LEADER 01617nam 2200421Ia 450 001 9910702128903321 005 20240812221800.0 035 $a(CKB)5470000002424852 035 $a(OCoLC)811576112 035 $a(EXLCZ)995470000002424852 100 $a20121001d2011 ua 0 101 0 $aeng 135 $aurmn||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aGuide to using vulnerability naming schemes $erecommendations of the National Institute of Standards and Technology /$fDavid Waltermire, Karen Scarfone 205 $aRevision 1. 210 1$aGaithersburg, MD :$cU.S. Dept. of Commerce, National Institute of Standards and Technology,$d[2011] 215 $a1 online resource (13 unnumbered pages) 225 1 $aNIST special publication ;$v800-51.$aComputer security 300 $aTitle from PDF title screen (viewed Sept. 27, 2012). 300 $a"February 2011." 320 $aIncludes bibliographical references. 517 $aGuide to using vulnerability naming schemes 606 $aInformation technology$xSecurity measures$zUnited States 606 $aComputer security$xStandards$zUnited States 615 0$aInformation technology$xSecurity measures 615 0$aComputer security$xStandards 700 $aWaltermire$b David$01392164 701 $aScarfone$b Karen$01764277 712 02$aNational Institute of Standards and Technology (U.S.) 801 0$bGPO 801 1$bGPO 906 $aBOOK 912 $a9910702128903321 996 $aGuide to using vulnerability naming schemes$94206001 997 $aUNINA