메뉴 건너뛰기




Volumn , Issue 5, 2005, Pages 12-15

Transformational vulnerability management through standards

Author keywords

[No Author keywords available]

Indexed keywords

COMMON VULNERABILITIES AND EXPOSURES (CVE); DEPARTMENT OF DEFENSE (DOD); INFORMATION FLOWS; MANPOWER;

EID: 21244477111     PISSN: None     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (4)

References (13)
  • 5
    • 84860954721 scopus 로고    scopus 로고
    • Microsoft, dell snag air force deal
    • 29 Nov.
    • Fisher, Dennis. "Microsoft, Dell Snag Air Force Deal." eWeek 29 Nov. 2004 〈www.eweek.com/article2/ 0,1759,1731420,00.asp〉.
    • (2004) eWeek
    • Fisher, D.1
  • 6
    • 78349298200 scopus 로고    scopus 로고
    • DoD Instruction 8500.2, Section VIVM-1, Vulnerability Management, Mission Assurance Categories I, II, and III. Washington: DoD, 6 Feb. 64, 75, 84
    • Department of Defense. "Information Assurance (IA) Implementation." DoD Instruction 8500.2, Section VIVM-1, Vulnerability Management, Mission Assurance Categories I, II, and III. Washington: DoD, 6 Feb. 2003: 64, 75, 84 〈www.dtic.mil/whs/directives/corres/html/85002.htm〉.
    • (2003) Information Assurance (IA) Implementation
  • 8
    • 84860945438 scopus 로고    scopus 로고
    • Washington, DC: DISA, 11 June
    • Defense Information Systems Agency. DISA IAVA Process Handbook. Ver. 2.1. Washington, DC: DISA, 11 June 2002 〈www.tricare.osd.mil/contracting/ healthcare/solicitations/TDP/0000/00_Attachment_16.pdf〉.
    • (2002) DISA IAVA Process Handbook. Ver. 2.1
  • 10
    • 84860943459 scopus 로고    scopus 로고
    • Information Security Dec.
    • Beale, Jay. "Big O for Testing." Information Security Dec. 2004 〈http://infosecuritymag.techtarget. com/ss/0,295796,sid6_iss526_art1075, 00.html〉.
    • (2004) Big O for Testing
    • Beale, J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.