Guide for mapping types of information and information systems to security categories
Main Author: | Stine, Kevin. |
---|---|
Other Authors: | National Institute of Standards and Technology (U.S.) |
Format: | eBook |
Language: | English |
Published: |
Gaithersburg, MD :
U.S. Dept. of Commerce, National Institute of Standards and Technology,
[2008]
|
Physical Description: |
1 online resource (2 unnumbered volumes) : illustrations. |
Edition: | Rev. 1. |
Series: |
NIST special publication ;
800-60. NIST special publication. Information security. |
Subjects: | |
Online Access: |
http://purl.access.gpo.gov/GPO/LPS115493 Vol. 1 Vol. 2 |
LEADER | 02643cam a2200577 a 4500 | ||
---|---|---|---|
001 | 639230948 | ||
003 | OCoLC | ||
005 | 20100629162037.3 | ||
006 | m d f | ||
007 | cr cna---uuuuu | ||
008 | 100608s2008 mdua f000 0 eng c | ||
035 | |a (OCoLC)639230948 | ||
040 | |a GPO |b eng |c GPO |d GPO | ||
042 | |a pcc | ||
043 | |a n-us--- | ||
049 | |a COM7 | ||
074 | |a 0247 (online) | ||
086 | 0 | |a C 13.10:800-60/REV.1 | |
100 | 1 | |a Stine, Kevin. | |
245 | 1 | 0 | |a Guide for mapping types of information and information systems to security categories / |c Kevin Stine ... [and others]. |
250 | |a Rev. 1. | ||
264 | 1 | |a Gaithersburg, MD : |b U.S. Dept. of Commerce, National Institute of Standards and Technology, |c [2008] | |
300 | |a 1 online resource (2 unnumbered volumes) : |b illustrations. | ||
336 | |a text |b txt |2 rdacontent. | ||
337 | |a computer |b c |2 rdamedia. | ||
338 | |a online resource |b cr |2 rdacarrier. | ||
490 | 1 | |a NIST special publication ; |v 800-60. |a Information security. | |
500 | |a Title from PDF title screen (NIST, viewed June 7, 2010) | ||
500 | |a "August 2008." | ||
504 | |a Includes bibliographical references. | ||
650 | 0 | |a Digital mapping |x Standards |z United States. | |
650 | 0 | |a Information storage and retrieval systems |z United States |x Standards. | |
710 | 2 | |a National Institute of Standards and Technology (U.S.) | |
830 | 0 | |a NIST special publication ; |v 800-60. | |
830 | 0 | |a NIST special publication. |p Information security. | |
856 | 4 | 0 | |u http://purl.access.gpo.gov/GPO/LPS115493 |
856 | 4 | |3 Vol. 1 |u http://csrc.nist.gov/publications/nistpubs/800-60-rev1/SP800-60_Vol1-Rev1.pdf | |
856 | 4 | |3 Vol. 2 |u http://csrc.nist.gov/publications/nistpubs/800-60-rev1/SP800-60_Vol2-Rev1.pdf | |
907 | |a .b30002850 |b cug |c - |d 100629 |e 240308 | ||
998 | |a cug |b 100629 |c m |d a |e - |f eng |g mdu |h 0 |i 0 | ||
933 | |a Dup field fix 2016 | ||
948 | |a MARCIVE Comprehensive, in 2024.03 | ||
948 | |a MARCIVE Comp, in 2022.12 | ||
948 | |a MARCIVE August, 2017 | ||
948 | |a MARCIVE extract Aug 5, 2017 | ||
994 | |a 92 |b COM | ||
995 | |a Loaded with m2btab.ltiac in 2024.03 | ||
995 | |a Loaded with m2btab.ltiac in 2022.12 | ||
995 | |a Loaded with m2btab.ltiac in 2017.08 | ||
995 | |a OCLC offline update by CMU | ||
989 | |a C 13.10:800-60/REV.1 |d cuege |e - - |f - - |g j |h 0 |i 0 |j 216 |k 100629 |l $0.00 |m |n - - |o - |p 0 |q 0 |t 0 |x 0 |w US Gov Docs |1 .i57615494 |u http://purl.access.gpo.gov/GPO/LPS115493 |3 Vol. 1 |u http://csrc.nist.gov/publications/nistpubs/800-60-rev1/SP800-60_Vol1-Rev1.pdf |3 Vol. 2 |u http://csrc.nist.gov/publications/nistpubs/800-60-rev1/SP800-60_Vol2-Rev1.pdf |