Kids Library Home

Welcome to the Kids' Library!

Search for books, movies, music, magazines, and more.

     
Available items only
Nearby SuDoc Numbers are:
Result Page   Prev Next
Add Marked to Bag Add All On Page
Mark   Media Year
C 13. 10 : 800- 27/Rev.A    
      Engineering principles for information technology security (a baseline for achieving security), revis C 13.10:800-27/REV.A ; Axe Federal Documents Online:Available   E-Book/E-Doc 2004
      Engineering principles for information technology security (a baseline for achieving security), revis Axe Federal Documents Online:Available   E-Book/E-Doc 2004
C 13. 10 : 800- 28/ 2008    
      Guidelines on active content and mobile code [electronic resource] : recommendations of the National C 13.10:800-28/2008 ; Axe Federal Documents Online:Available   E-Book/E-Doc 2008
      Guidelines on active content and mobile code [electronic resource] : recommendations of the National Axe Federal Documents Online:Available   E-Book/E-Doc 2008
C 13. 10 : 800- 29    
      A comparison of the security requirements for cryptographic modules in FIPS 140-1 and FIPS 140-2 [ele C 13.10:800-29 ; Axe Federal Documents Online:Available   E-Book/E-Doc 2001
      A comparison of the security requirements for cryptographic modules in FIPS 140-1 and FIPS 140-2 [ele Axe Federal Documents Online:Available   E-Book/E-Doc 2001
C 13. 10 : 800- 30/Rev. 1    
      Guide for conducting risk assessments [electronic resource] / Joint Task Force Transformation Initiat C 13.10:800-30/REV.1 ; Axe Federal Documents Online:Available   E-Book/E-Doc 2012
      Guide for conducting risk assessments [electronic resource] / Joint Task Force Transformation Initiat Axe Federal Documents Online:Available   E-Book/E-Doc 2012
C 13. 10 : 800- 31    
      Intrusion detection systems [electronic resource] / Rebecca Bace and Peter Mell. C 13.10:800-31 ; Axe Federal Documents Online:Available   E-Book/E-Doc 2001
      Intrusion detection systems [electronic resource] / Rebecca Bace and Peter Mell. Axe Federal Documents Online:Available   E-Book/E-Doc 2001
C 13. 10 : 800- 32    
      Introduction to public key technology and the federal PKI infrastructure [electronic resource] / D. R C 13.10:800-32 ; Axe Federal Documents Online:Available   E-Book/E-Doc 2001
      Introduction to public key technology and the federal PKI infrastructure [electronic resource] / D. R Axe Federal Documents Online:Available   E-Book/E-Doc 2001
C 13. 10 : 800- 33    
      Underlying technical models for information technology security [electronic resource] : recommendatio C 13.10:800-33 ; Axe Federal Documents Online:Available   E-Book/E-Doc 2001
      Underlying technical models for information technology security [electronic resource] : recommendatio Axe Federal Documents Online:Available   E-Book/E-Doc 2001
C 13. 10 : 800- 34    
      Contingency planning guide for information technology systems [electronic resource] : recommendations C 13.10:800-34 ; Axe Federal Documents Online:Available   E-Book/E-Doc 2002
      Contingency planning guide for information technology systems [electronic resource] : recommendations Axe Federal Documents Online:Available   E-Book/E-Doc 2002
C 13. 10 : 800- 35    
      Guide to information technology security services [electronic resource] / Tim Grance ... [et al.]. C 13.10:800-35 ; Axe Federal Documents Online:Available   E-Book/E-Doc 2003
      Guide to information technology security services [electronic resource] / Tim Grance ... [et al.]. Axe Federal Documents Online:Available   E-Book/E-Doc 2003
C 13. 10 : 800- 36    
      Guide to selecting information technology security products [electronic resource] : recommendations o C 13.10:800-36 ; Axe Federal Documents Online:Available   E-Book/E-Doc 2003
