Searching Books & More : "Computer security"

2,159 results found in Books & More
RSS
Cover images provided by Open Library

Building an information technology security awareness and training program

Published: Gaithersburg, MD : U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology ; Washington, D.C. : For sale by the Supt. of Docs., U.S. G.P.O., [2003]
Format: Electronic Resource
Retrieving Holdings Information
Cover images provided by Open Library

Federal S/MIME V3 client profile recommendations of the National Institute of Standards and Technology

Published: Gaithersburg, MD : U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, [2002]
Format: Electronic Resource
Retrieving Holdings Information
Cover images provided by Open Library

Guidelines for the selection and use of Transport Layer Security (TLS) implementations recommendations of the National Institute of Standards and Technology

Published: Gaithersburg, MD : U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, [2005]
Format: Electronic Resource
Retrieving Holdings Information
Cover images provided by Open Library

Guidelines on active content and mobile code recommendations of the National Institute of Standards and Technology

Published: Gaithersburg, MD : U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology : For sale by the Supt. of Docs, U.S. G.P.O., [2001]
Format: Electronic Resource
Retrieving Holdings Information
Cover images provided by Open Library

Guidelines on electronic mail security recommendations of the National Institute of Standards and Technology

Published: Gaithersburg, MD : U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology ; Washington, D.C. : For sale by the Supt. of Docs., U.S. G.P.O., [2002]
Format: Electronic Resource
Retrieving Holdings Information
Cover images provided by Open Library

Guide to adopting and using the Security Content Automation Protocol (SCAP) (draft) recommendations of the National Institute of Standards and Technology

Published: Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology, [2009]
Format: Electronic Resource
Retrieving Holdings Information
Cover images provided by Open Library

Guide to enterprise password management (draft) recommendations of the National Institute of Standards and Technology

Published: Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology, [2009]
Format: Electronic Resource
Retrieving Holdings Information
Cover images provided by Open Library

Guide to selecting information technology security products recommendations of the National Institute of Standards and Technology

Published: Gaithersburg, MD : U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, [2003]
Format: Electronic Resource
Retrieving Holdings Information
Cover images provided by Open Library

National checklist program for IT products guidelines for checklist users and developers (draft) : recommendations of the National Institute of Standards and Technology

Published: Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology, [2008]
Format: Electronic Resource
Retrieving Holdings Information
Cover images provided by Open Library

Recommendation for block cipher modes of operation Galois/Counter mode (GCM) for confidentiality and authentication

Published: [Gaithersburg, Md.] : National Institute of Standards and Technology, Technology Administration, U.S. Dept. of Commerce, [2006]
Format: Electronic Resource
Retrieving Holdings Information
Cover images provided by Open Library

Recommendation for block cipher modes of operation the CCM mode for authentication and confidentiality

Published: Gaithersburg, MD : U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, [2004]
Format: Electronic Resource
Retrieving Holdings Information
Cover images provided by Open Library

Recommendation for block cipher modes of operation the CMAC mode for authentication

Published: Gaithersburg, MD : U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, [2005]
Format: Electronic Resource
Retrieving Holdings Information
Cover images provided by Open Library

Recommendation for random number generation using deterministic random bit generators

Published: [Gaithersburg, MD] : U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, [2006]
Format: Electronic Resource
Retrieving Holdings Information
Cover images provided by Open Library

Security considerations in the information system development life cycle

Published: Gaithersburg, MD : U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, [2004]
Format: Electronic Resource
Retrieving Holdings Information
Cover images provided by Open Library

Use of the common vulnerabilities and exposures (CVE) vulnerability naming scheme recommendations of the National Institute of Standards and Technology

Published: Gaithersburg, MD : U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, [2002]
Format: Electronic Resource
Retrieving Holdings Information