Research Catalog

  • Guide to protecting the confidentiality of Personally Identifiable Information (PII) (draft) [electronic resource] : recommendations of the National Institute of Standards and Technology / Erika McCallister, Tim Grance, Karen Scarfone.

    • Text
    • Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology, [2009]
    • 2009
    • 1 Resource

    Available Online

    http://purl.access.gpo.gov/GPO/LPS114014
  • National checklist program for IT products [electronic resource] : guidelines for checklist users and developers (draft) : recommendations of the National Institute of Standards and Technology / Stephen D. Quinn, Karen Scarfone, Murugiah Souppaya.

    • Text
    • Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology, [2008]
    • 2008
    • 1 Resource

    Available Online

    http://purl.access.gpo.gov/GPO/LPS114008
  • Guide to Industrial Control Systems (ICS) security [electronic resource] : Supervisory Control and Data Acquisition (SCADA) systems, Distributed Control Systems (DCS), and other control system configurations such as Programmable Logic Controllers (PLC) : recommendations of the National Institute of Standards and Technology / Keith Stouffer, Joe Falco, Karen Scarfone.

    • Text
    • Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology, [2008]
    • 2008
    • 1 Resource

    Available Online

    http://purl.access.gpo.gov/GPO/LPS113905
  • Common platform enumeration : dictionary specification version 2.3 (draft) / Paul Cichonski, David Waltermire, Karen Scarfone.

    • Text
    • Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology, [2011]
    • 2011
    • 1 Resource

    Available Online

    https://purl.fdlp.gov/GPO/gpo29131
  • Guidelines for securing wireless local area networks (WLANs) : recommendations of the National Institute of Standards and Technology / Murugiah Souppaya, Karen Scarfone.

    • Text
    • Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology, [2012]
    • 2012
    • 1 Resource

    Available Online

    https://purl.fdlp.gov/GPO/gpo29124
  • Guidelines for securing wireless local area networks (WLANs) (draft) : recommendations of the National Institute of Standards and Technology / Murugiah Souppaya, Karen Scarfone.

    • Text
    • Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology, [2011]
    • 2011
    • 1 Resource

    Available Online

    https://purl.fdlp.gov/GPO/gpo28777
  • Guide to Bluetooth security : recommendations of the National Institute of Standards and Technology / John Padgette, Karen Scarfone.

    • Text
    • Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology, [2011]
    • 2011
    • 1 Resource

    Available Online

    https://purl.fdlp.gov/GPO/gpo28773
  • BIOS integrity measurements guidelines (draft) : recommendations of the National Institute of Standards and Technology / Andrew Regenscheid, Karen Scarfone.

    • Text
    • Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology, [2011]
    • 2011
    • 1 Resource

    Available Online

    https://purl.fdlp.gov/GPO/gpo28778
  • Guide to application whitelisting / Adam Sedgewick, Murugiah Souppaya, Karen Scarfone.

    • Text
    • Gaithersburg, MD : U.S. Department of Commerce, National Institute of Standards and Technology, 2015.
    • 2015
    • 1 Resource

    Available Online

    https://purl.fdlp.gov/GPO/gpo62969
  • Common platform enumeration : naming specification version 2.3 / Brant A. Cheikes; David Waltermire; Karen Scarfone.

    • Text
    • Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology, 2011.
    • 2011
    • 1 Resource

    Available Online

    https://purl.fdlp.gov/GPO/gpo102637
  • Common platform enumeration : dictionary specification version 2.3 / Paul Cichonski; David Waltermire; Karen Scarfone.

    • Text
    • Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology, 2011.
    • 2011
    • 1 Resource

    Available Online

    https://purl.fdlp.gov/GPO/gpo98465
  • Common planform enumeration : name matching specification version 2.3 / Mary C. Parmelee; harold Booth; David Waltermire; Karen Scarfone.

    • Text
    • Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology, 2011.
    • 2011
    • 1 Resource

    Available Online

    https://purl.fdlp.gov/GPO/gpo97881
  • Specification for the open checklist interactive language (OCIL) version 2.0 / David Waltermire; Karen Scarfone; Maria Casipe.

    • Text
    • Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology, 2011.
    • 2011
    • 1 Resource

    Available Online

    https://purl.fdlp.gov/GPO/gpo99156
  • Common platform enumeration : applicability language specification version 2.3 / David Waltermire; Paul Cichonski; Karen Scarfone.

