Searching Books & More : "Computer security"

Security measures X
1,043 results found in Books & More
RSS
Cover images provided by Open Library

Computer and information security handbook

Published: Amsterdam ; Boston : Morgan Kaufmann, c2009
Format: Electronic Resource, Remote
Retrieving Holdings Information
Cover images provided by Open Library

Building an information technology security awareness and training program

Published: Gaithersburg, MD : U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology ; Washington, D.C. : For sale by the Supt. of Docs., U.S. G.P.O., [2003]
Format: Electronic Resource
Retrieving Holdings Information
Cover images provided by Open Library

Federal S/MIME V3 client profile recommendations of the National Institute of Standards and Technology

Published: Gaithersburg, MD : U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, [2002]
Format: Electronic Resource
Retrieving Holdings Information
Cover images provided by Open Library

Guidelines for the selection and use of Transport Layer Security (TLS) implementations recommendations of the National Institute of Standards and Technology

Published: Gaithersburg, MD : U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, [2005]
Format: Electronic Resource
Retrieving Holdings Information
Cover images provided by Open Library

Guidelines on active content and mobile code recommendations of the National Institute of Standards and Technology

Published: Gaithersburg, MD : U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology : For sale by the Supt. of Docs, U.S. G.P.O., [2001]
Format: Electronic Resource
Retrieving Holdings Information
Cover images provided by Open Library

Guidelines on electronic mail security recommendations of the National Institute of Standards and Technology

Published: Gaithersburg, MD : U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology ; Washington, D.C. : For sale by the Supt. of Docs., U.S. G.P.O., [2002]
Format: Electronic Resource
Retrieving Holdings Information
Cover images provided by Open Library

Guide to adopting and using the Security Content Automation Protocol (SCAP) (draft) recommendations of the National Institute of Standards and Technology

Published: Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology, [2009]
Format: Electronic Resource
Retrieving Holdings Information
Cover images provided by Open Library

Guide to selecting information technology security products recommendations of the National Institute of Standards and Technology

Published: Gaithersburg, MD : U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, [2003]
Format: Electronic Resource
Retrieving Holdings Information
Cover images provided by Open Library

Security considerations in the information system development life cycle

Published: Gaithersburg, MD : U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, [2004]
Format: Electronic Resource
Retrieving Holdings Information
Cover images provided by Open Library

Use of the common vulnerabilities and exposures (CVE) vulnerability naming scheme recommendations of the National Institute of Standards and Technology

Published: Gaithersburg, MD : U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, [2002]
Format: Electronic Resource
Retrieving Holdings Information
Cover images provided by Open Library

Computers & security

Published: New York, NY : Elsevier Science Pub. Co
Format: Electronic Resource, Remote
Retrieving Holdings Information
Cover images provided by Open Library

Air traffic control weak computer security practices jeopardize flight safety : report to the Committee on Governmental Affairs, U.S. Senate

Published: Washington, D.C. (P.O. Box 37050, Washington 20013) : The Office, [1998]
Format: Microform, Microfiche
Retrieving Holdings Information
Cover images provided by Open Library

Information assurance handbook effective computer security and risk management strategies

Published: New York : McGraw-Hill Education, c2015
Format: Electronic Resource, Remote
Retrieving Holdings Information