Kids Library Home

Welcome to the Kids' Library!

Search for books, movies, music, magazines, and more.

     
Available items only
Result Page   
Add Marked to Bag Add All On Page
Subjects (1-50 of 52)
Computer Security Standards United States
1
ElectronicResource GovDoc
 

Best practices for keeping your home network secure



[Ft. Meade, MD] : National Security Agency, [2011] 2011

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  D 1.2:H 75/4    ---  Available
2
ElectronicResource GovDoc
 

Building an information technology security awareness and training program


Wilson, Mark.
Gaithersburg, MD : U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology ; Washington, D.C. : For sale by the Supt. of Docs., U.S. G.P.O., [2003] 2003

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  C 13.10:800-50    ---  Available
3
ElectronicResource GovDoc
 

A comparison of the security requirements for cryptographic modules in FIPS 140-1 and FIPS 140-2


Snouffer, Ray.
Gaithersburg, MD : U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, [2001] 2001

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  C 13.10:800-29    ---  Available
4
ElectronicResource GovDoc
 

Contingency planning guide for information technology systems recommendations of the National Instit



Gaithersburg, Md. : U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology ; Washington, D.C. : For sale by the Supt. of Docs., U.S. G.P.O., [2002] 2002

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  C 13.10:800-34    ---  Available
5
Electronic Book
 

Critical infrastructure protection, measures needed to assess agencies' promotion of the cybersecuri


United States. Government Accountability Office, author.
[Washington, D.C.] : United States Government Accountability Office, 2015. 2015

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  GA 1.13:GAO-16-152    ---  Available
6
ElectronicResource GovDoc
 

Cryptographic algorithms and key sizes for Personal Identity Verification


Polk, Tim, 1962-
Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology, [2010] 2010

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  C 13.10:800-78-2    ---  Available
7
Electronic Book
 

Cybersecurity Capability Maturity Model : (C2M2)



Washington, DC : Office of Cybersecurity, Energy Security, and Emergency Response 2022

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online    ---  Available
8
Electronic Book
 

Cybersecurity challenges and cyber risk management at the Department of Veterans Affairs : hearing b


United States. Congress. House. Committee on Veterans' Affairs. Subcommittee on Technology Modernization, author.
Washington : U.S. Government Publishing Office, 2022. 2022

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  Y 4.V 64/3:116-45    ---  Available
9
Electronic Book
 

Cybersecurity: State needs to expeditiously implement risk management and other key practices : repo


United States. Government Accountability Office, author.
Washington, DC : United States Government Accountability Office, 2023. 2023

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online    ---  Available
10
ElectronicResource GovDoc
 

Data security and confidentiality guidelines for HIV, viral hepatitis, sexually transmitted disease,



[Atlanta, GA] : National Center for HIV/AIDS, Viral Hepatitis, STD, and TB Prevention, Department of Health and Human Services, [2011] 2011

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  HE 20.7308:D 26    ---  Available
11
ElectronicResource GovDoc
 

Digital Signature Standard (DSS)


National Institute of Standards and Technology (U.S.)
Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology, [2009] 2009

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  C 13.52:186-3    ---  Available
12
Electronic Book
 

Exploring common criteria : can it assure that the federal government gets needed security in softwa


United States. Congress. House. Committee on Government Reform. Subcommittee on Technology, Information Policy, Intergovernmental Relations, and the Census.
Washington : U.S. G.P.O. : For sale by the Supt. of Docs., U.S. G.P.O., 2004. 2004

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  Y 4.G 74/7:EX 7/10    ---  Available
13
ElectronicResource GovDoc
 

Federal S/MIME V3 client profile recommendations of the National Institute of Standards and Technolo


Chernick, C. Michael.
Gaithersburg, MD : U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, [2002] 2002

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  C 13.10:800-49    ---  Available
14
ElectronicResource GovDoc
 

Generally accepted principles and practices for securing information technology systems


Swanson, Marianne.
[Gaithersburg, Md.] : National Institute of Standards and Technology, Technology Administration, U.S. Dept. of Commerce, [1996] 1996

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  C 13.10:800-14    ---  Available
15
ElectronicResource GovDoc
 

Guide for assessing the security controls in federal information systems building effective security



Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology, [2008] 2008

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  C 13.10:800-53 A/2008    ---  Available
16
ElectronicResource GovDoc
 

