Call Number (LC) Title Results
C 13.10:800-21 Guideline for implementing cryptography in the federal government /
Guideline for implementing cryptography in the federal government
2
C 13.10:800-21/2005 Guideline for implementing cryptography in the federal government 1
C 13.10:800-22 A statistical test suite for random and pseudorandom number generators for cryptographic applications / 2
C 13.10:800-22/2008 A statistical test suite for random and pseudorandom number generators for cryptographic applications 1
C 13.10:800-22/REV A statistical test suite for random and pseudorandom number generators for cryptographic applications 1
C 13.10:800-23 Guidelines to federal organizations on security assurance and acquisition/use of tested/evaluated products recommendations of the National Institute of Standards and Technology / 1
C 13.10:800-24 PBX vulnerability analysis finding holes in your PBX before someone else does / 2
C 13.10:800-25 Federal agency use of public key technology for digital signatures and authentication 1
C 13.10:800-26 Security self-assessment guide for information technology systems 1
C 13.10:800-26/REV.1/DRAFT Guide for information security program assessments and system reporting form 1
C 13.10:800-27 Engineering principles for information technology security (a baseline for achieving security) : recommendations of the National Institute of Standards and Technology /
Engineering principles for information technology security (a baseline for achieving security) recommendations of the National Institute of Standards and Technology /
2
C 13.10:800-27/REV.A Engineering principles for information technology security (a baseline for achieving security), revision A recommendations of the National Institute of Standards and Technology / 1
C 13.10:800-28 Guidelines on active content and mobile code recommendations of the National Institute of Standards and Technology / 1
C 13.10:800-28/2007/DRAFT Guidelines on active content and mobile code recommendations of the National Institute of Standards and Technology / 1
C 13.10:800-28/2008 Guidelines on active content and mobile code recommendations of the National Institute of Standards and Technology / 1
C 13.10:800-29 A comparison of the security requirements for cryptographic modules in FIPS 140-1 and FIPS 140-2 1
C 13.10:800-30 Risk management guide for information technology systems : recommendations of the National Institute of Standards and Technology / 1
C 13.10:800-30/REV.1 Guide for conducting risk assessments 1
C 13.10:800-30/REV.1/DRAFT Guide for conducting risk assessments 1
C 13.10:800-31 Intrusion detection systems 1