-
1
-
-
84865223572
-
Computer security incident handling guide
-
K. Scarfone, T. Grance, and K. Masone, "Computer security incident handling guide" NIST Special Publication, vol. 800, no. 61, p. 38, 2008.
-
(2008)
NIST Special Publication
, vol.800
, Issue.61
, pp. 38
-
-
Scarfone, K.1
Grance, T.2
Masone, K.3
-
2
-
-
84876385966
-
-
E. Network and information Security Agency no. WP2006/5.1
-
E. Network and information Security Agency, "A step-by-step approach on how to set up a csirt" no. WP2006/5.1, p. 86, 2006.
-
(2006)
A Step-by-step Approach on How to Set Up A Csirt
, pp. 86
-
-
-
3
-
-
0343472271
-
-
DTIC Document, Tech. Rep
-
M. West-Brown, D. Stikvoort, K. Kossakowski, G. Killcrece, and R. Ruefle, "Handbook for computer security incident response teams (csirts)" DTIC Document, Tech. Rep., 2003.
-
(2003)
Handbook for Computer Security Incident Response Teams (Csirts)
-
-
West-Brown, M.1
Stikvoort, D.2
Kossakowski, K.3
Killcrece, G.4
Ruefle, R.5
-
6
-
-
33746748784
-
On incident handling and response: A state-of-The-art approach
-
S. Mitropoulos, D. Patsos, and C. Douligeris, "On incident handling and response: A state-of-the-art approach" Computers & Security, vol. 25, no. 5, pp. 351-370, 2006.
-
(2006)
Computers & Security
, vol.25
, Issue.5
, pp. 351-370
-
-
Mitropoulos, S.1
Patsos, D.2
Douligeris, C.3
-
7
-
-
80052284797
-
-
C. Alberts, A. Dorofee, G. Killcrece, R. Ruefle, and M. Zajicek, "Defining incident management processes for csirts: A work in progress" 2004.
-
(2004)
Defining Incident Management Processes for Csirts: A Work in Progress
-
-
Alberts, C.1
Dorofee, A.2
Killcrece, G.3
Ruefle, R.4
Zajicek, M.5
-
8
-
-
84876369615
-
-
E. Network and information Security Agency
-
E. Network and information Security Agency, "Good practice guide for incident management" p. 110, 2010.
-
(2010)
Good Practice Guide for Incident Management
, pp. 110
-
-
-
9
-
-
84876348515
-
-
software Engineering Institute Carnegie Mellon University
-
"Information security for network managers" 2005, software Engineering Institute Carnegie Mellon University.
-
(2005)
Information Security for Network Managers
-
-
-
11
-
-
60049086251
-
Creating a patch and vulnerability management program
-
P. Mell, T. Bergeron, and D. Henning, "Creating a patch and vulnerability management program" NIST Special Publication, vol. 800, p. 40, 2005.
-
(2005)
NIST Special Publication
, vol.800
, pp. 40
-
-
Mell, P.1
Bergeron, T.2
Henning, D.3
-
12
-
-
79959979703
-
-
US Department of Commerce, Technology Administration, National Institute of Standards and Technology
-
P. Mell, K. Kent, J. Nusbaum, N. I. of Standards, and T. (US), Guide to Malware Incident Prevention and Handling. US Department of Commerce, Technology Administration, National Institute of Standards and Technology, 2005.
-
(2005)
Guide to Malware Incident Prevention and Handling
-
-
Mell, P.1
Kent, K.2
Nusbaum, J.3
Of Standards, N.I.4
Us, T.5
-
13
-
-
84876361898
-
-
Accessed: 18/07/2012) Common configuration enumeration
-
MITRE. (Accessed: 18/07/2012) Common configuration enumeration. [Online] Available: http://cce.mitre.org/
-
-
-
|