O'Reilly logo

Security Automation Essentials: Streamlined Enterprise Security Management & Monitoring with SCAP by Greg Witte, Shane Shaffer, Matt Kerr, Melanie Cook

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Index
A
A (adjacent network) vulnerabilities
AC (access complexity)
accepted status
access complexity (AC)
access vectors (AVs)
adjacent network (A) vulnerabilities
affected tags
AIX servers
alternate reference data
AND operations
APIs (application programming interfaces)
approved scanning vendors (ASVs)
ARF (Asset Reporting Format). See Asset Reporting Format (ARF)
artifacts
example of
introduction to
reuse of
versions of
ASCII
Assessment Summary Results (ASR)
introduction to
software inventories and
System-Ident model of
Asset Identification (AI)
correlation in
elements in
extension identifiers in
helper elements in
introduction to
literal identifiers in
relationship identifiers in
in SCAP
synthetic identifiers in
in XCCDF
asset language standards ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required