13 results
Skip to content
Toggle navigation
VuFind
Keyword
-- Title
-- Author
-- Subject
-- Call Number
-- ISBN/ISSN
-- OCLC Number
Title A-Z
Author A-Z
Subject A-Z
Call Number A-Z
Prospector
Find
Advanced
0
items
(Full)
Your Account
Log Out
Login
Language
English
Deutsch
Español
Français
Italiano
日本語
Nederlands
Português
Português (Brasil)
中文(简体)
中文(繁體)
Türkçe
עברית
Gaeilge
Cymraeg
Ελληνικά
Català
Euskara
Русский
čeština
Suomi
Svenska
polski
Dansk
slovenščina
اللغة العربية
বাংলা
Keyword
-- Title
-- Author
-- Subject
-- Call Number
-- ISBN/ISSN
-- OCLC Number
Title A-Z
Author A-Z
Subject A-Z
Call Number A-Z
Prospector
Find
Advanced
Author
Jansen, Wayne A.
Showing
1
-
13
of
13
for search:
'Jansen, Wayne A.'
, query time: 0.06s
Sort
Relevance
Date Descending
Date Ascending
Call Number
Author
Title
Select Page | with selected:
1
Guidelines on active content and mobile code recommendations of the National Institute of Standards and Technology
by
Jansen
,
Wayne
A
.
Published: U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology : For sale by the Supt. of Docs, U.S. G.P.O., 2001
Description: vii, 46 pages : digital, PDF file.
Located:
Loading...
Call Number:
Loading...
Get full text
Electronic
Save to List
Saved in:
2
Fingerprint identification and mobile handheld devices overview and implementation
by
Jansen
,
Wayne
A
.
Published: U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 2006
Description: v, 18 pages : digital, PDF file.
Located:
Loading...
Call Number:
Loading...
Get full text
Electronic
Save to List
Saved in:
3
Directions in security metrics research
Draft.
by
Jansen
,
Wayne
A
.
Published: National Institute of Standards and Technology, 2009
Description: v, 21 pages : digital, PDF file.
Located:
Loading...
Call Number:
Loading...
Get full text
Electronic
Save to List
Saved in:
4
Directions in security metrics research
by
Jansen
,
Wayne
A
.
Published: U.S. Dept. of Commerce, National Institute of Standards and Technology, 2009
Description: 1 online resource (v, 21 pages).
Located:
Loading...
Call Number:
Loading...
Get full text
Electronic
Save to List
Saved in:
5
Guidelines on PDA forensics recommendations of the National Institute of Standards and Technology
by
Jansen
,
Wayne
A
.
Published: Computer Security Division, Information Technology Laboratory, 2004
Description: viii, 59 pages : digital, PDF file.
Located:
Loading...
Call Number:
Loading...
Get full text
Get full text
Electronic
Save to List
Saved in:
6
Proximity beacons and mobile handheld devices overview and implementation
by
Jansen
,
Wayne
A
.
Published: U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 2005
Description: iii, 31 pages : digital, PDF file.
Located:
Loading...
Call Number:
Loading...
Get full text
Electronic
Save to List
Saved in:
7
Guidelines on active content and mobile code recommendations of the National Institute of Standards and Technology
Version 2., Draft.
by
Jansen
,
Wayne
A
.
Published: U.S. Dept. of Commerce, National Institute of Standards and Technology, 2007
Description: 60 unnumbered pages : digital, PDF file.
Located:
Loading...
Call Number:
Loading...
Get full text
Electronic
Save to List
Saved in:
8
Guidelines on cell phone forensics recommendations of the National Institute of Standards and Technology
Draft.
by
Jansen
,
Wayne
A
.
Published: U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 2006
Description: 98 unnumbered pages : digital, PDF file.
Located:
Loading...
Call Number:
Loading...
Get full text
Electronic
Save to List
Saved in:
9
Mobile agent security
by
Jansen
,
Wayne
A
.
Published: U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 1999
Description: v, 39 pages : illustrations ; 28 cm.
Located:
Loading...
Call Number:
Loading...
Get full text
Microfilm
Place Hold
Save to List
Saved in:
10
Guidelines on electronic mail security recommendations of the National Institute of Standards and Technology
by
Tracy, Miles.
Published: U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology ; For sale by the Supt. of Docs., U.S. G.P.O., 2002
Description: 1 volume (various pagings) : digital, PDF file.
Located:
Loading...
Call Number:
Loading...
Get full text
Electronic
Save to List
Saved in:
11
Applying mobile agents to intrusion detection and response
Published: U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 1999
Description: iii, 46 pages : illustrations.
Located:
Loading...
Call Number:
Loading...
Get full text
Microfilm
Place Hold
Save to List
Saved in:
12
Forensic filtering of cell phone protocols
by
Delaitre, Aurélien.
Published: U.S. Dept. of Commerce, National Institute of Standards and Technology, 2008
Description: vi, 36 pages : digital, PDF file.
Located:
Loading...
Call Number:
Loading...
Get full text
Electronic
Save to List
Saved in:
13
Guidelines on securing public web servers recommendations of the National Institute of Standards and Technology
by
Tracy, Miles.
Published: U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology ; For sale by the Supt. of Docs., U.S. G.P.O., 2002
Description: 1 volume (various pagings) : digital, PDF file.
Located:
Loading...
Call Number:
Loading...
Get full text
Electronic
Save to List
Saved in:
Select Page | with selected:
In Prospector
Request items from other Prospector libraries to be delivered to your local library for pickup.
Search Tools:
Get RSS Feed
—
Email this Search
—
Save Search
Related Subjects
Computer security Standards
Computer networks Security measures
Computer security
Computer security Measurement Research
Computer security Standards Government policy
Forensic sciences
Information technology Security measures
Mobile agents (Computer software)
Bluetooth technology
Cell phones
Cell phones Data processing
Computer crimes Investigation
Computer networks Access control
Data protection
Digital telephone systems Data processing
Electric filters, Digital
Electronic mail systems Security measures
Fingerprints Identification Data processing
Mobile computing Security measures
Proximity detectors
Software protection
Web servers Security measures Standards
Wireless communication systems
Wireless communication systems Security measures
×
Loading...