Research Catalog

  • Modes of Operation Validation System for the Triple Data Encryption Algorithm (TMOVS) : requirements and procedures / S. S. Keller.

    • Text
    • Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology, 2012.
    • 2012
    • 1 Resource

    Available Online

    https://purl.fdlp.gov/GPO/gpo94423
  • Recommendation for block cipher modes of operation : the CCM mode for authentication and confidentiality / M. J. Dworkin.

    • Text
    • Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology, 2007.
    • 2007
    • 1 Resource

    Available Online

    https://purl.fdlp.gov/GPO/gpo97057
  • Border gateway protocol security / D. R. Kuhn, K. Sriram, D. C. Montgomery.

    • Text
    • Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology, 2007.
    • 2007
    • 1 Resource

    Available Online

    https://purl.fdlp.gov/GPO/gpo99834
  • Recommendation for key derivation through extraction-then-expansion / L. Chen.

    • Text
    • Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology, 2011.
    • 2011
    • 1 Resource

    Available Online

    https://purl.fdlp.gov/GPO/gpo94461
  • Security considerations in the information system development life cycle / T. Grance, J. Hash, M. Stevens.

    • Text
    • Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology, 2003.
    • 2003
    • 1 Resource

    Available Online

    https://purl.fdlp.gov/GPO/gpo97417
  • Interfaces for personal identity verification / J. F. Dray, S. Guthery, T. Schwarzhoff.

    • Text
    • Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology, 2005.
    • 2005
    • 1 Resource

    Available Online

    https://purl.fdlp.gov/GPO/gpo100754
  • Cryptographic algorithms and key sizes for personal identity verification / W. T. Polk, D. F. Dodson, W. E. Burr.

    • Text
    • Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology, 2007.
    • 2007
    • 1 Resource

    Available Online

    https://purl.fdlp.gov/GPO/gpo97841
  • PIV middleware and PIV card application conformance test guidance (SP 800-73 compliance) / R. Chandramouli, L. Eyuboglu, K. Mehta.

    • Text
    • Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology, 2005.
    • 2005
    • 1 Resource

    Available Online

    https://purl.fdlp.gov/GPO/gpo98807
  • Guide to Attribute Based Access Control (ABAC) definition and considerations / V. C. Hu, D. Ferraiolo, D. R. Kuhn, A. Schnitzer, K. Sandlin, R. Miller, K. A. Scarfone.

    • Text
    • Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology, 2014.
    • 2014
    • 1 Resource

    Available Online

    https://purl.fdlp.gov/GPO/gpo98542
  • Approximate matching : definition and terminology / F. Breitinger, D. White, B. Guttman, M. McCarrin, V. Roussev.

    • Text
    • Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology, 2014.
    • 2014
    • 1 Resource

    Available Online

    https://purl.fdlp.gov/GPO/gpo96646
  • Guide for developing security plans for information technology systems / Marianne Swanson.

    • Text
    • Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology, 1998.
    • 1998
    • 1 Resource

    Available Online

    https://purl.fdlp.gov/GPO/gpo103724
  • Guidelines on security and privacy in public cloud computing / W. Jansen, T. Grance.

    • Text
    • Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology, 2011.
    • 2011
    • 1 Resource

    Available Online

    https://purl.fdlp.gov/GPO/gpo94651
  • Computer security considerations in federal procurements : a guide for procurement initiators, contracting officers, and computer security officials / Barbara Guttman.

    • Text
    • Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology, 1992.
    • 1992
    • 1 Resource

    Available Online

    https://purl.fdlp.gov/GPO/gpo104187
  • Establishing a computer security incident response capability (CSIRC) / John P. Wack.

    • Text
    • Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology, 1991.
    • 1991
    • 1 Resource

    Available Online

    https://purl.fdlp.gov/GPO/gpo102242
  • Security issues in the database language SQL / W. Timothy Polk, Lawrence E. Bassham, III.

