|
|
C 13. 10 : 800- 27/Rev.A
|
|
|
Engineering principles for information technology security (a baseline for achieving security), revis
C 13.10:800-27/REV.A
;
Axe Federal Documents Online:Available
|
|
2004
|
Engineering principles for information technology security (a baseline for achieving security), revis
Axe Federal Documents Online:Available
|
|
2004
|
|
C 13. 10 : 800- 28/ 2008
|
|
|
Guidelines on active content and mobile code [electronic resource] : recommendations of the National
C 13.10:800-28/2008
;
Axe Federal Documents Online:Available
|
|
2008
|
Guidelines on active content and mobile code [electronic resource] : recommendations of the National
Axe Federal Documents Online:Available
|
|
2008
|
|
C 13. 10 : 800- 29
|
|
|
A comparison of the security requirements for cryptographic modules in FIPS 140-1 and FIPS 140-2 [ele
C 13.10:800-29
;
Axe Federal Documents Online:Available
|
|
2001
|
A comparison of the security requirements for cryptographic modules in FIPS 140-1 and FIPS 140-2 [ele
Axe Federal Documents Online:Available
|
|
2001
|
|
C 13. 10 : 800- 30/Rev. 1
|
|
|
Guide for conducting risk assessments [electronic resource] / Joint Task Force Transformation Initiat
C 13.10:800-30/REV.1
;
Axe Federal Documents Online:Available
|
|
2012
|
Guide for conducting risk assessments [electronic resource] / Joint Task Force Transformation Initiat
Axe Federal Documents Online:Available
|
|
2012
|
|
C 13. 10 : 800- 31
|
|
|
Intrusion detection systems [electronic resource] / Rebecca Bace and Peter Mell.
C 13.10:800-31
;
Axe Federal Documents Online:Available
|
|
2001
|
Intrusion detection systems [electronic resource] / Rebecca Bace and Peter Mell.
Axe Federal Documents Online:Available
|
|
2001
|
|
C 13. 10 : 800- 32
|
|
|
Introduction to public key technology and the federal PKI infrastructure [electronic resource] / D. R
C 13.10:800-32
;
Axe Federal Documents Online:Available
|
|
2001
|
Introduction to public key technology and the federal PKI infrastructure [electronic resource] / D. R
Axe Federal Documents Online:Available
|
|
2001
|
|
C 13. 10 : 800- 33
|
|
|
Underlying technical models for information technology security [electronic resource] : recommendatio
C 13.10:800-33
;
Axe Federal Documents Online:Available
|
|
2001
|
Underlying technical models for information technology security [electronic resource] : recommendatio
Axe Federal Documents Online:Available
|
|
2001
|
|
C 13. 10 : 800- 34
|
|
|
Contingency planning guide for information technology systems [electronic resource] : recommendations
C 13.10:800-34
;
Axe Federal Documents Online:Available
|
|
2002
|
Contingency planning guide for information technology systems [electronic resource] : recommendations
Axe Federal Documents Online:Available
|
|
2002
|
|
C 13. 10 : 800- 35
|
|
|
Guide to information technology security services [electronic resource] / Tim Grance ... [et al.].
C 13.10:800-35
;
Axe Federal Documents Online:Available
|
|
2003
|
Guide to information technology security services [electronic resource] / Tim Grance ... [et al.].
Axe Federal Documents Online:Available
|
|
2003
|
|
C 13. 10 : 800- 36
|
|
|
Guide to selecting information technology security products [electronic resource] : recommendations o
C 13.10:800-36
;
Axe Federal Documents Online:Available
|
|
2003
|
Guide to selecting information technology security products [electronic resource] : recommendations o
Axe Federal Documents Online:Available
|
|
2003
|
|
C 13. 10 : 800- 37
|
|
|
Guide for the security certification and accreditation of federal information systems [electronic res
C 13.10:800-37
;
Axe Federal Documents Online:Available
|
|
2004
|
Guide for the security certification and accreditation of federal information systems [electronic res
Axe Federal Documents Online:Available
|
|
2004
|
|
C 13. 10 : 800- 37/Rev. 1
|
|
|
Guide for applying the risk management framework to federal information systems [electronic resource]
C 13.10:800-37/REV.1
;
Axe Federal Documents Online:Available
|
|
2010
|
Guide for applying the risk management framework to federal information systems [electronic resource]
Axe Federal Documents Online:Available
|
|
2010
|
|
C 13. 10 : 800- 38a
|
|
|
Recommendation for block cipher modes of operation [electronic resource] : methods and techniques / M
