Guide to Cyber Threat Information Sharing
暂无分享,去创建一个
David Waltermire | Christopher S. Johnson | Mark L. Badger | Julie Snyder | Clem Skorupka | M. Badger | Christopher Johnson | David Waltermire | Julie Snyder | C. Skorupka
[1] Karen A. Scarfone,et al. Guide to Intrusion Detection and Prevention Systems (IDPS) , 2007 .
[2] Richard Kissel,et al. Glossary of Key Information Security Terms , 2014 .
[3] Karen A. Scarfone,et al. The Common Vulnerability Scoring System (CVSS) and its Applicability to Federal Agency Systems , 2007 .
[4] Timothy Grance,et al. Guide to Integrating Forensic Techniques into Incident Response , 2006 .
[5] Bill Clinton. Executive Order 12968: Access to Classified Information , 1995 .
[6] Gregory A. Witte,et al. Summary of NIST SP 800-53, Revision 4: Security and Privacy Controls for Federal Information Systems and Organizations , 2014 .