      Guide to selecting information technology security products [electronic resource] : recommendations o Axe Federal Documents Online:Available   E-Book/E-Doc 2003
C 13. 10 : 800- 37    
      Guide for the security certification and accreditation of federal information systems [electronic res C 13.10:800-37 ; Axe Federal Documents Online:Available   E-Book/E-Doc 2004
      Guide for the security certification and accreditation of federal information systems [electronic res Axe Federal Documents Online:Available   E-Book/E-Doc 2004
C 13. 10 : 800- 37/Rev. 1    
      Guide for applying the risk management framework to federal information systems [electronic resource] C 13.10:800-37/REV.1 ; Axe Federal Documents Online:Available   E-Book/E-Doc 2010
      Guide for applying the risk management framework to federal information systems [electronic resource] Axe Federal Documents Online:Available   E-Book/E-Doc 2010
C 13. 10 : 800- 38a    
      Recommendation for block cipher modes of operation [electronic resource] : methods and techniques / M C 13.10:800-38 A ; Axe Federal Documents Online:Available   E-Book/E-Doc 2001
      Recommendation for block cipher modes of operation [electronic resource] : methods and techniques / M Axe Federal Documents Online:Available   E-Book/E-Doc 2001
C 13. 10 : 800- 38b    
      Recommendation for block cipher modes of operation [electronic resource] : the CMAC mode for authenti C 13.10:800-38 B ; Axe Federal Documents Online:Available   E-Book/E-Doc 2005
      Recommendation for block cipher modes of operation [electronic resource] : the CMAC mode for authenti Axe Federal Documents Online:Available   E-Book/E-Doc 2005
C 13. 10 : 800- 38c    
      Recommendation for block cipher modes of operation [electronic resource] : the CCM mode for authentic C 13.10:800-38 C ; Axe Federal Documents Online:Available   E-Book/E-Doc 2004
      Recommendation for block cipher modes of operation [electronic resource] : the CCM mode for authentic Axe Federal Documents Online:Available   E-Book/E-Doc 2004
C 13. 10 : 800- 38d    
      Recommendation for block cipher modes of operation [electronic resource] : Galois/Counter mode (GCM) C 13.10:800-38 D ; Axe Federal Documents Online:Available   E-Book/E-Doc 2007
      Recommendation for block cipher modes of operation [electronic resource] : Galois/Counter mode (GCM) Axe Federal Documents Online:Available   E-Book/E-Doc 2007
C 13. 10 : 800- 38f/Draft    
      Recommendation for block cipher modes of operation [electronic resource] : methods for key wrapping / C 13.10:800-38 F/DRAFT ; Axe Federal Documents Online:Available   E-Book/E-Doc 2011
      Recommendation for block cipher modes of operation [electronic resource] : methods for key wrapping / Axe Federal Documents Online:Available   E-Book/E-Doc 2011
C 13. 10 : 800- 39    
      Managing information security risk [electronic resource] : organization, mission, and information sys C 13.10:800-39 ; Axe Federal Documents Online:Available   E-Book/E-Doc 2011
      Managing information security risk [electronic resource] : organization, mission, and information sys Axe Federal Documents Online:Available   E-Book/E-Doc 2011
C 13. 10 : 800- 40/Rev. 3/Draft    
      Guide to enterprise patch management technologies (draft) [electronic resource] : recommendations of C 13.10:800-40/REV.3/DRAFT ; Axe Federal Documents Online:Available   E-Book/E-Doc 2012
      Guide to enterprise patch management technologies (draft) [electronic resource] : recommendations of Axe Federal Documents Online:Available   E-Book/E-Doc 2012
C 13. 10 : 800- 41/Rev. 1    
      Guidelines on firewalls and firewall policy [electronic resource] : recommendations of the National I C 13.10:800-41/REV.1 ; Axe Federal Documents Online:Available   E-Book/E-Doc 2009
