finds you similar websites
auto-suggest    top sites

Nov 20th, 2024

12 Popular Sites Like Nist Nvd

The team has scoured through the net and turned up tons of popular security and vulnerability sites like Nist Nvd. So come and view other sites that are complementary to Nist Nvd.

Displaying 31 to 40 of 500 alternatives to Nist Nvd. (Updated: Nov 20th, 2024)     [about these results]
Advanced Options
? Sort by:
popularity similarity
? Must Include:
? Cannot Include:
? Look For


 
You're looking for other sites like Nist Nvd:
  National Vulnerability Database Home
Comprehensive CVE vulnerability database that integrates all U.S. Government publicly available vulnerability resources. ...
http://nvd.nist.gov/
popularity:
security
vulnerability
database
reference
government
hacking
vulnerabilities
computer
tools
internet
new search by a custom tag signature
  IMMUNITY : Knowing You're Secure
Immunity CANVAS is groundbreaking software that allows you to test compliance ... With packaged vulnerability modules for scripting and a powerful framework for ...
similarity:
popularity:
security
hacking
tools
vulnerability
software
pentest
pen_test
testing
infosec
network
  The Ethical Hacker Network
The Ethical Hacker Network - Free Online Magazine for the Security Professional ... July 2009 Free Giveaway Sponsor - EC-Council's iClass ...
similarity:
popularity:
security
hacking
network
reference
networking
hack
hacker
howto
tools
technology
  F-Secure: Be Sure. Data Security Solutions, virus protection, intrusion protection, spam control
Provider of centrally managed security products for the mobile enterprise. Formerly known as Data Fellows.
similarity:
popularity:
security
antivirus
software
virus
f-secure
windows
internet
computer
tools
tech
  OnGuard Online
Provides practical tips from the U.S. federal government and the technology industry to help you be on guard against Internet fraud, secure your computer, and protect your personal information.
similarity:
popularity:
security
internet
safety
privacy
internetsafety
government
reference
phishing
internet_safety
computer
  Security Engineering - A Guide to Building Dependable Distributed Systems
Anderson, Ross. Author describes book in his own words. He explains how "pure" cryptography is not quite so pure when expressed in the context of real world ...
similarity:
popularity:
security
book
books
reference
engineering
network
computer
free
programming
ebook
  CWE - Common Weakness Enumeration
Common Weakness Enumeration (CWE) is a list of software weaknesses. ... cwe@mitre.org. International in scope and free for public use, CWE™ provides a unified, measurable set of ...
similarity:
popularity:
security
programming
software
reference
development
vulnerabilities
testing
vulnerability
research
dictionary
  SecGuru
Remember the good old days, when all you needed was a phone number and maybe a ... And on top of all that we've added LinkedIn and Facebook accounts and ...
similarity:
popularity:
security
tools
hacking
news
network
infosec
exploits
linux
blog
vulnerabilities
  SEBUG.NET
No information avaiable
similarity:
popularity:
security
sebug
hacker
hack
exploits
vulnerability
hacking
bug
computer
tools
  Shadowserver Foundation - Main - HomePage
We are comprised of volunteer security professionals from around the world. ... 09.06.2010: Shadowserver Sinkholing domain associated with SQLi attacks on IIS ...
similarity:
popularity:
security
research
internet
botnets
botnet
reference
malware
computer
hacking
network
  Internet Security Systems | Leading Intrusion Prevention IPS Solutions
Provides products and services based on proactive security intelligence that protects against ... Sign In. ISS Worldwide. Downloads. Investor Relations ...
similarity:
popularity:
security
networking
software
internet
iss
network
computer
infosec
tools
ibm
< prev ... 1 2 3 4 5 6 ... 50 next >
Sorting Results
  • This slider determines how the matched sites are sorted.
  • If you want to see the most popular sites that are somewhat related to your search, slide this more towards "popularity."
  • If you want to see the sites that best matched your search, regardless of popularity, slide this towards "similarity."
Must Include Tags
  • Matched sites will not be shown unless they have all of the tags on this list.
  • This feature is useful for when you require a site to have been tagged as something.
  • To add a tag to this list, click "add tag" or click on any tag in a result.
Must Not Include Tags
  • Matched sites that have any tag on this list will not be shown.
  • This feature is useful for filtering out results that have tags you are absolutely not interested in.
  • To add a tag to this list, click "add tag" or click on any tag in a result.
Types of Results
  • This option lets you specify the types of sites to show.
  • If you want to only see domains (www..com), select "domains only."
  • If you want to only see articles (www..com/something/here), select "articles only."
  • If you don't care, or care so much about both, select "Both".
About The Results
an example search result
How moreofit Searches
Each website has a unique tag signature -- a set of words that users have described the website as. Moreofit searches for websites that have similar tag signatures and displays the results.
1: Similarity
A site's "similarity" is determined by how well its tag signature matches the tag signature that is being searched for. A 100% match means that it has the exact same tags in the exact same order, while a 0% match means it has no tags in common.
2: Popularity
The popularity of a website is, well, pretty much self explanatory.
3: Tag Signature
The tag signatures show how a site is described. The deeper the color of the tag, the more frequently the website is tagged as this. Tags underlined blue denote a tag that is in common with the search's tag signature.