C 13.10:800-38 A
;
Axe Federal Documents Online:Available
|
|
2001
|
Recommendation for block cipher modes of operation [electronic resource] : methods and techniques / M
Axe Federal Documents Online:Available
|
|
2001
|
|
C 13. 10 : 800- 38b
|
|
|
Recommendation for block cipher modes of operation [electronic resource] : the CMAC mode for authenti
C 13.10:800-38 B
;
Axe Federal Documents Online:Available
|
|
2005
|
Recommendation for block cipher modes of operation [electronic resource] : the CMAC mode for authenti
Axe Federal Documents Online:Available
|
|
2005
|
|
C 13. 10 : 800- 38c
|
|
|
Recommendation for block cipher modes of operation [electronic resource] : the CCM mode for authentic
C 13.10:800-38 C
;
Axe Federal Documents Online:Available
|
|
2004
|
Recommendation for block cipher modes of operation [electronic resource] : the CCM mode for authentic
Axe Federal Documents Online:Available
|
|
2004
|
|
C 13. 10 : 800- 38d
|
|
|
Recommendation for block cipher modes of operation [electronic resource] : Galois/Counter mode (GCM)
C 13.10:800-38 D
;
Axe Federal Documents Online:Available
|
|
2007
|
Recommendation for block cipher modes of operation [electronic resource] : Galois/Counter mode (GCM)
Axe Federal Documents Online:Available
|
|
2007
|
|
C 13. 10 : 800- 38f/Draft
|
|
|
Recommendation for block cipher modes of operation [electronic resource] : methods for key wrapping /
C 13.10:800-38 F/DRAFT
;
Axe Federal Documents Online:Available
|
|
2011
|
Recommendation for block cipher modes of operation [electronic resource] : methods for key wrapping /
Axe Federal Documents Online:Available
|
|
2011
|
|
C 13. 10 : 800- 39
|
|
|
Managing information security risk [electronic resource] : organization, mission, and information sys
C 13.10:800-39
;
Axe Federal Documents Online:Available
|
|
2011
|
Managing information security risk [electronic resource] : organization, mission, and information sys
Axe Federal Documents Online:Available
|
|
2011
|
|
C 13. 10 : 800- 40/Rev. 3/Draft
|
|
|
Guide to enterprise patch management technologies (draft) [electronic resource] : recommendations of
C 13.10:800-40/REV.3/DRAFT
;
Axe Federal Documents Online:Available
|
|
2012
|
Guide to enterprise patch management technologies (draft) [electronic resource] : recommendations of
Axe Federal Documents Online:Available
|
|
2012
|
|
C 13. 10 : 800- 41/Rev. 1
|
|
|
Guidelines on firewalls and firewall policy [electronic resource] : recommendations of the National I
C 13.10:800-41/REV.1
;
Axe Federal Documents Online:Available
|
|
2009
|
Guidelines on firewalls and firewall policy [electronic resource] : recommendations of the National I
Axe Federal Documents Online:Available
|
|
2009
|
|
C 13. 10 : 800- 42
|
|
|
Guideline on network security testing [electronic resource] : recommendations of the National Institu
C 13.10:800-42
;
Axe Federal Documents Online:Available
|
|
2003
|
Guideline on network security testing [electronic resource] : recommendations of the National Institu
Axe Federal Documents Online:Available
|
|
2003
|
|
C 13. 10 : 800- 44/ 2007
|
|
|
Guidelines on securing public web servers [electronic resource] : recommendations of the National Ins
C 13.10:800-44/2007
;
Axe Federal Documents Online:Available
|
|
2007
|
Guidelines on securing public web servers [electronic resource] : recommendations of the National Ins
Axe Federal Documents Online:Available
|
|
2007
|
|
C 13. 10 : 800- 45/ 2007
|
|
|
Guidelines on electronic mail security [electronic resource] : recommendations of the National Instit
C 13.10:800-45/2007
;
Axe Federal Documents Online:Available
|
|
2007
|
Guidelines on electronic mail security [electronic resource] : recommendations of the National Instit
Axe Federal Documents Online:Available
|
|
2007
|
|
C 13. 10 : 800- 46
|
|
|
Security for telecommuting and broadband communications [electronic resource] : recommendations of th
C 13.10:800-46
;
Axe Federal Documents Online:Available
|
|
2002
|
Security for telecommuting and broadband communications [electronic resource] : recommendations of th
Axe Federal Documents Online:Available
|
|
2002
|
|
C 13. 10 : 800- 46/Rev. 1
|
|
|
Guide to enterprise telework and remote access security [electronic resource] : recommendations of th
C 13.10:800-46/REV.1
;
