๐”– Scriptorium
โœฆ   LIBER   โœฆ

๐Ÿ“

Information technology. Security techniques. Refining software vulnerability analysis under ISO/IEC 15408 and ISO/IEC 18045


Leaves
26
Category
Scientific

โฌ‡  Acquire This Volume

No coin nor oath required. For personal study only.


๐Ÿ“œ SIMILAR VOLUMES


ISO/IEC 29147:2018 Information technolog
๐Ÿ“‚ Library ๐Ÿ“… 2018 ๐ŸŒ English

This document provides requirements and recommendations to vendors on the disclosure of vulnerabilities in products and services. Vulnerability disclosure enables users to perform technical vulnerability management as specified in ISO/IEC 27002:2013, 12.6.1[1]. Vulnerability disclosure helps users p

ISO/IEC 27004:2016, Information technolo
โœ ISO/IEC JTC 1/SC 27 ๐Ÿ“‚ Library ๐Ÿ“… 2016 ๐Ÿ› BSI ๐ŸŒ English

BS ISO/IEC 27004 provides guidance on how to assess the performance of an Information Security Management System (ISMS) developed and implemented using BS ISO/IEC 27001. It explains how to develop and operate measurement processes, and how to assess and report the results of the associated measureme