01617nam 2200421Ia 450 991070212890332120240812221800.0(CKB)5470000002424852(OCoLC)811576112(EXLCZ)99547000000242485220121001d2011 ua 0engurmn|||||||||txtrdacontentcrdamediacrrdacarrierGuide to using vulnerability naming schemes recommendations of the National Institute of Standards and Technology /David Waltermire, Karen ScarfoneRevision 1.Gaithersburg, MD :U.S. Dept. of Commerce, National Institute of Standards and Technology,[2011]1 online resource (13 unnumbered pages)NIST special publication ;800-51.Computer securityTitle from PDF title screen (viewed Sept. 27, 2012)."February 2011."Includes bibliographical references.Guide to using vulnerability naming schemesInformation technologySecurity measuresUnited StatesComputer securityStandardsUnited StatesInformation technologySecurity measuresComputer securityStandardsWaltermire David1392164Scarfone Karen1764277National Institute of Standards and Technology (U.S.)GPOGPOBOOK9910702128903321Guide to using vulnerability naming schemes4206001UNINA