Axe Federal Documents Online:Available
|
|
2009
|
Guide to enterprise telework and remote access security [electronic resource] : recommendations of th
Axe Federal Documents Online:Available
|
|
2009
|
|
C 13. 10 : 800- 47
|
|
|
Security guide for interconnecting information technology systems [electronic resource] : recommendat
C 13.10:800-47
;
Axe Federal Documents Online:Available
|
|
2002
|
Security guide for interconnecting information technology systems [electronic resource] : recommendat
Axe Federal Documents Online:Available
|
|
2002
|
|
C 13. 10 : 800- 48/Rev. 1
|
|
|
Guide to securing legacy IEEE 802.11 wireless networks [electronic resource] : recommendations of the
C 13.10:800-48/REV.1
;
Axe Federal Documents Online:Available
|
|
2008
|
Guide to securing legacy IEEE 802.11 wireless networks [electronic resource] : recommendations of the
Axe Federal Documents Online:Available
|
|
2008
|
|
C 13. 10 : 800- 49
|
|
|
Federal S/MIME V3 client profile [electronic resource] : recommendations of the National Institute of
C 13.10:800-49
;
Axe Federal Documents Online:Available
|
|
2002
|
Federal S/MIME V3 client profile [electronic resource] : recommendations of the National Institute of
Axe Federal Documents Online:Available
|
|
2002
|
|
C 13. 10 : 800- 50
|
|
|
Building an information technology security awareness and training program [electronic resource] / Ma
C 13.10:800-50
;
Axe Federal Documents Online:Available
|
|
2003
|
Building an information technology security awareness and training program [electronic resource] / Ma
Axe Federal Documents Online:Available
|
|
2003
|
|
C 13. 10 : 800- 51/Rev. 1
|
|
|
Guide to using vulnerability naming schemes [electronic resource] : recommendations of the National I
C 13.10:800-51/REV.1
;
Axe Federal Documents Online:Available
|
|
2011
|
Guide to using vulnerability naming schemes [electronic resource] : recommendations of the National I
Axe Federal Documents Online:Available
|
|
2011
|
|
C 13. 10 : 800- 52
|
|
|
Guidelines for the selection and use of Transport Layer Security (TLS) implementations : recommendati
C 13.10:800-52
;
Axe Federal Documents Online:Available
|
|
2005
|
Guidelines for the selection and use of Transport Layer Security (TLS) implementations : recommendati
Axe Federal Documents Online:Available
|
|
2005
|
|
C 13. 10 : 800- 53/Rev. 3/Excerpt
|
|
|
Recommended security controls for federal information systems and organizations [electronic resource]
C 13.10:800-53/REV.3/EXCERPT
;
Axe Federal Documents Online:Available
|
|
2009
|
Recommended security controls for federal information systems and organizations [electronic resource]
Axe Federal Documents Online:Available
|
|
2009
|
|
C 13. 10 : 800- 53/Rev. 4/Draft
|
|
|
Security and privacy controls for federal information systems and organizations [electronic resource]
C 13.10:800-53/REV.4/DRAFT
;
Axe Federal Documents Online:Available
|
|
2012
|
Security and privacy controls for federal information systems and organizations [electronic resource]
Axe Federal Documents Online:Available
|
|
2012
|
|
C 13. 10 : 800- 53a/ 2008
|
|
|
Guide for assessing the security controls in federal information systems [electronic resource] : buil
C 13.10:800-53 A/2008
;
Axe Federal Documents Online:Available
|
|
2008
|
Guide for assessing the security controls in federal information systems [electronic resource] : buil
Axe Federal Documents Online:Available
|
|
2008
|
|
C 13. 10 : 800- 54/ 2007
|
|
|
Border Gateway Protocol security [electronic resource] : recommendations of the National Institute of
C 13.10:800-54/2007
;
Axe Federal Documents Online:Available
|
|
2007
|
Border Gateway Protocol security [electronic resource] : recommendations of the National Institute of
Axe Federal Documents Online:Available
|
|
2007
|
|
C 13. 10 : 800- 55/ 2/Rev. 1
|
|
|
Performance measurement guide for information security [electronic resource] / Elizabeth Chew ... [et
C 13.10:800-55/2/REV.1
;
Axe Federal Documents Online:Available
|
|
2008
|
Performance measurement guide for information security [electronic resource] / Elizabeth Chew ... [et
Axe Federal Documents Online:Available
|
|
2008
|
|
C 13. 10 : 800- 56a/Rev.
|
|
|
Recommendation for pair-wise key establishment schemes using discrete logarithm cryptography : (revis
C 13.10:800-56 A/REV.
