Call Number (LC) Title Results
C 13.10:800-55 Security metrics guide for information technology systems / 1
C 13.10:800-55/2/REV.1 Performance measurement guide for information security 1
C 13.10:800-55/2/REV./DRAFT Performance measurement guide for information security 1
C 13.10:800-56 A Recommendation for pair-wise key establishment schemes using discrete logarithm cryptography 1
C 13.10:800-56 A/REV Recommendation for pair-wise key establishment schemes using discrete logarithm cryptography (revised) / 1
C 13.10:800-56 B Recommendation for pair-wise key establishment schemes using integer factorization cryptography 1
C 13.10:800-56 B/DRAFT Recommendation for pair-wise key establishment schemes using integer factorization cryptography / 1
C 13.10:800-56 C Recommendation for key derivation through extraction-then-expansion 1
C 13.10:800-56 C/DRAFT Recommendation for key derivation through extraction-then-expansion 1
C 13.10:800-56C Recommendation for key derivation through extraction-then-expansion / 1
C 13.10:800-57/PT.1/REV Recommendation for key management. General / 1
C 13.10:800-57/PT.1/REV.3 Recommendation for key management. 1
C 13.10:800-57/PT.1/REV./2007 Recommendation for key management. 1
C 13.10:800-57/PT.2 Recommendation for key management. best practices for key management organization / 1
C 13.10:800-57/PT.3 Recommendation for key management. application-specific key management guidance / 1
C 13.10:800-57/PT.3/DRAFT Recommendation for key management. application-specific key management guidance / 1
C 13.10:800-58 Security considerations for voice over IP systems recommendations of the National Institute of Standards and Technology / 1
C 13.10:800-59 Guideline for identifying an information system as a national security system 1
C 13.10:800-60 Guide for mapping types of information and information systems to security categories 1
C 13.10:800-60/REV.1 Guide for mapping types of information and information systems to security categories 1