      Guidelines on firewalls and firewall policy [electronic resource] : recommendations of the National I Axe Federal Documents Online:Available   E-Book/E-Doc 2009
C 13. 10 : 800- 42    
      Guideline on network security testing [electronic resource] : recommendations of the National Institu C 13.10:800-42 ; Axe Federal Documents Online:Available   E-Book/E-Doc 2003
      Guideline on network security testing [electronic resource] : recommendations of the National Institu Axe Federal Documents Online:Available   E-Book/E-Doc 2003
C 13. 10 : 800- 44/ 2007    
      Guidelines on securing public web servers [electronic resource] : recommendations of the National Ins C 13.10:800-44/2007 ; Axe Federal Documents Online:Available   E-Book/E-Doc 2007
      Guidelines on securing public web servers [electronic resource] : recommendations of the National Ins Axe Federal Documents Online:Available   E-Book/E-Doc 2007
C 13. 10 : 800- 45/ 2007    
      Guidelines on electronic mail security [electronic resource] : recommendations of the National Instit C 13.10:800-45/2007 ; Axe Federal Documents Online:Available   E-Book/E-Doc 2007
      Guidelines on electronic mail security [electronic resource] : recommendations of the National Instit Axe Federal Documents Online:Available   E-Book/E-Doc 2007
C 13. 10 : 800- 46    
      Security for telecommuting and broadband communications [electronic resource] : recommendations of th C 13.10:800-46 ; Axe Federal Documents Online:Available   E-Book/E-Doc 2002
      Security for telecommuting and broadband communications [electronic resource] : recommendations of th Axe Federal Documents Online:Available   E-Book/E-Doc 2002
C 13. 10 : 800- 46/Rev. 1    
      Guide to enterprise telework and remote access security [electronic resource] : recommendations of th C 13.10:800-46/REV.1 ; Axe Federal Documents Online:Available   E-Book/E-Doc 2009
      Guide to enterprise telework and remote access security [electronic resource] : recommendations of th Axe Federal Documents Online:Available   E-Book/E-Doc 2009
C 13. 10 : 800- 47    
      Security guide for interconnecting information technology systems [electronic resource] : recommendat C 13.10:800-47 ; Axe Federal Documents Online:Available   E-Book/E-Doc 2002
      Security guide for interconnecting information technology systems [electronic resource] : recommendat Axe Federal Documents Online:Available   E-Book/E-Doc 2002
C 13. 10 : 800- 48/Rev. 1    
      Guide to securing legacy IEEE 802.11 wireless networks [electronic resource] : recommendations of the C 13.10:800-48/REV.1 ; Axe Federal Documents Online:Available   E-Book/E-Doc 2008
      Guide to securing legacy IEEE 802.11 wireless networks [electronic resource] : recommendations of the Axe Federal Documents Online:Available   E-Book/E-Doc 2008
C 13. 10 : 800- 49    
      Federal S/MIME V3 client profile [electronic resource] : recommendations of the National Institute of C 13.10:800-49 ; Axe Federal Documents Online:Available   E-Book/E-Doc 2002
      Federal S/MIME V3 client profile [electronic resource] : recommendations of the National Institute of Axe Federal Documents Online:Available   E-Book/E-Doc 2002
C 13. 10 : 800- 50    
      Building an information technology security awareness and training program [electronic resource] / Ma C 13.10:800-50 ; Axe Federal Documents Online:Available   E-Book/E-Doc 2003
      Building an information technology security awareness and training program [electronic resource] / Ma Axe Federal Documents Online:Available   E-Book/E-Doc 2003
C 13. 10 : 800- 51/Rev. 1    
      Guide to using vulnerability naming schemes [electronic resource] : recommendations of the National I C 13.10:800-51/REV.1 ; Axe Federal Documents Online:Available   E-Book/E-Doc 2011
