62 results Skip to content
VuFind
Advanced
  • 0 items (Full)
  • Your Account
  • Log Out
  • Login
  • Language
    • English
    • Deutsch
    • Español
    • Français
    • Italiano
    • 日本語
    • Nederlands
    • Português
    • Português (Brasil)
    • 中文(简体)
    • 中文(繁體)
    • Türkçe
    • עברית
    • Gaeilge
    • Cymraeg
    • Ελληνικά
    • Català
    • Euskara
    • Русский
    • čeština
    • Suomi
    • Svenska
    • polski
    • Dansk
    • slovenščina
    • اللغة العربية
    • বাংলা
Advanced
  • Search:
Showing 1 - 20 of 62 for search: '', query time: 0.08s
Recommended security controls for federal information systems and organizations
Rev. 3., Initial public draft.
by Ross, Ron.
Published: U.S. Dept. of Commerce, National Institute of Standards and Technology, 2009
Description: 1 online resource (209 unnumbered pages) : illustrations.
Located: Loading...
Call Number: Loading...
Get full text
Electronic
Save to List
Saved in:
Cover Image
An introductory resource guide for implementing the Health Insurance Portability and Accountability Act (HIPAA) Security Rule
Rev. 1.
by Scholl, Matthew.
Published: U.S. Dept. of Commerce, National Institute of Standards and Technology, 2008
Description: 1 online resource (117 unnumbered pages) : illustrations.
Located: Loading...
Call Number: Loading...
Get full text
Electronic
Save to List
Saved in:
Cover Image
Cryptographic algorithms and key sizes for personal identity verification
by Polk, Tim, 1962-
Published: U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 2005
Description: 103 unnumbered pages : digital, PDF file.
Located: Loading...
Call Number: Loading...
Get full text
Electronic
Save to List
Saved in:
Cover Image
Specification for the extensible configuration checklist description format (XCCDF) version 1.1
by Ziring, Neal.
Published: U.S. Dept. of Commerce, National Institute of Standards and Technology, 2006
Description: vii, 107 pages : digital, PDF file.
Located: Loading...
Call Number: Loading...
Get full text
Electronic
Save to List
Saved in:
Cover Image
Specification for the extensible configuration checklist description format (XCCDF) version 1.1.3
Revision 2.
by Ziring, Neal.
Published: U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 2007
Description: viii, 118 pages : digital, PDF file.
Located: Loading...
Call Number: Loading...
Get full text
Electronic
Save to List
Saved in:
Cover Image
Proceedings of the Privilege Management Workshop September 1-3, 2009
Published: U.S. Dept. of Commerce, National Institute of Standards and Technology, 2010
Description: 1 online resource (6 pages).
Located: Loading...
Call Number: Loading...
Get full text
Electronic
Save to List
Saved in:
Cover Image
Security assessment provider requirements and customer responsibilities building a security assessment credentialing program for federal information systems : initial public draft
by Johnson, Arnold.
Published: Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology, U.S. Dept. of Commerce, 2007
Description: 1 online resource (iv, 45 pages) : illustrations.
Located: Loading...
Call Number: Loading...
Get full text
Electronic
Save to List
Saved in:
Cover Image
Security Content Automation Protocol (SCAP) version 1.2 validation program test requirements (draft)
Revision 3, draft.
Published: U.S. Dept. of Commerce, National Institute of Standards and Technology, 2012
Description: 1 online resource (iv, 34 pages).
Located: Loading...
Call Number: Loading...
Get full text
Electronic
 Place Hold
Save to List
Saved in:
Cover Image
Trust model for security automation data 1.0 (TMSAD)
by Booth, Harold.
Published: U.S. Dept. of Commerce, National Institute of Standards and Technology, 2011
Description: 1 online resource (vi, 20 pages) : color illustrations.
Located: Loading...
Call Number: Loading...
Get full text
Electronic
 Place Hold
Save to List
Saved in:
Cover Image
Framework for Emergency Response official (ERO) authentication and authorization infrastructure
by Chandramouli, Ramaswamy.
Published: U.S. Dept. of Commerce, National Institute of Standards and Technology, 2010
Description: 1 online resource (v, 12 pages) : illustrations (some color).
Located: Loading...
Call Number: Loading...
Get full text
Electronic
 Place Hold
Save to List
Saved in:
Cover Image
Forensics web services (FWS)
by Singhal, Anoop, 1958-
Published: U.S. Dept. of Commerce, National Institute of Standards and Technology, 2010
Description: 1 online resource (v, 18 pages) : illustrations (some color).
Located: Loading...
Call Number: Loading...
Get full text
Electronic
 Place Hold
Save to List
Saved in:
Cover Image
Specification for the extensible configuration checklist description format (XCCDF) version 1.2
Revision 4.
Published: U.S. Dept. of Commerce, National Institute of Standards and Technology, 2011
Description: 1 online resource (vii, 73 pages) : illustrations (some color).
Located: Loading...
Call Number: Loading...
Get full text
Electronic
 Place Hold
Save to List
Saved in:
Cover Image
Common remediation enumeration (CRE) version 1.0 (draft)
Draft.
by McGuire, Gerald T.
Published: U.S. Dept. of Commerce, National Institute of Standards and Technology, 2011
Description: 1 online resource (vi, 33 pages).
Located: Loading...
Call Number: Loading...
Get full text
Electronic
 Place Hold
Save to List
Saved in:
Cover Image
Trust model for security automation data 1.0 (TMSAD) (draft)
Draft.
by Booth, Harold.
Published: U.S. Dept. of Commerce, National Institute of Standards and Technology, 2011
Description: 1 online resource (vi, 19 pages) : color illustrations.
Located: Loading...
Call Number: Loading...
Get full text
Electronic
 Place Hold
Save to List
Saved in:
Cover Image
Contingency planning guide for information technology systems recommendations of the National Institute of Standards and Technology
Published: U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology ; For sale by the Supt. of Docs., U.S. G.P.O., 2002
Located: Loading...
Call Number: Loading...
Electronic Loading...
Save to List
Saved in:
Cover Image
Specification for the extensible configuration checklist description format (XCCDF) version 1.1.4
Revision 3.
by Ziring, Neal.
Published: U.S. Dept. of Commerce, National Institute of Standards and Technology, 2008
Description: 1 online resource (126 pages) : illustrations (some color).
Located: Loading...
Call Number: Loading...
Get full text
Electronic
Save to List
Saved in:
Cover Image
Cryptographic key management workshop summary, June 8-9, 2009 (draft)
Draft.
by Barker, Elaine B.
Published: U.S. Dept. of Commerce, National Institute of Standards and Technology, 2009
Description: 1 online resource (65 unnumbered pages).
Located: Loading...
Call Number: Loading...
Get full text
Electronic
Save to List
Saved in:
Cover Image
Threat assessment of malicious code and human threats
by Bassham, Lawrence E.
Published: National Institute of Standards and Technology, 1992
Description: 1 online resource.
Located: Loading...
Call Number: Loading...
Get full text
Electronic
Save to List
Saved in:
Cover Image
Recommendation for random number generation using deterministic random bit generators
by Barker, Elaine B.
Published: U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 2006
Description: viii, 123 pages : digital, PDF file.
Located: Loading...
Call Number: Loading...
Get full text
Electronic
Save to List
Saved in:
Cover Image
Recommendation for obtaining assurances for digital signature applications
Draft.
by Barker, Elaine B.
Published: National Institute of Standards and Technology, Technology Administration, 2006
Description: 33 pages : digital, PDF file.
Located: Loading...
Call Number: Loading...
Get full text
Electronic
Save to List
Saved in:
Cover Image
  • 1
  • 2
  • 3
  • 4
  • Next »
  • [4]

