Finding and fixing vulnerabilities in information systems : the vulnerability assessment & mitigation methodology / / Philip S. Anton ... [et al.] ; prepared for the Defense Advanced Research Projects Agency.
Saved in:
: | |
---|---|
TeilnehmendeR: | |
Year of Publication: | 2003 |
Language: | English |
Online Access: | |
Physical Description: | xxvi, 117 p. :; ill. |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
500197482 |
---|---|
ctrlnum |
(MiAaPQ)500197482 (Au-PeEL)EBL197482 (CaPaEBR)ebr10056172 (CaONFJC)MIL289776 (OCoLC)70732933 |
collection |
bib_alma |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01529nam a22003854a 4500</leader><controlfield tag="001">500197482</controlfield><controlfield tag="003">MiAaPQ</controlfield><controlfield tag="005">20200520144314.0</controlfield><controlfield tag="006">m o d | </controlfield><controlfield tag="007">cr cn|||||||||</controlfield><controlfield tag="008">030529s2003 caua sb 000 0 eng </controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="z"> 2003012342</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">0833034340 (pbk.)</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(MiAaPQ)500197482</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(Au-PeEL)EBL197482</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CaPaEBR)ebr10056172</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CaONFJC)MIL289776</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)70732933</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">MiAaPQ</subfield><subfield code="c">MiAaPQ</subfield><subfield code="d">MiAaPQ</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.9.A25</subfield><subfield code="b">F525 2003</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">005.8</subfield><subfield code="2">21</subfield></datafield><datafield tag="245" ind1="0" ind2="0"><subfield code="a">Finding and fixing vulnerabilities in information systems</subfield><subfield code="h">[electronic resource] :</subfield><subfield code="b">the vulnerability assessment & mitigation methodology /</subfield><subfield code="c">Philip S. Anton ... [et al.] ; prepared for the Defense Advanced Research Projects Agency.</subfield></datafield><datafield tag="246" ind1="3" ind2="0"><subfield code="a">Vulnerability assessment & mitigation methodology</subfield></datafield><datafield tag="246" ind1="3" ind2="0"><subfield code="a">Vulnerability assessment and mitigation methodology</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Santa Monica, CA :</subfield><subfield code="b">Rand,</subfield><subfield code="c">2003.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xxvi, 117 p. :</subfield><subfield code="b">ill.</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references.</subfield></datafield><datafield tag="533" ind1=" " ind2=" "><subfield code="a">Electronic reproduction. Ann Arbor, MI : ProQuest, 2015. Available via World Wide Web. Access may be limited to ProQuest affiliated libraries.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Data protection.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Risk assessment.</subfield></datafield><datafield tag="655" ind1=" " ind2="4"><subfield code="a">Electronic books.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Anton, Philip S.</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">ProQuest (Firm)</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=197482</subfield><subfield code="z">Click to View</subfield></datafield></record></collection> |
record_format |
marc |
spelling |
Finding and fixing vulnerabilities in information systems [electronic resource] : the vulnerability assessment & mitigation methodology / Philip S. Anton ... [et al.] ; prepared for the Defense Advanced Research Projects Agency. Vulnerability assessment & mitigation methodology Vulnerability assessment and mitigation methodology Santa Monica, CA : Rand, 2003. xxvi, 117 p. : ill. Includes bibliographical references. Electronic reproduction. Ann Arbor, MI : ProQuest, 2015. Available via World Wide Web. Access may be limited to ProQuest affiliated libraries. Computer security. Data protection. Risk assessment. Electronic books. Anton, Philip S. ProQuest (Firm) https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=197482 Click to View |
language |
English |
format |
Electronic eBook |
author2 |
Anton, Philip S. ProQuest (Firm) |
author_facet |
Anton, Philip S. ProQuest (Firm) ProQuest (Firm) |
author2_variant |
p s a ps psa |
author2_role |
TeilnehmendeR TeilnehmendeR |
author_corporate |
ProQuest (Firm) |
author_sort |
Anton, Philip S. |
title |
Finding and fixing vulnerabilities in information systems the vulnerability assessment & mitigation methodology / |
spellingShingle |
Finding and fixing vulnerabilities in information systems the vulnerability assessment & mitigation methodology / |
title_sub |
the vulnerability assessment & mitigation methodology / |
title_full |
Finding and fixing vulnerabilities in information systems [electronic resource] : the vulnerability assessment & mitigation methodology / Philip S. Anton ... [et al.] ; prepared for the Defense Advanced Research Projects Agency. |
title_fullStr |
Finding and fixing vulnerabilities in information systems [electronic resource] : the vulnerability assessment & mitigation methodology / Philip S. Anton ... [et al.] ; prepared for the Defense Advanced Research Projects Agency. |
title_full_unstemmed |
Finding and fixing vulnerabilities in information systems [electronic resource] : the vulnerability assessment & mitigation methodology / Philip S. Anton ... [et al.] ; prepared for the Defense Advanced Research Projects Agency. |
title_auth |
Finding and fixing vulnerabilities in information systems the vulnerability assessment & mitigation methodology / |
title_alt |
Vulnerability assessment & mitigation methodology Vulnerability assessment and mitigation methodology |
title_new |
Finding and fixing vulnerabilities in information systems |
title_sort |
finding and fixing vulnerabilities in information systems the vulnerability assessment & mitigation methodology / |
publisher |
Rand, |
publishDate |
2003 |
physical |
xxvi, 117 p. : ill. |
callnumber-first |
Q - Science |
callnumber-subject |
QA - Mathematics |
callnumber-label |
QA76 |
callnumber-sort |
QA 276.9 A25 F525 42003 |
genre |
Electronic books. |
genre_facet |
Electronic books. |
url |
https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=197482 |
illustrated |
Illustrated |
dewey-hundreds |
000 - Computer science, information & general works |
dewey-tens |
000 - Computer science, knowledge & systems |
dewey-ones |
005 - Computer programming, programs & data |
dewey-full |
005.8 |
dewey-sort |
15.8 |
dewey-raw |
005.8 |
dewey-search |
005.8 |
oclc_num |
70732933 |
work_keys_str_mv |
AT antonphilips findingandfixingvulnerabilitiesininformationsystemsthevulnerabilityassessmentmitigationmethodology AT proquestfirm findingandfixingvulnerabilitiesininformationsystemsthevulnerabilityassessmentmitigationmethodology AT antonphilips vulnerabilityassessmentmitigationmethodology AT proquestfirm vulnerabilityassessmentmitigationmethodology AT antonphilips vulnerabilityassessmentandmitigationmethodology AT proquestfirm vulnerabilityassessmentandmitigationmethodology |
status_str |
n |
ids_txt_mv |
(MiAaPQ)500197482 (Au-PeEL)EBL197482 (CaPaEBR)ebr10056172 (CaONFJC)MIL289776 (OCoLC)70732933 |
is_hierarchy_title |
Finding and fixing vulnerabilities in information systems the vulnerability assessment & mitigation methodology / |
author2_original_writing_str_mv |
noLinkedField noLinkedField |
_version_ |
1792330667179114497 |