LEADER 01812nam 2200457Ia 450 001 9910695293703321 005 20060726152636.0 035 $a(CKB)5470000002367799 035 $a(OCoLC)70700665 035 $a(EXLCZ)995470000002367799 100 $a20060726d2005 ua 0 101 0 $aeng 135 $aurmn|---||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aCreating a patch and vulnerability management program$b[electronic resource] $erecommendations of the National Institute of Standards and Technology (NIST) /$fPeter Mell, Tiffany Bergeron, David Henning 205 $aVersion 2.0. 210 1$aGaithersburg, MD :$cU.S. Department of Commerce, Technology Administration, National Institute of Standards and Technology,$d[2005] 215 $a1 volume (various pagings) $cdigital, PDF file 225 1 $aNIST special publication ;$v800-40.$aComputer security 300 $aTitle from title screen (viewed on July 19, 2006). 300 $a"November 2005." 320 $aIncludes bibliographical references. 517 $aCreating a patch and vulnerability management program 606 $aComputer security$xStandards$zUnited States 606 $aComputer networks$xSecurity measures 606 $aDatabase security 615 0$aComputer security$xStandards 615 0$aComputer networks$xSecurity measures. 615 0$aDatabase security. 700 $aMell$b Peter$01381996 701 $aBergeron$b Tiffany$01384610 701 $aHenning$b David$01384611 712 02$aNational Institute of Standards and Technology (U.S.) 801 0$bGPO 801 1$bGPO 906 $aBOOK 912 $a9910695293703321 996 $aCreating a patch and vulnerability management program$93431155 997 $aUNINA