Guide for conducting risk assessments


United States. Joint Task Force Transformation Initiative.
Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology, [2012] 2012

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  C 13.10:800-30/REV.1    ---  Available
17
ElectronicResource GovDoc
 

Guide for developing performance metrics for information security recommendations of the National In


Chew, Elizabeth.
Gaithersburg, MD : U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, [2006] 2006

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  C 13.10:800-80/DRAFT    ---  Available
18
ElectronicResource GovDoc
 

Guide for developing security plans for federal information systems


Swanson, Marianne.
Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology, [2006] 2006

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  C 13.10:800-18/REV.1    ---  Available
19
ElectronicResource GovDoc
 

Guide for the security certification and accreditation of federal information systems


Ross, Ron (Ronald S.)
Gaithersburg, MD : U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, [2004] 2004

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  C 13.10:800-37    ---  Available
20
ElectronicResource GovDoc
 

Guide to computer security log management recommendations of the National Institute of Standards and


Kent, Karen (Karen Ann)
Gaithersburg, MD : U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, [2006] 2006

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  C 13.10:800-92    ---  Available
21
ElectronicResource GovDoc
 

Guide to enterprise patch management technologies (draft) recommendations of the National Institute


Souppaya, Murugiah.
Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology, [2012] 2012

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  C 13.10:800-40/REV.3/DRAFT    ---  Available
22
ElectronicResource GovDoc
 

Guide to security for full virtualization technologies recommendations of the National Institute of


Kent, Karen (Karen Ann)
Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology, [2011] 2011

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  C 13.10:800-125    ---  Available
23
ElectronicResource GovDoc
 

Guide to selecting information technology security products recommendations of the National Institut


Grance, Timothy.
Gaithersburg, MD : U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, [2003] 2003

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  C 13.10:800-36    ---  Available
24
ElectronicResource GovDoc
 

Guide to using vulnerability naming schemes recommendations of the National Institute of Standards a


Waltermire, David.
Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology, [2011] 2011

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  C 13.10:800-51/REV.1    ---  Available
25
ElectronicResource GovDoc
 

Guideline for the use of advanced authentication technology alternatives


National Institute of Standards and Technology (U.S.)
Gaithersburg, MD : Computer Systems Laboratory, National Institute of Standards and Technology, U.S. Dept. of Commerce, Technology Administration, [1994] 1994

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  C 13.52:190    ---  Available
26
Print Material
 

Guidelines for the selection and use of Transport Layer Security (TLS) implementations : recommendat


Chernick, C. Michael.
Gaithersburg, MD : U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, [2005] 2005

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  C 13.10:800-52    ---  Available
27
ElectronicResource GovDoc
 

Guidelines on active content and mobile code recommendations of the National Institute of Standards


Jansen, Wayne A.
Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology, [2008] 2008

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  C 13.10:800-28/2008    ---  Available
28
ElectronicResource GovDoc
 

Guidelines on electronic mail security recommendations of the National Institute of Standards and Te



Gaithersburg, MD : U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, [2007] 2007

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  C 13.10:800-45/2007    ---  Available
29
ElectronicResource GovDoc
 

Guidelines on PDA forensics recommendations of the National Institute of Standards and Technology


Jansen, Wayne.
Gaithersburg, MD : Computer Security Division, Information Technology Laboratory, [2004] 2004

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  C 13.10:800-72    ---  Available
30
ElectronicResource GovDoc
 

Guidelines on securing public web servers recommendations of the National Institute of Standards and



Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology, [2007] 2007

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  C 13.10:800-44/2007    ---  Available
31
ElectronicResource GovDoc
 

Integrating IT security into the capital planning and investment control process



Gaithersburg, MD : National Institute of Standards and Technology, Technology Administration, U.S. Dept. of Commerce, [2005] 2005

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  C 13.10:800-65    ---  Available
32
ElectronicResource GovDoc
 

An introductory resource guide for implementing the Health Insurance Portability and Accountability


Scholl, Matthew.
Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology, [2008] 2008

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  C 13.10:800-66/REV.1    ---  Available
33
ElectronicResource GovDoc
 

Recommendation for block cipher modes of operation Galois/Counter mode (GCM) and GMAC


Dworkin, Morris.
Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology, [2007] 2007

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  C 13.10:800-38 D    ---  Available
34
ElectronicResource GovDoc
 

