Call Number (LC) | Title | Results |
---|---|---|
C 13.10:800-21 |
Guideline for implementing cryptography in the federal government / Guideline for implementing cryptography in the federal government |
2 |
C 13.10:800-21/2005 | Guideline for implementing cryptography in the federal government | 1 |
C 13.10:800-22 | A statistical test suite for random and pseudorandom number generators for cryptographic applications / | 2 |
C 13.10:800-22/2008 | A statistical test suite for random and pseudorandom number generators for cryptographic applications | 1 |
C 13.10:800-22/REV | A statistical test suite for random and pseudorandom number generators for cryptographic applications | 1 |
C 13.10:800-23 | Guidelines to federal organizations on security assurance and acquisition/use of tested/evaluated products recommendations of the National Institute of Standards and Technology / | 1 |
C 13.10:800-24 | PBX vulnerability analysis finding holes in your PBX before someone else does / | 2 |
C 13.10:800-25 | Federal agency use of public key technology for digital signatures and authentication | 1 |
C 13.10:800-26 | Security self-assessment guide for information technology systems | 1 |
C 13.10:800-26/REV.1/DRAFT | Guide for information security program assessments and system reporting form | 1 |
C 13.10:800-27 |
Engineering principles for information technology security (a baseline for achieving security) : recommendations of the National Institute of Standards and Technology / Engineering principles for information technology security (a baseline for achieving security) recommendations of the National Institute of Standards and Technology / |
2 |
C 13.10:800-27/REV.A | Engineering principles for information technology security (a baseline for achieving security), revision A recommendations of the National Institute of Standards and Technology / | 1 |
C 13.10:800-28 | Guidelines on active content and mobile code recommendations of the National Institute of Standards and Technology / | 1 |
C 13.10:800-28/2007/DRAFT | Guidelines on active content and mobile code recommendations of the National Institute of Standards and Technology / | 1 |
C 13.10:800-28/2008 | Guidelines on active content and mobile code recommendations of the National Institute of Standards and Technology / | 1 |
C 13.10:800-29 | A comparison of the security requirements for cryptographic modules in FIPS 140-1 and FIPS 140-2 | 1 |
C 13.10:800-30 | Risk management guide for information technology systems : recommendations of the National Institute of Standards and Technology / | 1 |
C 13.10:800-30/REV.1 | Guide for conducting risk assessments | 1 |
C 13.10:800-30/REV.1/DRAFT | Guide for conducting risk assessments | 1 |
C 13.10:800-31 | Intrusion detection systems | 1 |