;
Axe Federal Documents Online:Available
|
|
2007
|
Recommendation for pair-wise key establishment schemes using discrete logarithm cryptography : (revis
Axe Federal Documents Online:Available
|
|
2007
|
|
C 13. 10 : 800- 56b
|
|
|
Recommendation for pair-wise key establishment schemes using integer factorization cryptography [elec
C 13.10:800-56 B
;
Axe Federal Documents Online:Available
|
|
2009
|
Recommendation for pair-wise key establishment schemes using integer factorization cryptography [elec
Axe Federal Documents Online:Available
|
|
2009
|
|
C 13. 10 : 800- 56c
|
|
|
Recommendation for key derivation through extraction-then-expansion [electronic resource] / Lily Chen
C 13.10:800-56 C
;
Axe Federal Documents Online:Available
|
|
2011
|
Recommendation for key derivation through extraction-then-expansion [electronic resource] / Lily Chen
Axe Federal Documents Online:Available
|
|
2011
|
|
C 13. 10 : 800- 57/Pt. 1/Rev.
|
|
|
Recommendation for key management. Part 1, General / Elaine Barker [and others].
C 13.10:800-57/PT.1/REV.
;
Axe Federal Documents Online:Available
|
|
2006
|
Recommendation for key management. Part 1, General / Elaine Barker [and others].
Axe Federal Documents Online:Available
|
|
2006
|
|
C 13. 10 : 800- 57/Pt. 1/Rev. 3
|
|
|
Recommendation for key management. Part 1, General (revision 3) [electronic resource] / Elaine Barker
C 13.10:800-57/PT.1/REV.3
;
Axe Federal Documents Online:Available
|
|
2012
|
Recommendation for key management. Part 1, General (revision 3) [electronic resource] / Elaine Barker
Axe Federal Documents Online:Available
|
|
2012
|
|
C 13. 10 : 800- 57/Pt. 2
|
|
|
Recommendation for key management. Part 2 [electronic resource] : best practices for key management o
C 13.10:800-57/PT.2
;
Axe Federal Documents Online:Available
|
|
2007
|
Recommendation for key management. Part 2 [electronic resource] : best practices for key management o
Axe Federal Documents Online:Available
|
|
2007
|
|
C 13. 10 : 800- 57/Pt. 3
|
|
|
Recommendation for key management. Part 3 [electronic resource] : application-specific key management
C 13.10:800-57/PT.3
;
Axe Federal Documents Online:Available
|
|
2009
|
Recommendation for key management. Part 3 [electronic resource] : application-specific key management
Axe Federal Documents Online:Available
|
|
2009
|
|
C 13. 10 : 800- 58
|
|
|
Security considerations for voice over IP systems [electronic resource] : recommendations of the Nati
C 13.10:800-58
;
Axe Federal Documents Online:Available
|
|
2005
|
Security considerations for voice over IP systems [electronic resource] : recommendations of the Nati
Axe Federal Documents Online:Available
|
|
2005
|
|
C 13. 10 : 800- 59
|
|
|
Guideline for identifying an information system as a national security system [electronic resource] /
C 13.10:800-59
;
Axe Federal Documents Online:Available
|
|
2003
|
Guideline for identifying an information system as a national security system [electronic resource] /
Axe Federal Documents Online:Available
|
|
2003
|
|
C 13. 10 : 800- 60
|
|
|
Guide for mapping types of information and information systems to security categories [electronic res
C 13.10:800-60
;
Axe Federal Documents Online:Available
|
|
2004
|
Guide for mapping types of information and information systems to security categories [electronic res
Axe Federal Documents Online:Available
|
|
2004
|
|
C 13. 10 : 800- 60/Rev. 1
|
|
|
Guide for mapping types of information and information systems to security categories [electronic res
C 13.10:800-60/REV.1
;
Axe Federal Documents Online:Available
|
|
2008
|
Guide for mapping types of information and information systems to security categories [electronic res
Axe Federal Documents Online:Available
|
|
2008
|
|
C 13. 10 : 800- 63- 1/ 2011
|
|
|
Electronic authentication guideline [electronic resource] : recommendations of the National Institute
C 13.10:800-63-1/2011
;
Axe Federal Documents Online:Available
|
|
2011
|
Electronic authentication guideline [electronic resource] : recommendations of the National Institute
Axe Federal Documents Online:Available
|
|
2011
|
|
C 13. 10 : 800- 64/Rev. 2
|
|
|
Security considerations in the system development life cycle [electronic resource] / Richard Kissell
C 13.10:800-64/REV.2
;
Axe Federal Documents Online:Available
|
|
2008
|
Security considerations in the system development life cycle [electronic resource] / Richard Kissell
Axe Federal Documents Online:Available
|
|
2008
|
|
C 13. 10 : 800- 65
|
|
|
Integrating IT security into the capital planning and investment control process [electronic resource
C 13.10:800-65
;
Axe Federal Documents Online:Available
|
|
2005
|
Integrating IT security into the capital planning and investment control process [electronic resource
Axe Federal Documents Online:Available
|
|
2005
|
Add Marked to Bag
Add All On Page
|