7 results
Skip to content
Toggle navigation
VuFind
Keyword
-- Title
-- Author
-- Subject
-- Call Number
-- ISBN/ISSN
-- OCLC Number
Title A-Z
Author A-Z
Subject A-Z
Call Number A-Z
Prospector
Find
Advanced
0
items
(Full)
Your Account
Log Out
Login
Language
English
Deutsch
Español
Français
Italiano
日本語
Nederlands
Português
Português (Brasil)
中文(简体)
中文(繁體)
Türkçe
עברית
Gaeilge
Cymraeg
Ελληνικά
Català
Euskara
Русский
čeština
Suomi
Svenska
polski
Dansk
slovenščina
اللغة العربية
বাংলা
Keyword
-- Title
-- Author
-- Subject
-- Call Number
-- ISBN/ISSN
-- OCLC Number
Title A-Z
Author A-Z
Subject A-Z
Call Number A-Z
Prospector
Find
Advanced
Author
Hash, Joan.
Showing
1
-
7
of
7
for search:
'Hash, Joan.'
, query time: 0.04s
Sort
Relevance
Date Descending
Date Ascending
Call Number
Author
Title
Select Page | with selected:
1
Integrating IT security into the capital planning and investment control process
Version 1.0.
by
Hash
,
Joan
.
Published: National Institute of Standards and Technology, Technology Administration, U.S. Dept. of Commerce, 2005
Description: 1 volume (various pagings) : digital, PDF file.
Located:
Loading...
Call Number:
Loading...
Get full text
Electronic
Save to List
Saved in:
2
An introductory resource guide for implementing the Health Insurance Portability and Accountability Act (HIPAA) Security Rule
by
Hash
,
Joan
.
Published: U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 2005
Description: vii, 129 pages : digital, PDF file.
Located:
Loading...
Call Number:
Loading...
Get full text
Electronic
Save to List
Saved in:
3
Building an information technology security awareness and training program
by
Wilson, Mark, 1952-
Published: U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology ; For sale by the Supt. of Docs., U.S. G.P.O., 2003
Description: 1 volume (various pagings) : digital, PDF file.
Located:
Loading...
Call Number:
Loading...
Get full text
Electronic
Save to List
Saved in:
4
Information security guide for government executives
by
Bowen, Pauline.
Published: U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 2007
Description: 14 pages : digital, PDF file.
Located:
Loading...
Call Number:
Loading...
Get full text
Electronic
Save to List
Saved in:
5
Guide for developing security plans for federal information systems
Revision 1.
by
Swanson, Marianne.
Published: U.S. Dept. of Commerce, National Institute of Standards and Technology, 2006
Description: vii, 41 pages : digital, PDF file.
Located:
Loading...
Call Number:
Loading...
Get full text
Electronic
Save to List
Saved in:
6
Security considerations in the information system development life cycle
Rev. 1.
by
Grance, Tim.
Published: U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 2004
Description: 1 volume (various pagings) : digital, PDF file.
Located:
Loading...
Call Number:
Loading...
Get full text
Electronic
Save to List
Saved in:
7
Guidelines for the certification and accreditation of PIV card issuing organizations
by
Branstad, Dennis.
Published: U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 2005
Description: 59 unnumbered pages : digital, PDF file.
Located:
Loading...
Call Number:
Loading...
Get full text
Electronic
Save to List
Saved in:
Select Page | with selected:
In Prospector
Request items from other Prospector libraries to be delivered to your local library for pickup.
Search Tools:
Get RSS Feed
—
Email this Search
—
Save Search
Related Subjects
Computer security Standards
Administrative agencies Rules and practice
Computer security Government policy
Federal government Information technology Security measures
Government executives
Identification cards Standards Government policy
Information storage and retrieval systems Finance
Information storage and retrieval systems Security measures Standards
Information technology Government policy
Information technology Security measures Employees Training of
Medical informatics Government policy
Program budgeting
×
Loading...