Recommendation for block cipher modes of operation methods and techniques


Dworkin, Morris
Gaithersburg, MD : U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology : For sale by the Supt. of Docs., U.S. G.P.O., [2001] 2001

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  C 13.10:800-38 A    ---  Available
35
ElectronicResource GovDoc
 

Recommendation for block cipher modes of operation methods for key wrapping


Dworkin, Morris.
Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology, [2011] 2011

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  C 13.10:800-38 F/DRAFT    ---  Available
36
ElectronicResource GovDoc
 

Recommendation for block cipher modes of operation the CCM mode for authentication and confidentiali


Dworkin, Morris.
Gaithersburg, MD : U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, [2004] 2004

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  C 13.10:800-38 C    ---  Available
37
ElectronicResource GovDoc
 

Recommendation for block cipher modes of operation the CMAC mode for authentication


Dworkin, Morris.
Gaithersburg, MD : U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, [2005] 2005

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  C 13.10:800-38 B    ---  Available
38
ElectronicResource GovDoc
 

Recommendation for key derivation through extraction-then-expansion


Chen, Lily.
[Gaithersburg, Md.] : U.S. Dept. of Commerce, National Institute of Standards and Technology, [2011] 2011

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  C 13.10:800-56 C    ---  Available
39
ElectronicResource GovDoc
 

Recommendation for obtaining assurances for digital signature applications


Barker, Elaine B.
[Gaithersburg, MD] : U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, [2006] 2006

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  C 13.10:800-89    ---  Available
40
Electronic Book
 

Recommendation for pair-wise key establishment schemes using discrete logarithm cryptography : (revi


Barker, Elaine B.
[Gaithersburg, Md.] : National Institute of Standards and Technology, [2007] 2007

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  C 13.10:800-56 A/REV.    ---  Available
41
ElectronicResource GovDoc
 

Recommendation for pair-wise key establishment schemes using integer factorization cryptography



[Gaithersburg, Md.] : National Institute of Standards and Technology, [2009] 2009

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  C 13.10:800-56 B    ---  Available
42
ElectronicResource GovDoc
 

Recommendation for password-based key derivation.



Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology, [2010] 2010

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  C 13.10:800-132    ---  Available
43
ElectronicResource GovDoc
 

Recommendation for random bit generator (RBG) constructions


Barker, Elaine B.
[Gaithersburg, MD] : U.S. Dept. of Commerce, National Institute of Standards and Technology, [2012] 2012

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  C 13.10:800-90 C/DRAFT    ---  Available
44
ElectronicResource GovDoc
 

Recommendation for random number generation using deterministic random bit generators


Barker, Elaine B.
[Gaithersburg, MD] : U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, [2006] 2006

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  C 13.10:800-90    ---  Available
45
Electronic Book
 

Recommendation for random number generation using deterministic random bit generators (revised)


Barker, Elaine B.
[Gaithersburg, MD] : U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, Computer Security Division, Information Technology Laboratory, [2007] 2007

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  C 13.10:800-90/REV.    ---  Available
46
ElectronicResource GovDoc
 

Recommendation for the entropy sources used for random bit generator


Barker, Elaine B.
[Gaithersburg, MD] : U.S. Dept. of Commerce, National Institute of Standards and Technology, [2012] 2012

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  C 13.10:800-90 B/DRAFT    ---  Available
47
ElectronicResource GovDoc
 

Recommendation for the Triple Data Encryption Algorithm (TDEA) block cipher


Barker, William C. (William Curt)
Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology, [2011] 2011

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  C 13.10:800-67/2011    ---  Available
48
ElectronicResource GovDoc
 

Recommended security controls for federal information systems and organizations


United States. Joint Task Force Transformation Initiative.
Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology, [2009] 2009

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  C 13.10:800-53/REV.3/EXCERPT    ---  Available
49
ElectronicResource GovDoc
 

Security and privacy controls for federal information systems and organizations


United States. Joint Task Force Transformation Initiative.
Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology, [2012] 2012

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  C 13.10:800-53/REV.4/DRAFT    ---  Available
50
ElectronicResource GovDoc
 

Security self-assessment guide for information technology systems


Swanson, Marianne.
[Gaithersburg, MD] : U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology : For sale by the Supt. of Docs., U.S. G.P.O., [2001] 2001

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  C 13.10:800-26    ---  Available
Add Marked to Bag Add All On Page
Locate in results
Result Page   
 
    
Available items only