In Prospector

Request items from other Prospector libraries to be delivered to your local library for pickup.
Search Tools: Get RSS Feed — Email this Search — Save Search

Narrow Search

Remove Filters
Call Number: C - Historical Sciences Subject: Computer security Standards
Institution
62 Colorado Mesa University see all ...
Collection
62 Gov Pub Electronic 1 Gov Pub Microfiche see all ...
Format
61 Electronic 1 Microfilm see all ...
Subject
Computer security Standards 13 Data encryption (Computer science) 8 Information technology Security measures 4 Computer networks Security measures Government policy 4 Federal government Computer networks Security measures 4 Programming languages (Electronic computers) more ... 3 Authentication Standards 3 Computer networks Security measures 3 Electronic mail systems Security measures 2 Cryptography 2 Data protection 2 Data protection Security measures 2 Medical informatics Government policy 2 Public key infrastructure (Computer security) Standards 2 Public records Access control 2 Web servers Security measures Standards 1 Biometric identification 1 Biometric identification Standards 1 Computer crimes Investigation Standards 1 Computer networks Access control 1 Computer networks Remote access Security measures Standards 1 Computer networks Standards 1 Computer security 1 Computer viruses Prevention 1 Computers Access control 1 Cryptography Standards 1 Database security 1 Digital signatures Standards 1 Electronic data processing Backup processing alternatives 1 Electronic government information Security measures see all ... less ...
Author
58 National Institute of Standards and Technology (U.S.) 6 Barker, Elaine B. 6 Ross, Ron 5 Dworkin, Morris 5 Swanson, Marianne 4 Hash, Joan more ... 4 Jansen, Wayne A. 4 Tracy, Miles 3 Grance, Tim 3 Kent, Karen 3 Mell, Peter 3 Polk, Tim, 1962- 3 Ziring, Neal 2 Barker, William C. 2 Booth, Harold 2 Burr, William E. 2 Chernick, C. Michael 2 Chew, Elizabeth 2 Dodson, Donna F. 2 Halbardier, Adam 2 Information Technology Laboratory (National Institute of Standards and Technology) 2 Lee, Annabelle 2 Quinn, Stephen D. 2 Stoneburner, Gary 2 Waltermire, David 1 Baker, Jonathon O. 1 Banghart, John 1 Bassham, Lawrence E. 1 Bergeron, Tiffany 1 Bisker, Scott see all ... less ...
Language
62 English see all ...
Genre
3 Conference papers and proceedings see all ...
Literary Form
62 Non fiction see all ...
Region
57 United States see all ...
Call Number
C - Historical Sciences see all ...
Year of Publication

Search Options

  • Search History
  • Advanced Search

Find More

  • Browse the Catalog
  • Course Reserves

Need Help?

  • Search Tips
  • Ask a Librarian
Loading...