    • Text
    • Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology, 2011.
    • 2011
    • 1 Resource

    Available Online

    https://purl.fdlp.gov/GPO/gpo96431
  • Trusted geolocation in the cloud : proof of concept implementation / Michael Bartock; Murugiah Souppaya; Raghuram Yeluri; Uttam Shetty; James Greene; Steve Orrin; Hemma Prafullchandra; John McLeese; Jason Mills; Daniel Carayiannis; Tarik Williams; Karen Scarfone.

    • Text
    • Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology, 2015.
    • 2015
    • 1 Resource

    Available Online

    https://purl.fdlp.gov/GPO/gpo102838
  • Security of interactive and automated access management using secure shell (SSH) / Tatu Ylonen; paul Turner; Karen Scarfone; Murugiah Souppaya.

    • Text
    • Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology, 2015.
    • 2015
    • 1 Resource

    Available Online

    https://purl.fdlp.gov/GPO/gpo99541
  • Derived Personal Identity Verification (PIV) credentials (DPC) proof of concept research / Michael Bartock; Jeffrey Cichonski; Murugiah Souppaya; Paul Fox; Mike Miller; Ryan Holley; Karen Scarfone.

    • Text
    • Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology, 2016.
    • 2016
    • 1 Resource

    Available Online

    https://purl.fdlp.gov/GPO/gpo97232
  • Guidelines for access control system evaluation metrics / Vincent C. Hu, Karen Scarfone.

    • Text
    • Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology, [2012]
    • 2012
    • 1 Resource

    Available Online

    https://purl.fdlp.gov/GPO/gpo28911
  • The Common Misuse Scoring System (CMSS) : metrics for software feature misuse vulnerabilities / Elizabeth LeMay, Karen Scarfone, Peter Mell.

    • Text
    • Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology, [2012]
    • 2012
    • 1 Resource

    Available Online

    https://purl.fdlp.gov/GPO/gpo28913
  • Guide to enterprise patch management technologies (draft) : recommendations of the National Institute of Standards and Technology / Murugiah Souppaya, Karen Scarfone.

    • Text
    • Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology, [2012]
    • 2012
    • 1 Resource

    Available Online

    https://purl.fdlp.gov/GPO/gpo28901
  • Guidelines for managing and securing mobile devices in the enterprise (draft) : recommendations of the National Institute of Standards and Technology / Murugiah Souppaya, Karen Scarfone.

    • Text
    • Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology, [2012]
    • 2012
    • 1 Resource

    Available Online

    https://purl.fdlp.gov/GPO/gpo28884
  • The technical specification for the Security Content Automation Protocol (SCAP), SCAP version 1.1 : recommendations of the National Institute of Standards and Technology / David Waltermire, Stephen Quinn, Karen Scarfone.

    • Text
    • Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology, [2011]
    • 2011
    • 1 Resource

    Available Online

    https://purl.fdlp.gov/GPO/gpo28837
  • Guide to protecting the confidentiality of Personally Identifiable Information (PII) : recommendations of the National Institute of Standards and Technology / Erika McCallister, Tim Grance, Karen Scarfone.

    • Text
    • Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology, [2010]
    • 2010
    • 1 Resource

    Available Online

    https://purl.fdlp.gov/GPO/gpo28832
  • Guide to using vulnerability naming schemes : recommendations of the National Institute of Standards and Technology / David Waltermire, Karen Scarfone.

    • Text
    • Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology, [2011]
    • 2011
    • 1 Resource

    Available Online

    https://purl.fdlp.gov/GPO/gpo28823
  • Guide to Industrial Control Systems (ICS) security : Supervisory Control and Data Acquisition (SCADA) systems, Distributed Control systems (DCS), and other control system configurations such as Programmable Logic Controllers (PLC) : recommendations of the National Institute of Standards and Technology, Computer security / Keith Stouffer, Joe Falco, Karen Scarfone.

    • Text
    • Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology, 2011.
    • 2011
    • 1 Resource

    Available Online

    https://purl.fdlp.gov/GPO/gpo95960

No results found from Digital Research Books Beta

Digital books for research from multiple sources world wide- all free to read, download, and keep. No Library Card is Required. Read more about the project.

digital-research-book
Explore Digital Research Books Beta