    • Text
    • Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology, 1993.
    • 1993
    • 1 Resource

    Available Online

    https://purl.fdlp.gov/GPO/gpo96624
  • A guide to the selection of anti-virus tools and techniques / W. Timothy Polk, Lawrence E. Bassham III.

    • Text
    • Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology, 1992.
    • 1992
    • 1 Resource

    Available Online

    https://purl.fdlp.gov/GPO/gpo105030
  • Automated tools for testing computer system vulnerability / W. Timothy Polk.

    • Text
    • Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology, 1992.
    • 1992
    • 1 Resource

    Available Online

    https://purl.fdlp.gov/GPO/gpo103697
  • Bibliography of selected computer security publications : January 1980-October 1989 / Lawrence E. Bassham III.

    • Text
    • Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology, 1990.
    • 1990
    • 1 Resource

    Available Online

    https://purl.fdlp.gov/GPO/gpo98824
  • Public-key cryptography / James Nechvatal.

    • Text
    • Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology, 1991.
    • 1991
    • 1 Resource

    Available Online

    https://purl.fdlp.gov/GPO/gpo105320
  • Security in open systems / John Barkley.

    • Text
    • Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology, 1994.
    • 1994
    • 1 Resource

    Available Online

    https://purl.fdlp.gov/GPO/gpo100015
  • Good security practices for electronic commerce, including electronic data interchange / Roy G. Saltman.

    • Text
    • Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology, 1993.
    • 1993
    • 1 Resource

    Available Online

    https://purl.fdlp.gov/GPO/gpo102635
  • Keeping your site comfortably secure : an introduction to Internet firewalls / John P. Wack, Lisa J. Carnahan.

    • Text
    • Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology, 1994.
    • 1994
    • 1 Resource

    Available Online

    https://purl.fdlp.gov/GPO/gpo100014
  • The impact of the FCC's Open Network Architecture on NS/NP telecommunications security / Karen Olsen, John Tebbutt.

    • Text
    • Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology, 1995.
    • 1995
    • 1 Resource

    Available Online

    https://purl.fdlp.gov/GPO/gpo101522
  • Guidance for securing Microsoft Windows XP for IT Professionals : a NIST security configuration checklist : recommendations of the National Institute of Standards and Technology / Murugia Souppaya, Karen Kent, Paul M. Johnson.

    • Text
    • Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology, 2005.
    • 2005
    • 1 Resource

    Available Online

    https://purl.fdlp.gov/GPO/gpo97365
  • Guideline for implementing cryptography in the federal government / Annabelle Lee.

    • Text
    • Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology, 1999.
    • 1999
    • 1 Resource

    Available Online

    https://purl.fdlp.gov/GPO/gpo101450
  • A statistical test suite for random and pseudorandom number generators for cryptographic applications / Andrew Rukhin, Juan Sota, James Nechvatal, Miles Smid, Elaine Barker, Stefan Leigh, Mark Levenson, Mark Vangel, David Banks, Alan Heckert, James Dray, San Vo.

    • Text
    • Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology, 2000.
    • 2000
    • 1 Resource

    Available Online

    https://purl.fdlp.gov/GPO/gpo104492
  • Engineering principles for information technology security (a baseline for achieving security) : recommendations of the National Institute of Standards and Technology / Gary Stoneburner, Clark Hayden, Alexis Feringa.

    • Text
    • Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology, 2001.
    • 2001
    • 1 Resource

    Available Online

    https://purl.fdlp.gov/GPO/gpo104217
  • Cryptographic algorithms and key sizes for personal identity verification / W. T. Polk, D. F. Dodson, W. E. Burr, H. Ferraiolo, D. A. Cooper.

    • Text
    • Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology, 2010.
    • 2010
    • 1 Resource

    Available Online

    https://purl.fdlp.gov/GPO/gpo103292

No results found from Digital Research Books Beta

Digital books for research from multiple sources world wide- all free to read, download, and keep. No Library Card is Required. Read more about the project.

digital-research-book
Explore Digital Research Books Beta