NIST special publication, Computer security
Resource Information
The series NIST special publication, Computer security represents a set of related resources, especially of a specified kind, found in Indiana State Library.
The Resource
NIST special publication, Computer security
Resource Information
The series NIST special publication, Computer security represents a set of related resources, especially of a specified kind, found in Indiana State Library.
- Label
- NIST special publication, Computer security
- Authority link
- EG-IN968477
- Title part
- Computer security
58 Items in the Series NIST special publication, Computer security
Context
Context of NIST special publication, Computer securityMembers
No resources found
No enriched resources found
- Wireless network security for IEEE 802.11a/b/g and Bluetooth : recommendation of the National Institute of Standards and Technology
- A guide to the selection of anti-virus tools and techniques
- A statistical test suite for random and pseudorandom number generators for cryptographic applications
- An introduction to computer security : the NIST handbook
- Automated tools for testing computer system vulnerability
- Computer security incident handling guide : recommendations of the National Institute of Standards and Technology
- Creating a patch and vulnerability management program : recommendations of the National Institute of Standards and Technology (NIST)
- Cryptographic key management workshop summary, June 8-9, 2009 (draft)
- Engineering principles for information technology security (a baseline for achieving security) : recommendations of the National Institute of Standards and Technology
- Establishing a computer security incident response capability (CSIRC)
- Federal agency use of public key technology for digital signatures and authentication
- Good security practices for electronic commerce, including electronic data interchange
- Guide for developing security plans for information technology systems
- Guide to Bluetooth security : recommendations of the National Institute of Standards and Technology
- Guide to enterprise telework and remote access security (draft) : recommendations of the National Institute of Standards and Technology
- Guide to general server security : recommendations of the National Institute of Standards and Technology
- Guide to securing legacy IEEE 802.11 wireless networks : recommendations of the National Institute of Standards and Technology
- Guide to storage encryption technologies for end user devices
- Guideline for implementing cryptography in the federal government
- Guidelines on active content and mobile code : recommendations of the National Institute of Standards and Technology
- Guidelines on cell phone forensics : recommendations of the National Institute of Standards and Technology
- Guidelines on electronic mail security : recommendations of the National Institute of Standards and Technology
- Guidelines on firewalls and firewall policy (draft) : recommendations of the National Institute of Standards and Technology
- Guidelines on firewalls and firewall policy : recommendations of the National Institute of Standards and Technology
- Guidelines on securing public web servers : recommendations of the National Institute of Standards and Technology
- Guidelines on securing public web servers : recommendations of the National Institute of Standards and Technology
- Guidelines to federal organizations on security assurance and acquisition/use of tested/evaluated products : recommendations of the National Institute of Standards and Technology
- Information technology security training requirements : a role- and performance-based model
- Keeping your site comfortably secure : an introduction to Internet firewalls
- Minimum interoperability specification for PKI components (MISPC)
- Mobile agent security
- Modes of operation validation system (MOVS) : requirements and procedures
- PBX vulnerability analysis : finding holes in your PBX before someone else does
- Public-key cryptography
- Randomized hashing for digital signatures : recommendations of the National Institute of Standards and Technology
- Recommendation for EAP methods used in wireless network access authentication
- Recommendation for applications using approved hash algorithms
- Recommendation for block cipher modes of operation : the XTS-AES mode for confidentiality on block-oriented storage devices
- Recommendation for key management : best practices for key management organization, Part 2
- Risk management guide for information technology systems : recommendations of the National Institute of Standards and Technology
- Secure Domain Name System (DHS) deployment guide : recommendations of the National Institute of Standards and Technology
- Security for telecommuting and broadband communications : recommendations of the National Institute of Standards and Technology
- Security guide for interconnecting information technology systems : recommendations of the National Institute of Standards and Technology
- Security in open systems
- Security issues in the database language SQL
- Security metrics guide for information technology systems
- Security self-assessment guide for information technology systems
- Specification for the extensible configuration checklist description format (XCCDF) : version 1.1.3
- System and network security acronyms and abbreviations (draft)
- Technical guide to information security testing and assessment : recommendations of the National Institute of Standards and Technology
- Telecommunications security guidelines for telecommunications management network
- The Common Misuse Scoring System (CMSS) : metrics for software feature misuse vulnerabilities
- The impact of the FCC's open network architecture on NS/NP telecommunications security
- The technical specification for the Security Content Automation Protocol (SCAP) : recommendations of the National Institute of Standards and Technology
- Underlying technical models for information technology security : recommendations of the National Institute of Standards and Technology
- User's guide to securing external devices for telework and remote access : recommendations of the National Institute of Standards and Technology
- User's guide to securing external devices for telework and remote access : recommendations of the National Institute of Standards and Technology
- Wireless network security : 802.11, Bluetooth and handheld devices : recommendations of the National Institute of Standards and Technology
Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.in.gov/resource/jJMsEiRcNek/" typeof="Series http://bibfra.me/vocab/lite/Series"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.in.gov/resource/jJMsEiRcNek/">NIST special publication, Computer security</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.in.gov/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.library.in.gov/">Indiana State Library</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Series NIST special publication, Computer security
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.in.gov/resource/jJMsEiRcNek/" typeof="Series http://bibfra.me/vocab/lite/Series"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.in.gov/resource/jJMsEiRcNek/">NIST special publication, Computer security</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.in.gov/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.library.in.gov/">Indiana State Library</a></span></span></span></span></div>