26 results
Skip to content
Toggle navigation
VuFind
Keyword
-- Title
-- Author
-- Subject
-- Call Number
-- ISBN/ISSN
-- OCLC Number
Title A-Z
Author A-Z
Subject A-Z
Call Number A-Z
Prospector
Find
Advanced
0
items
(Full)
Your Account
Log Out
Login
Language
English
Deutsch
Español
Français
Italiano
日本語
Nederlands
Português
Português (Brasil)
中文(简体)
中文(繁體)
Türkçe
עברית
Gaeilge
Cymraeg
Ελληνικά
Català
Euskara
Русский
čeština
Suomi
Svenska
polski
Dansk
slovenščina
اللغة العربية
বাংলা
Keyword
-- Title
-- Author
-- Subject
-- Call Number
-- ISBN/ISSN
-- OCLC Number
Title A-Z
Author A-Z
Subject A-Z
Call Number A-Z
Prospector
Find
Advanced
Author
Kent, Karen
Showing
1
-
20
of
26
for search:
'Kent, Karen'
, query time: 0.09s
Sort
Relevance
Date Descending
Date Ascending
Call Number
Author
Title
Select Page | with selected:
1
Guide to Bluetooth security recommendations of the National Institute of Standards and Technology
Draft.
by
Kent
,
Karen
Published: U.S. Dept. of Commerce, National Institute of Standards and Technology, 2008
Description: 1 online resource (43 unnumbered pages) : color illustrations.
Located:
Loading...
Call Number:
Loading...
Get full text
Electronic
Save to List
Saved in:
2
Guide to enterprise password management (draft) recommendations of the National Institute of Standards and Technology
Draft.
by
Kent
,
Karen
Published: U.S. Dept. of Commerce, National Institute of Standards and Technology, 2009
Description: 38 unnumbered pages : digital, PDF file.
Located:
Loading...
Call Number:
Loading...
Get full text
Electronic
Save to List
Saved in:
3
Guide to enterprise telework and remote access security (draft) recommendations of the National Institute of Standards and Technology
Rev. 1., Draft.
by
Kent
,
Karen
Published: U.S. Dept. of Commerce, National Institute of Standards and Technology, 2009
Description: 1 online resource (41 unnumbered page) : color illustrations.
Located:
Loading...
Call Number:
Loading...
Get full text
Electronic
Save to List
Saved in:
4
Guidelines on firewalls and firewall policy (draft) recommendations of the National Institute of Standards and Technology
Rev. 1, Draft.
by
Kent
,
Karen
Published: U.S. Dept. of Commerce, National Institute of Standards and Technology, 2008
Description: 43 unnumbered pages : digital, PDF file.
Located:
Loading...
Call Number:
Loading...
Get full text
Electronic
Save to List
Saved in:
5
Guide to securing legacy IEEE 802.11 wireless networks recommendations of the National Institute of Standards and Technology
Rev. 1.
by
Kent
,
Karen
Published: U.S. Dept. of Commerce, National Institute of Standards and Technology, 2008
Description: 50 unnumbered pages : digital, PDF file.
Located:
Loading...
Call Number:
Loading...
Get full text
Electronic
Save to List
Saved in:
6
User's guide to securing external devices for telework and remote access recommendations of the National Institute of Standards and Technology
Version 2., Draft.
by
Kent
,
Karen
Published: U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 2007
Description: 44 unnumbered pages : digital, PDF file.
Located:
Loading...
Call Number:
Loading...
Get full text
Electronic
Save to List
Saved in:
7
Wireless network security for IEEE 802.11a/b/g and Bluetooth recommendation of the National Institute of Standards and Technology
Revision 1., Draft.
by
Kent
,
Karen
Published: U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 2007
Description: 96 unnumbered pages : digital, PDF file.
Located:
Loading...
Call Number:
Loading...
Get full text
Electronic
Save to List
Saved in:
8
Guide to storage encryption technologies for end user devices
Draft.
by
Kent
,
Karen
Published: U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 2007
Description: 37 unnumbered pages : digital, PDF file.
Located:
Loading...
Call Number:
Loading...
Get full text
Electronic
Save to List
Saved in:
9
The common configuration scoring system (CCSS) metrics for software security configuration vulnerabilities (draft)
2nd public draft.
by
Kent
,
Karen
Published: U.S. Dept. of Commerce, National Institute of Standards and Technology, 2009
Description: v, 36 pages : digital, PDF file.
Located:
Loading...
Call Number:
Loading...
Get full text
Electronic
Save to List
Saved in:
10
System and network security acronyms and abbreviations (draft)
Draft.
by
Kent
,
Karen
Published: U.S. Dept. of Commerce, National Institute of Standards and Technology, 2009
Description: 1 online resource (32 unnumbered pages).
Located:
Loading...
Call Number:
Loading...
Get full text
Electronic
Save to List
Saved in:
11
System and network security acronyms and abbreviations
by
Kent
,
Karen
Published: U.S. Dept. of Commerce, National Institute of Standards and Technology, 2009
Description: 1 online resource (iv, 27 pages).
