Searching Books & More : "Computer security"

2,163 results found in Books & More
RSS
Cover images provided by Open Library

Guidelines on electronic mail security recommendations of the National Institute of Standards and Technology

Published: Gaithersburg, MD : U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, [2006]
Format: Electronic Resource
Retrieving Holdings Information
Cover images provided by Open Library

Guidelines on electronic mail security recommendations of the National Institute of Standards and Technology

Published: Gaithersburg, MD : U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, [2007]
Format: Electronic Resource, Remote
Retrieving Holdings Information
Cover images provided by Open Library

Guidelines on securing public web servers recommendations of the National Institute of Standards and Technology

Published: Gaithersburg, MD : U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, [2007]
Format: Electronic Resource
Retrieving Holdings Information
Cover images provided by Open Library

Guidelines to federal organizations on security assurance and acquisition/use of tested/evaluated products recommendations of the National Institute of Standards and Technology

Published: Gaithersburg, Md. : U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, [2000]
Format: Microform, Microfiche
Retrieving Holdings Information
Cover images provided by Open Library

Guide to enterprise patch management technologies (draft) recommendations of the National Institute of Standards and Technology

Published: Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology, [2012]
Format: Electronic Resource, Remote
Retrieving Holdings Information
Cover images provided by Open Library

Guide to security for full virtualization technologies recommendations of the National Institute of Standards and Technology

Published: Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology, [2011]
Format: Electronic Resource, Remote
Retrieving Holdings Information
Cover images provided by Open Library

Guide to using vulnerability naming schemes recommendations of the National Institute of Standards and Technology

Published: Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology, [2011]
Format: Electronic Resource, Remote
Retrieving Holdings Information
Cover images provided by Open Library

Information technology security training requirements a role- and performance-based model

Published: Gaithersburg, MD : U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 1998
Format: Microform, Microfiche
Retrieving Holdings Information
Cover images provided by Open Library

An introduction to computer security the NIST handbook

Published: Gaithersburg, MD : U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology ; Washington, DC : For sale by the Supt. of Docs., U.S. G.P.O., 1995
Format: Microform, Microfiche
Retrieving Holdings Information
Cover images provided by Open Library

Recommendation for key management Part 1, General (revised)

Published: [Gaithersburg, MD] : National Institute of Standards and Technology, [2007]
Format: Electronic Resource, Remote
Retrieving Holdings Information
Cover images provided by Open Library

Recommendation for key management Part 1, General (revision 3)

Published: [Gaithersburg, MD] : U.S. Dept. of Commerce, National Institute of Standards and Technology, [2012]
Format: Electronic Resource, Remote
Retrieving Holdings Information
Cover images provided by Open Library

Recommendation for random bit generator (RBG) constructions

Published: [Gaithersburg, MD] : U.S. Dept. of Commerce, National Institute of Standards and Technology, [2012]
Format: Electronic Resource, Remote
Retrieving Holdings Information
Cover images provided by Open Library

Recommendation for random number generation using deterministic random bit generators (revised)

Published: [Gaithersburg, MD] : U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, Computer Security Division, Information Technology Laboratory, [2007]
Format: Electronic Resource, Remote
Retrieving Holdings Information
Cover images provided by Open Library

Specification for the asset summary reporting format 1.0 (draft)

Published: Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology, [2012]
Format: Electronic Resource, Remote
Retrieving Holdings Information
Cover images provided by Open Library

A statistical test suite for random and pseudorandom number generators for cryptographic applications

Published: Gaithersburg, MD : U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology ; Washington, D.C. : For sale by the Supt. of Docs., U.S. G.P.O., [2000]
Format: Microform, Microfiche
Retrieving Holdings Information