      Guide to using vulnerability naming schemes [electronic resource] : recommendations of the National I Axe Federal Documents Online:Available   E-Book/E-Doc 2011
C 13. 10 : 800- 52    
      Guidelines for the selection and use of Transport Layer Security (TLS) implementations : recommendati C 13.10:800-52 ; Axe Federal Documents Online:Available   Print Material 2005
      Guidelines for the selection and use of Transport Layer Security (TLS) implementations : recommendati Axe Federal Documents Online:Available   Print Material 2005
C 13. 10 : 800- 53/Rev. 3/Excerpt    
      Recommended security controls for federal information systems and organizations [electronic resource] C 13.10:800-53/REV.3/EXCERPT ; Axe Federal Documents Online:Available   E-Book/E-Doc 2009
      Recommended security controls for federal information systems and organizations [electronic resource] Axe Federal Documents Online:Available   E-Book/E-Doc 2009
C 13. 10 : 800- 53/Rev. 4/Draft    
      Security and privacy controls for federal information systems and organizations [electronic resource] C 13.10:800-53/REV.4/DRAFT ; Axe Federal Documents Online:Available   E-Book/E-Doc 2012
      Security and privacy controls for federal information systems and organizations [electronic resource] Axe Federal Documents Online:Available   E-Book/E-Doc 2012
C 13. 10 : 800- 53a/ 2008    
      Guide for assessing the security controls in federal information systems [electronic resource] : buil C 13.10:800-53 A/2008 ; Axe Federal Documents Online:Available   E-Book/E-Doc 2008
      Guide for assessing the security controls in federal information systems [electronic resource] : buil Axe Federal Documents Online:Available   E-Book/E-Doc 2008
C 13. 10 : 800- 54/ 2007    
      Border Gateway Protocol security [electronic resource] : recommendations of the National Institute of C 13.10:800-54/2007 ; Axe Federal Documents Online:Available   E-Book/E-Doc 2007
      Border Gateway Protocol security [electronic resource] : recommendations of the National Institute of Axe Federal Documents Online:Available   E-Book/E-Doc 2007
C 13. 10 : 800- 55/ 2/Rev. 1    
      Performance measurement guide for information security [electronic resource] / Elizabeth Chew ... [et C 13.10:800-55/2/REV.1 ; Axe Federal Documents Online:Available   E-Book/E-Doc 2008
      Performance measurement guide for information security [electronic resource] / Elizabeth Chew ... [et Axe Federal Documents Online:Available   E-Book/E-Doc 2008
C 13. 10 : 800- 56a/Rev.    
      Recommendation for pair-wise key establishment schemes using discrete logarithm cryptography : (revis C 13.10:800-56 A/REV. ; Axe Federal Documents Online:Available   E-Book/E-Doc 2007
      Recommendation for pair-wise key establishment schemes using discrete logarithm cryptography : (revis Axe Federal Documents Online:Available   E-Book/E-Doc 2007
C 13. 10 : 800- 56b    
      Recommendation for pair-wise key establishment schemes using integer factorization cryptography [elec C 13.10:800-56 B ; Axe Federal Documents Online:Available   E-Book/E-Doc 2009
      Recommendation for pair-wise key establishment schemes using integer factorization cryptography [elec Axe Federal Documents Online:Available   E-Book/E-Doc 2009
C 13. 10 : 800- 56c    
      Recommendation for key derivation through extraction-then-expansion [electronic resource] / Lily Chen C 13.10:800-56 C ; Axe Federal Documents Online:Available   E-Book/E-Doc 2011
      Recommendation for key derivation through extraction-then-expansion [electronic resource] / Lily Chen Axe Federal Documents Online:Available   E-Book/E-Doc 2011
C 13. 10 : 800- 57/Pt. 1/Rev.    
