Index
A
A (adjacent network) vulnerabilities
AC (access complexity)
accepted status
access complexity (AC)
access vectors (AVs)
adjacent network (A) vulnerabilities
affected tags
AIX servers
alternate reference data
AND operations
APIs (application programming interfaces)
approved scanning vendors (ASVs)
ARF (Asset Reporting Format). See Asset Reporting Format (ARF)
artifacts
example of
introduction to
reuse of
versions of
ASCII
Assessment Summary Results (ASR)
introduction to
software inventories and
System-Ident model of
Asset Identification (AI)
correlation in
elements in
extension identifiers in
helper elements in
introduction to
literal identifiers in
relationship identifiers in
in SCAP
synthetic identifiers in
in XCCDF
asset language standards ...

Get Security Automation Essentials: Streamlined Enterprise Security Management & Monitoring with SCAP now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.