource - All users (Federal Depository Library Program Persistant URL)
    Government Document Electronic eBook
  2. 2

    Creating a patch and vulnerability management program : recommendations of the National Institute of Standards and Technology (NIST)

    Authors: Mell, Peter
    Published: U.S. Department of Commerce, Technology Administration, National Institute of Standards and Technology, 2005
    Physical Description: 1 volume (various pagings) : digital, PDF file.
    Connect to online resource - All users (Federal Depository Library Program Persistant URL)
    Government Document Electronic eBook
  3. 3

    Use of the common vulnerabilities and exposures (CVE) vulnerability naming scheme : recommendations of the National Institute of Standards and Technology

    Authors: Mell, Peter
    Published: U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 2002
    Physical Description: 4 pages : digital, PDF file.
    Connect to online resource - All users (Federal Depository Library Program Persistant URL)
    Government Document Electronic eBook
  4. 4

    The Common Vulnerability Scoring System (CVSS) and its applicability to Federal agency systems

    Authors: Mell, Peter
    Published: U.S. Dept. of Commerce, National Institute of Standards and Technology, 2007
    Physical Description: v, 27 pages : digital, PDF file.
    Connect to online resource - All users (Federal Depository Library Program Persistant URL)
    Government Document Electronic eBook
  5. 5

    Security Content Automation Protocol (SCAP) version 1.0 validation program test requirements (draft)

    Authors: Mell, Peter
    Published: U.S. Dept. of Commerce, National Institute of Standards and Technology, 2009
    Physical Description: 1 online resource (41 unnumbered pages).
    Connect to online resource - All users (Federal Depository Library Program Persistant URL)
    Government Document Electronic eBook
  6. 6

    The NIST definition of cloud computing

    Authors: Mell, Peter
    Published: Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology, 2011
    Physical Description: 1 online resource (iii, 3 pages).
    Connect to online resource - All users (Federal Depository Library Program Persistant URL)
    Government Document Electronic eBook
  7. 7

    Intrusion detection systems

    Authors: Bace, Rebecca Gurley
    Published: [U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology], 2001
    Other Authors: “…Mell, Peter…”
    Physical Description: 51 pages : digital, PDF file
    Connect to online resource - All users (Federal Depository Library Program Persistant URL)
    Government Document Electronic eBook
  8. 8

    The common configuration scoring system (CCSS) : metrics for software security configuration vulnerabilities (draft)

    Authors: Kent, Karen (Karen Ann)
    Published: U.S. Dept. of Commerce, National Institute of Standards and Technology, 2009
    Other Authors: “…Mell, Peter…”
    Physical Description: v, 36 pages : digital, PDF file.
    Connect to online resource - All users (Federal Depository Library Program Persistant URL)
    Government Document Electronic eBook
  9. 9

    Guide to intrusion detection and prevention systems (IDPS) : recommendations of the National Institute of Standards and Technology

    Authors: Kent, Karen (Karen Ann)
    Published: U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 2007
    Other Authors: “…Mell, Peter…”
    Physical Description: 1 online resource (127 unnumbered pages) : color illustrations.
    Connect to online resource - All users (Federal Depository Library Program Persistant URL)
    Government Document Electronic eBook
  10. 10

    An overview of issues in testing intrusion detection systems

    Published: [U.S. Dept. of Commerce, National Institute of Standards and Technology], 2003
    Other Authors: “…Mell, Peter…”
    Physical Description: 1 online resource (21 pages).
    Connect to online resource - All users (Federal Depository Library Program Persistant URL)
    Government Document Electronic eBook
  11. 11

    The Common Misuse Scoring System (CMSS) : metrics for software feature misuse vulnerabilities

    Authors: LeMay, Elizabeth
    Published: U.S. Dept. of Commerce, National Institute of Standards and Technology, 2012
    Other Authors:
    Physical Description: 1 online resource (vi, 32 pages) : illustrations.
    Connect to online resource - All users (Federal Depository Library Program Persistant URL)
    Government Document Electronic eBook
  12. 12

    The common configuration scoring system (CCSS) : metrics for software security configuration vulnerabilities

    Authors: Kent, Karen (Karen Ann)
    Published: U.S. Dept. of Commerce, National Institute of Standards and Technology, 2010
    Other Authors: “…Mell, Peter…”
    Physical Description: 1 online resource.
    Connect to online resource - All users (Federal Depository Library Program Persistant URL)
    Government Document Electronic eBook