Research Catalog
New! Try our Article Search to discover online journals, books, and more from home with your library card.
Selected filters.Clear Filters
Displaying 1-28 of 28 results for author "National Institute of Standards and Technology (U.S.). Computer Security Division."
Modes of Operation Validation System for the Triple Data Encryption Algorithm (TMOVS) : requirements and procedures / S. S. Keller.
- Text
- Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology, 2012.
- 2012
- 1 Resource
Available Online
https://purl.fdlp.gov/GPO/gpo94423Recommendation for block cipher modes of operation : the CCM mode for authentication and confidentiality / M. J. Dworkin.
- Text
- Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology, 2007.
- 2007
- 1 Resource
Available Online
https://purl.fdlp.gov/GPO/gpo97057Border gateway protocol security / D. R. Kuhn, K. Sriram, D. C. Montgomery.
- Text
- Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology, 2007.
- 2007
- 1 Resource
Available Online
https://purl.fdlp.gov/GPO/gpo99834Recommendation for key derivation through extraction-then-expansion / L. Chen.
- Text
- Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology, 2011.
- 2011
- 1 Resource
Available Online
https://purl.fdlp.gov/GPO/gpo94461Security considerations in the information system development life cycle / T. Grance, J. Hash, M. Stevens.
- Text
- Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology, 2003.
- 2003
- 1 Resource
Available Online
https://purl.fdlp.gov/GPO/gpo97417Interfaces for personal identity verification / J. F. Dray, S. Guthery, T. Schwarzhoff.
- Text
- Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology, 2005.
- 2005
- 1 Resource
Available Online
https://purl.fdlp.gov/GPO/gpo100754Cryptographic algorithms and key sizes for personal identity verification / W. T. Polk, D. F. Dodson, W. E. Burr.
- Text
- Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology, 2007.
- 2007
- 1 Resource
Available Online
https://purl.fdlp.gov/GPO/gpo97841PIV middleware and PIV card application conformance test guidance (SP 800-73 compliance) / R. Chandramouli, L. Eyuboglu, K. Mehta.
- Text
- Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology, 2005.
- 2005
- 1 Resource
Available Online
https://purl.fdlp.gov/GPO/gpo98807Guide to Attribute Based Access Control (ABAC) definition and considerations / V. C. Hu, D. Ferraiolo, D. R. Kuhn, A. Schnitzer, K. Sandlin, R. Miller, K. A. Scarfone.
- Text
- Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology, 2014.
- 2014
- 1 Resource
Available Online
https://purl.fdlp.gov/GPO/gpo98542Approximate matching : definition and terminology / F. Breitinger, D. White, B. Guttman, M. McCarrin, V. Roussev.
- Text
- Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology, 2014.
- 2014
- 1 Resource
Available Online
https://purl.fdlp.gov/GPO/gpo96646Guide for developing security plans for information technology systems / Marianne Swanson.
- Text
- Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology, 1998.
- 1998
- 1 Resource
Available Online
https://purl.fdlp.gov/GPO/gpo103724Guidelines on security and privacy in public cloud computing / W. Jansen, T. Grance.
- Text
- Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology, 2011.
- 2011
- 1 Resource
Available Online
https://purl.fdlp.gov/GPO/gpo94651Computer security considerations in federal procurements : a guide for procurement initiators, contracting officers, and computer security officials / Barbara Guttman.
- Text
- Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology, 1992.
- 1992
- 1 Resource
Available Online
https://purl.fdlp.gov/GPO/gpo104187Establishing a computer security incident response capability (CSIRC) / John P. Wack.
- Text
- Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology, 1991.
- 1991
- 1 Resource
Available Online
https://purl.fdlp.gov/GPO/gpo102242Security issues in the database language SQL / W. Timothy Polk, Lawrence E. Bassham, III.
- Text
- Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology, 1993.
- 1993
- 1 Resource
Available Online
https://purl.fdlp.gov/GPO/gpo96624A guide to the selection of anti-virus tools and techniques / W. Timothy Polk, Lawrence E. Bassham III.
- Text
- Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology, 1992.
- 1992
- 1 Resource
Available Online
https://purl.fdlp.gov/GPO/gpo105030Automated tools for testing computer system vulnerability / W. Timothy Polk.
- Text
- Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology, 1992.
- 1992
- 1 Resource
Available Online
https://purl.fdlp.gov/GPO/gpo103697Bibliography of selected computer security publications : January 1980-October 1989 / Lawrence E. Bassham III.
- Text
- Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology, 1990.
- 1990
- 1 Resource
Available Online
https://purl.fdlp.gov/GPO/gpo98824Public-key cryptography / James Nechvatal.
- Text
- Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology, 1991.
- 1991
- 1 Resource
Available Online
https://purl.fdlp.gov/GPO/gpo105320Security in open systems / John Barkley.
- Text
- Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology, 1994.
- 1994
- 1 Resource
Available Online
https://purl.fdlp.gov/GPO/gpo100015Good security practices for electronic commerce, including electronic data interchange / Roy G. Saltman.
- Text
- Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology, 1993.
- 1993
- 1 Resource
Available Online
https://purl.fdlp.gov/GPO/gpo102635Keeping your site comfortably secure : an introduction to Internet firewalls / John P. Wack, Lisa J. Carnahan.
- Text
- Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology, 1994.
- 1994
- 1 Resource
Available Online
https://purl.fdlp.gov/GPO/gpo100014The impact of the FCC's Open Network Architecture on NS/NP telecommunications security / Karen Olsen, John Tebbutt.
- Text
- Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology, 1995.
- 1995
- 1 Resource
Available Online
https://purl.fdlp.gov/GPO/gpo101522Guidance for securing Microsoft Windows XP for IT Professionals : a NIST security configuration checklist : recommendations of the National Institute of Standards and Technology / Murugia Souppaya, Karen Kent, Paul M. Johnson.
- Text
- Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology, 2005.
- 2005
- 1 Resource
Available Online
https://purl.fdlp.gov/GPO/gpo97365Guideline for implementing cryptography in the federal government / Annabelle Lee.
- Text
- Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology, 1999.
- 1999
- 1 Resource
Available Online
https://purl.fdlp.gov/GPO/gpo101450A statistical test suite for random and pseudorandom number generators for cryptographic applications / Andrew Rukhin, Juan Sota, James Nechvatal, Miles Smid, Elaine Barker, Stefan Leigh, Mark Levenson, Mark Vangel, David Banks, Alan Heckert, James Dray, San Vo.
- Text
- Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology, 2000.
- 2000
- 1 Resource
Available Online
https://purl.fdlp.gov/GPO/gpo104492Engineering principles for information technology security (a baseline for achieving security) : recommendations of the National Institute of Standards and Technology / Gary Stoneburner, Clark Hayden, Alexis Feringa.
- Text
- Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology, 2001.
- 2001
- 1 Resource
Available Online
https://purl.fdlp.gov/GPO/gpo104217Cryptographic algorithms and key sizes for personal identity verification / W. T. Polk, D. F. Dodson, W. E. Burr, H. Ferraiolo, D. A. Cooper.
- Text
- Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology, 2010.
- 2010
- 1 Resource
Available Online
https://purl.fdlp.gov/GPO/gpo103292
No results found from Digital Research Books Beta
Digital books for research from multiple sources world wide- all free to read, download, and keep. No Library Card is Required. Read more about the project.
