Computer security -- Standards -- United States
Resource Information
The concept Computer security -- Standards -- United States represents the subject, aboutness, idea or notion of resources found in Indiana State Library.
The Resource
Computer security -- Standards -- United States
Resource Information
The concept Computer security -- Standards -- United States represents the subject, aboutness, idea or notion of resources found in Indiana State Library.
- Label
- Computer security -- Standards -- United States
46 Items that share the Concept Computer security -- Standards -- United States
Context
Context of Computer security -- Standards -- United StatesSubject of
- A comparison of the security requirements for cryptographic modules in FIPS 140-1 and FIPS 140-2
- An introductory resource guide for implementing the Health Insurance Portability and Accountability Act (HIPAA) Security Rule
- Building an information technology security awareness and training program
- CSPP : guidance for COTS security protection profiles (formerly: CS2-- protection profile guidance for near-term COTS)
- Contingency planning guide for information technology systems : recommendations of the National Institute of Standards and Technology
- Creating a patch and vulnerability management program : recommendations of the National Institute of Standards and Technology (NIST)
- Cryptographic algorithms and key sizes for Personal Identity Verification
- Digital Signature Standard (DSS)
- Exploring common criteria : can it assure that the federal government gets needed security in software? : hearing before the Subcommittee on Technology, Information Policy, Intergovernmental Relations and the Census of the Committee on Government Reform, House of Representatives, One Hundred Eighth Congress, first session, September 17, 2003
- Federal S/MIME V3 client profile : recommendations of the National Institute of Standards and Technology
- Fiscal year 2001 budget request for the Technology Administration/National Institute of Standards and Technology including computer security and e-commerce initiatives : hearing before the Subcommittee on Technology of the Committee on Science, House of Representatives, One Hundred Sixth Congress, second session, March 9, 2000
- Guide for assessing the security controls in federal information systems
- Guide for assessing the security controls in federal information systems : building effective security assessment plans
- Guide for developing performance metrics for information security : recommendations of the National Institute of Standards and Technology
- Guide for information security program assessments and system reporting form
- Guide for the security certification and accreditation of federal information systems
- Guide to selecting information technology security products : recommendations of the National Institute of Standards and Technology
- Guideline for the use of advanced authentication technology alternatives
- Guidelines for the selection and use of Transport Layer Security (TLS) implementations : recommendations of the National Institute of Standards and Technology
- Guidelines on active content and mobile code : recommendations of the National Institute of Standards and Technology
- Guidelines on active content and mobile code : recommendations of the National Institute of Standards and Technology
- Guidelines on electronic mail security : recommendations of the National Institute of Standards and Technology
- Guidelines on electronic mail security : recommendations of the National Institute of Standards and Technology
- Guidelines on securing public web servers : recommendations of the National Institute of Standards and Technology
- Guidelines on securing public web servers : recommendations of the National Institute of Standards and Technology
- Performance measurement guide for information security
- Recommendation for block cipher modes of operation : Galois/Counter mode (GCM) for confidentiality and authentication
- Recommendation for block cipher modes of operation : methods and techniques
- Recommendation for block cipher modes of operation : the CCM mode for authentication and confidentiality
- Recommendation for block cipher modes of operation : the CMAC mode for authentication
- Recommendation for block cipher modes of operation : the XTS-AES mode for confidentiality on block-oriented storage devices
- Recommendation for obtaining assurances for digital signature applications
- Recommendation for pair-wise key establishment schemes using discrete logarithm cryptography
- Recommendation for random number generation using deterministic random bit generators
- Recommended security controls for federal information systems
- Recommended security controls for federal information systems : public draft
- Recommended security controls for federal information systems and organizations
- Risk management guide for information technology systems : recommendations of the National Institute of Standards and Technology
- Security Content Automation Protocol (SCAP) version 1.0 validation program test requirements (draft)
- Security self-assessment guide for information technology systems
- Standard security label for information transfer
- The technical specification for the Security Content Automation Protocol (SCAP) : recommendations of the National Institute of Standards and Technology
- Underlying technical models for information technology security : recommendations of the National Institute of Standards and Technology
- Use of the common vulnerabilities and exposures (CVE) vulnerability naming scheme : recommendations of the National Institute of Standards and Technology
- User's guide to securing external devices for telework and remote access : recommendations of the National Institute of Standards and Technology
- User's guide to securing external devices for telework and remote access : recommendations of the National Institute of Standards and Technology
Embed (Experimental)
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.in.gov/resource/vSA6-hurM6A/" typeof="CategoryCode http://bibfra.me/vocab/lite/Concept"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.in.gov/resource/vSA6-hurM6A/">Computer security -- Standards -- United States</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.in.gov/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.library.in.gov/">Indiana State Library</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Concept Computer security -- Standards -- United States
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.in.gov/resource/vSA6-hurM6A/" typeof="CategoryCode http://bibfra.me/vocab/lite/Concept"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.in.gov/resource/vSA6-hurM6A/">Computer security -- Standards -- United States</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.in.gov/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.library.in.gov/">Indiana State Library</a></span></span></span></span></div>