LEADER 01607nam 2200385Ka 450 001 9910695291203321 005 20060727104838.0 035 $a(CKB)5470000002367824 035 $a(OCoLC)70705720 035 $a(EXLCZ)995470000002367824 100 $a20060727d2002 ua 0 101 0 $aeng 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aUse of the common vulnerabilities and exposures (CVE) vulnerability naming scheme$b[electronic resource] $erecommendations of the National Institute of Standards and Technology /$fPeter Mell, Tim Grance 210 1$aGaithersburg, MD :$cU.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology,$d[2002] 215 $a4 pages $cdigital, PDF file 225 1 $aNIST special publication ;$v800-51.$aComputer security 300 $aTitle from title screen (viewed on July 19, 2006). 300 $a"September 2002." 517 $aUse of the common vulnerabilities and exposures 606 $aInformation technology$xSecurity measures$zUnited States 606 $aComputer security$xStandards$zUnited States 615 0$aInformation technology$xSecurity measures 615 0$aComputer security$xStandards 700 $aMell$b Peter$01381996 701 $aGrance$b Tim$01351561 712 02$aNational Institute of Standards and Technology (U.S.) 801 0$bGPO 801 1$bGPO 906 $aBOOK 912 $a9910695291203321 996 $aUse of the common vulnerabilities and exposures (CVE) vulnerability naming scheme$93430922 997 $aUNINA