Call Number (LC) | Title | Results |
---|---|---|
C 13.10:800-12 |
An introduction to computer security the NIST handbook / An introduction to computer security : the NIST handbook / |
2 |
C 13.10:800-13 | Telecommunications security guidelines for telecommunications management network | 2 |
C 13.10:800-14 | Generally accepted principles and practices for securing information technology systems | 1 |
C 13.10:800-15 | Minimum interoperability specification for PKI components (MISPC) | 1 |
C 13.10:800-16 | Information technology security training requirements a role- and performance-based model / | 1 |
C 13.10:800-16/REV.1/DRAFT | Information security training requirements a role-and performance-based model (draft) : recommendations of the National Institute of Standards and Technology / | 1 |
C 13.10:800-17 | Modes of operation validation system (MOVS) requirements and procedures / | 1 |
C 13.10:800-18 |
Guide for developing security plans for information technology systems / Guide for developing security plans for information technology systems |
2 |
C 13.10:800-18/REV.1 | Guide for developing security plans for federal information systems | 1 |
C 13.10:800-19 | Mobile agent security | 1 |
C 13.10:800-20 | Modes of Operation Validation System for the Triple Data Encryption Algorithm (TMOVS) : requirements and procedures / | 1 |
C 13.10:800-20/REV | Modes of operation validation system for the Triple Data Encryption Algorithm (TMOVS) requirements and procedures / | 1 |
C 13.10:800-21 |
Guideline for implementing cryptography in the federal government / Guideline for implementing cryptography in the federal government |
2 |
C 13.10:800-21/2005 | Guideline for implementing cryptography in the federal government | 1 |
C 13.10:800-22 | A statistical test suite for random and pseudorandom number generators for cryptographic applications / | 2 |
C 13.10:800-22/2008 | A statistical test suite for random and pseudorandom number generators for cryptographic applications | 1 |
C 13.10:800-22/REV | A statistical test suite for random and pseudorandom number generators for cryptographic applications | 1 |
C 13.10:800-23 | Guidelines to federal organizations on security assurance and acquisition/use of tested/evaluated products recommendations of the National Institute of Standards and Technology / | 1 |
C 13.10:800-24 | PBX vulnerability analysis finding holes in your PBX before someone else does / | 2 |
C 13.10:800-25 | Federal agency use of public key technology for digital signatures and authentication | 1 |