Scan barcode
![Vulnerability Description Ontology (Vdo): Nistir 8138 (Draft) by National Institute of Standards and Tech](https://rwszupzmsadbjqghhiwjxwntmpecjm.thestorygraph.com/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsibWVzc2FnZSI6IkJBaHBCRHFaRHdFPSIsImV4cCI6bnVsbCwicHVyIjoiYmxvYl9pZCJ9fQ==--687cb74483c97fae73ea5e553f3ccef03c97b379/eyJfcmFpbHMiOnsibWVzc2FnZSI6IkJBaDdCem9MWm05eWJXRjBTU0lJYW5CbkJqb0dSVlE2RkhKbGMybDZaVjkwYjE5c2FXMXBkRnNIYVFJc0FXa0M5QUU9IiwiZXhwIjpudWxsLCJwdXIiOiJ2YXJpYXRpb24ifX0=--038335c90cf75c275ae4d36968ac417dc4a0a3e3/Vulnerability%20Description%20Ontology%20(Vdo)-%20Nistir%208138%20(Draft).jpg)
48 pages • missing pub info (editions)
ISBN/UID: 9781548165758
Format: Paperback
Language: English
Publisher: Createspace Independent Publishing Platform
Publication date: 30 September 2016
Description
NISTIR 8138 (Draft) September 2016This document aims to describe a more effective and efficient methodology for characterizing vulnerabilities found in various forms of software and hardware implementations including but not limited to information...
Community Reviews
Content Warnings
![Vulnerability Description Ontology (Vdo): Nistir 8138 (Draft) by National Institute of Standards and Tech](https://rwszupzmsadbjqghhiwjxwntmpecjm.thestorygraph.com/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsibWVzc2FnZSI6IkJBaHBCRHFaRHdFPSIsImV4cCI6bnVsbCwicHVyIjoiYmxvYl9pZCJ9fQ==--687cb74483c97fae73ea5e553f3ccef03c97b379/eyJfcmFpbHMiOnsibWVzc2FnZSI6IkJBaDdCem9MWm05eWJXRjBTU0lJYW5CbkJqb0dSVlE2RkhKbGMybDZaVjkwYjE5c2FXMXBkRnNIYVFJc0FXa0M5QUU9IiwiZXhwIjpudWxsLCJwdXIiOiJ2YXJpYXRpb24ifX0=--038335c90cf75c275ae4d36968ac417dc4a0a3e3/Vulnerability%20Description%20Ontology%20(Vdo)-%20Nistir%208138%20(Draft).jpg)
48 pages • missing pub info (editions)
ISBN/UID: 9781548165758
Format: Paperback
Language: English
Publisher: Createspace Independent Publishing Platform
Publication date: 30 September 2016
Description
NISTIR 8138 (Draft) September 2016This document aims to describe a more effective and efficient methodology for characterizing vulnerabilities found in various forms of software and hardware implementations including but not limited to information...