Call Number (LC) Title Results
C 13.10:800-12 An introduction to computer security the NIST handbook /
An introduction to computer security : the NIST handbook /
2
C 13.10:800-13 Telecommunications security guidelines for telecommunications management network 2
C 13.10:800-14 Generally accepted principles and practices for securing information technology systems 1
C 13.10:800-15 Minimum interoperability specification for PKI components (MISPC) 1
C 13.10:800-16 Information technology security training requirements a role- and performance-based model / 1
C 13.10:800-16/REV.1/DRAFT Information security training requirements a role-and performance-based model (draft) : recommendations of the National Institute of Standards and Technology / 1
C 13.10:800-17 Modes of operation validation system (MOVS) requirements and procedures / 1
C 13.10:800-18 Guide for developing security plans for information technology systems /
Guide for developing security plans for information technology systems
2
C 13.10:800-18/REV.1 Guide for developing security plans for federal information systems 1
C 13.10:800-19 Mobile agent security 1
C 13.10:800-20 Modes of Operation Validation System for the Triple Data Encryption Algorithm (TMOVS) : requirements and procedures / 1
C 13.10:800-20/REV Modes of operation validation system for the Triple Data Encryption Algorithm (TMOVS) requirements and procedures / 1
C 13.10:800-21 Guideline for implementing cryptography in the federal government /
Guideline for implementing cryptography in the federal government
2
C 13.10:800-21/2005 Guideline for implementing cryptography in the federal government 1
C 13.10:800-22 A statistical test suite for random and pseudorandom number generators for cryptographic applications / 2
C 13.10:800-22/2008 A statistical test suite for random and pseudorandom number generators for cryptographic applications 1
C 13.10:800-22/REV A statistical test suite for random and pseudorandom number generators for cryptographic applications 1
C 13.10:800-23 Guidelines to federal organizations on security assurance and acquisition/use of tested/evaluated products recommendations of the National Institute of Standards and Technology / 1
C 13.10:800-24 PBX vulnerability analysis finding holes in your PBX before someone else does / 2
C 13.10:800-25 Federal agency use of public key technology for digital signatures and authentication 1