Kids Library Home

Welcome to the Kids' Library!

Search for books, movies, music, magazines, and more.

     
Available items only
ElectronicResource GovDoc
Author Waltermire, David.

Title Guide to using vulnerability naming schemes [electronic resource] : recommendations of the National Institute of Standards and Technology / David Waltermire, Karen Scarfone.

Imprint Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology, [2011]

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  C 13.10:800-51/REV.1    ---  Available
Edition Revision 1.
Description 1 online resource ([13] p.)
Series NIST special publication ; 800-51. Computer security
NIST special publication ; 800-51.
NIST special publication. Computer security.
Note Title from PDF title screen (viewed Sept. 27, 2012).
"February 2011."
Bibliography Includes bibliographical references.
Subject Information technology -- Security measures -- United States.
Computer security -- Standards -- United States.
Added Author Kent, Karen (Karen Ann)
National Institute of Standards and Technology (U.S.)
Gpo Item No. 0247 (online)
Sudoc No. C 13.10:800-51/REV.1

 
    
Available items only