보안402 [US-CERT: Bulletin(SB15-285)] 2015년 10월 05일까지 발표된 보안 취약점 The vulnerabilities are based on the CVE vulnerability naming standard and are organized according to severity, determined by the Common Vulnerability Scoring System (CVSS) standard. The division of high, medium, and low severities correspond to the following scores: High - Vulnerabilities will be labeled High severity if they have a CVSS base score of 7.0 - 10.0 Medium - Vulnerabilities will be.. 2015. 10. 13. [Inside Analysis] To Serve and Protect: Making Sense of Hadoop Security To Serve and Protect: Making Sense of Hadoop Security from Inside Analysis 2015. 10. 12. [Akana] API Security: Securing Digital Channels and Mobile Apps Against Hacks - API 보안 API Security: Securing Digital Channels and Mobile Apps Against Hacks from Akana 2015. 10. 11. [US-CERT: Bulletin(SB15-278)] 2015년 9월 28일까지 발표된 보안 취약점 The vulnerabilities are based on the CVE vulnerability naming standard and are organized according to severity, determined by the Common Vulnerability Scoring System (CVSS) standard. The division of high, medium, and low severities correspond to the following scores: High - Vulnerabilities will be labeled High severity if they have a CVSS base score of 7.0 - 10.0 Medium - Vulnerabilities will be.. 2015. 10. 6. 이전 1 ··· 48 49 50 51 52 53 54 ··· 101 다음