Located:
Loading...
Call Number:
Loading...
Get full text
Electronic
Save to List
Saved in:
12
Guidelines on firewalls and firewall policy recommendations of the National Institute of Standards and Technology
Rev. 1.
by
Kent
,
Karen
Published: U.S. Dept. of Commerce, National Institute of Standards and Technology, 2009
Description: 1 online resource (48 unnumbered pages).
Located:
Loading...
Call Number:
Loading...
Get full text
Get full text
Electronic
Save to List
Saved in:
13
Computer security incident handling guide : recommendations of the National Institute of Standards and Technology
Rev. 1.
by
Kent
,
Karen
Published: U.S. Dept. of Commerce, National Institute of Standards and Technology, 2008
Description: 1 online resource (147 unnumbered pages) : illustrations (some color).
Located:
Loading...
Call Number:
Loading...
Get full text
Get full text
eBook
Place Hold
Save to List
Saved in:
14
Guidelines for access control system evaluation metrics
by
Hu, Vincent C.
Published: U.S. Dept. of Commerce, National Institute of Standards and Technology, 2012
Description: 1 online resource (49 unnumbered pages) : illustrations.
Located:
Loading...
Call Number:
Loading...
Get full text
Electronic
Place Hold
Save to List
Saved in:
15
Guide to computer security log management recommendations of the National Institute of Standards and Technology
Draft.
by
Souppaya, Murugiah.
Published: U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 2006
Description: 1 volume (various pagings) : digital, PDF file.
Located:
Loading...
Call Number:
Loading...
Get full text
Electronic
Save to List
Saved in:
16
The Common Misuse Scoring System (CMSS) metrics for software feature misuse vulnerabilities
Draft.
by
Van Ruitenbeek, Elizabeth.
Published: U.S. Dept. of Commerce, National Institute of Standards and Technology, 2009
Description: v, 31 pages : digital, PDF file.
Located:
Loading...
Call Number:
Loading...
Get full text
Electronic
Save to List
Saved in:
17
Computer security incident handling guide : recommendations of the National Institute of Standards and Technology
by
Grance, Tim.
Published: U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology ; For sale by the Supt. of Docs., U.S. G.P.O., 2004
Description: 148 unnumbered pages (1 digital, PDF file) : (illustrations).
Located:
Loading...
Call Number:
Loading...
Get full text
eBook
Place Hold
Save to List
Saved in:
18
Guide to Industrial Control Systems (ICS) security Supervisory Control and Data Acquisition (SCADA) systems, Distributed Control Systems (DCS), and other control system configurati...
Final public draft.
by
Stouffer, Keith.
Published: U.S. Dept. of Commerce, National Institute of Standards and Technology, 2008
Description: 156 unnumbered pages : digital, PDF file.
Located:
Loading...
Call Number:
Loading...
Get full text
Electronic
Save to List
Saved in:
19
Guide to Industrial Control Systems (ICS) security Supervisory Control and Data Acquisition (SCADA) systems, Distributed Control Systems (DCS), and other control system configurati...
2nd public draft.
by
Stouffer, Keith.
Published: U.S. Dept. of Commerce, National Institute of Standards and Technology, 2007
Description: 1 online resource (157 unnumbered pages) : illustrations (some color).
Located:
Loading...
Call Number:
Loading...
Get full text
Electronic
Save to List
Saved in:
20
Guide to protecting the confidentiality of Personally Identifiable Information (PII) (draft) recommendations of the National Institute of Standards and Technology
Draft.
by
McCallister, Erika.
Published: U.S. Dept. of Commerce, National Institute of Standards and Technology, 2009
Description: 58 unnumbered pages : digital, PDF file.
Located:
Loading...
Call Number:
Loading...
Get full text
Electronic
Save to List
Saved in:
Select Page | with selected:
1
2
Next »
[2]
In Prospector
Request items from other Prospector libraries to be delivered to your local library for pickup.
Search Tools:
Get RSS Feed
—
Email this Search
—
Save Search
Related Subjects
Computer security Standards Government policy
Computer networks Security measures
Federal government Computer networks Security measures
Computer security
Computer security Standards
Computer security Industrial applications
Firewalls (Computer security) Standards
IEEE 802.11 (Standard)
Software configuration management Standards Government policy
Wireless communication systems Security measures Standards
Bluetooth technology
Bluetooth technology Security measures Standards Government policy
Computer networks Remote access Security measures Standards
Computer security Abbreviations
Computer security Acronyms
Computer systems Access control Standards
Computer viruses
Computers
Computers Access control Passwords Standards Government policy
Data encryption (Computer science) Standards
Data protection Standards Government policy
End-user computing
Information policy
Information science Acronyms
Information storage and retrieval systems Access control Standards
Information technology Abbreviations
Information technology Acronyms
Information technology Security measures
Logbooks Management
Software configuration management
×
Loading...