      Recommendation for key management. Part 1, General / Elaine Barker [and others]. C 13.10:800-57/PT.1/REV. ; Axe Federal Documents Online:Available   E-Book/E-Doc 2006
      Recommendation for key management. Part 1, General / Elaine Barker [and others]. Axe Federal Documents Online:Available   E-Book/E-Doc 2006
C 13. 10 : 800- 57/Pt. 1/Rev. 3    
      Recommendation for key management. Part 1, General (revision 3) [electronic resource] / Elaine Barker C 13.10:800-57/PT.1/REV.3 ; Axe Federal Documents Online:Available   E-Book/E-Doc 2012
      Recommendation for key management. Part 1, General (revision 3) [electronic resource] / Elaine Barker Axe Federal Documents Online:Available   E-Book/E-Doc 2012
C 13. 10 : 800- 57/Pt. 2    
      Recommendation for key management. Part 2 [electronic resource] : best practices for key management o C 13.10:800-57/PT.2 ; Axe Federal Documents Online:Available   E-Book/E-Doc 2007
      Recommendation for key management. Part 2 [electronic resource] : best practices for key management o Axe Federal Documents Online:Available   E-Book/E-Doc 2007
C 13. 10 : 800- 57/Pt. 3    
      Recommendation for key management. Part 3 [electronic resource] : application-specific key management C 13.10:800-57/PT.3 ; Axe Federal Documents Online:Available   E-Book/E-Doc 2009
      Recommendation for key management. Part 3 [electronic resource] : application-specific key management Axe Federal Documents Online:Available   E-Book/E-Doc 2009
C 13. 10 : 800- 58    
      Security considerations for voice over IP systems [electronic resource] : recommendations of the Nati C 13.10:800-58 ; Axe Federal Documents Online:Available   E-Book/E-Doc 2005
      Security considerations for voice over IP systems [electronic resource] : recommendations of the Nati Axe Federal Documents Online:Available   E-Book/E-Doc 2005
C 13. 10 : 800- 59    
      Guideline for identifying an information system as a national security system [electronic resource] / C 13.10:800-59 ; Axe Federal Documents Online:Available   E-Book/E-Doc 2003
      Guideline for identifying an information system as a national security system [electronic resource] / Axe Federal Documents Online:Available   E-Book/E-Doc 2003
C 13. 10 : 800- 60    
      Guide for mapping types of information and information systems to security categories [electronic res C 13.10:800-60 ; Axe Federal Documents Online:Available   E-Book/E-Doc 2004
      Guide for mapping types of information and information systems to security categories [electronic res Axe Federal Documents Online:Available   E-Book/E-Doc 2004
C 13. 10 : 800- 60/Rev. 1    
      Guide for mapping types of information and information systems to security categories [electronic res C 13.10:800-60/REV.1 ; Axe Federal Documents Online:Available   E-Book/E-Doc 2008
      Guide for mapping types of information and information systems to security categories [electronic res Axe Federal Documents Online:Available   E-Book/E-Doc 2008
C 13. 10 : 800- 63- 1/ 2011    
      Electronic authentication guideline [electronic resource] : recommendations of the National Institute C 13.10:800-63-1/2011 ; Axe Federal Documents Online:Available   E-Book/E-Doc 2011
      Electronic authentication guideline [electronic resource] : recommendations of the National Institute Axe Federal Documents Online:Available   E-Book/E-Doc 2011
C 13. 10 : 800- 64/Rev. 2    
      Security considerations in the system development life cycle [electronic resource] / Richard Kissell C 13.10:800-64/REV.2 ; Axe Federal Documents Online:Available   E-Book/E-Doc 2008
      Security considerations in the system development life cycle [electronic resource] / Richard Kissell Axe Federal Documents Online:Available   E-Book/E-Doc 2008
C 13. 10 : 800- 65    
      Integrating IT security into the capital planning and investment control process [electronic resource C 13.10:800-65 ; Axe Federal Documents Online:Available   E-Book/E-Doc 2005
      Integrating IT security into the capital planning and investment control process [electronic resource Axe Federal Documents Online:Available   E-Book/E-Doc 2005
Add Marked to Bag Add All On Page
Result Page   Prev Next
 
    
Available items only