Welcome to the Kids' Library!
Search for books, movies, music, magazines, and more.
Your session will expire automatically in
0
seconds.
Continue session
End session now
Brief Display
Limit/Sort Search
Search Type1
Keyword
Author
Title
Subject
Call Number
SuDoc Number
Search
Search Scope
PSU Library Consortium
Pittsburg State University
Academic Libraries
Public Libraries
Pittsburg Area
Unified School District
Leonard H. Axe Library
Career Resource Center Library
Eureka Public Library
Fort Scott Community College Library
George Nettels Elementary School Library
Kansas Technology Center Library
Lakeside Elementary School Library
Meadowlark Elementary School Library
Parsons Public Library
Pittsburg Community Middle School Library
Pittsburg High School Library
Pittsburg Public Library
Sedan Public Library
Westside Elementary School Library
Childrens Collection
Available items only
Nearby SuDoc Numbers are:
Result Page
Prev
Next
Add Marked to Bag
Add All On Page
Mark
Media
Year
C 13. 10 : 800- 34
Contingency planning guide for information technology systems [electronic resource] : recommendations
C 13.10:800-34 ;
Axe Federal Documents Online:Available
ElectronicResource GovDoc
2002
Contingency planning guide for information technology systems [electronic resource] : recommendations
Axe Federal Documents Online:Available
ElectronicResource GovDoc
2002
C 13. 10 : 800- 35
Guide to information technology security services [electronic resource] / Tim Grance ... [et al.].
C 13.10:800-35 ;
Axe Federal Documents Online:Available
ElectronicResource GovDoc
2003
Guide to information technology security services [electronic resource] / Tim Grance ... [et al.].
Axe Federal Documents Online:Available
ElectronicResource GovDoc
2003
C 13. 10 : 800- 36
Guide to selecting information technology security products [electronic resource] : recommendations o
C 13.10:800-36 ;
Axe Federal Documents Online:Available
ElectronicResource GovDoc
2003
Guide to selecting information technology security products [electronic resource] : recommendations o
Axe Federal Documents Online:Available
ElectronicResource GovDoc
2003
C 13. 10 : 800- 37
Guide for the security certification and accreditation of federal information systems [electronic res
C 13.10:800-37 ;
Axe Federal Documents Online:Available
ElectronicResource GovDoc
2004
Guide for the security certification and accreditation of federal information systems [electronic res
Axe Federal Documents Online:Available
ElectronicResource GovDoc
2004
C 13. 10 : 800- 37/Rev. 1
Guide for applying the risk management framework to federal information systems [electronic resource]
C 13.10:800-37/REV.1 ;
Axe Federal Documents Online:Available
ElectronicResource GovDoc
2010
Guide for applying the risk management framework to federal information systems [electronic resource]
Axe Federal Documents Online:Available
ElectronicResource GovDoc
2010
C 13. 10 : 800- 38a
Recommendation for block cipher modes of operation [electronic resource] : methods and techniques / M
C 13.10:800-38 A ;
Axe Federal Documents Online:Available
ElectronicResource GovDoc
2001
Recommendation for block cipher modes of operation [electronic resource] : methods and techniques / M
Axe Federal Documents Online:Available
ElectronicResource GovDoc
2001
C 13. 10 : 800- 38b
Recommendation for block cipher modes of operation [electronic resource] : the CMAC mode for authenti
C 13.10:800-38 B ;
Axe Federal Documents Online:Available
ElectronicResource GovDoc
2005
Recommendation for block cipher modes of operation [electronic resource] : the CMAC mode for authenti
Axe Federal Documents Online:Available
ElectronicResource GovDoc
2005
C 13. 10 : 800- 38c
Recommendation for block cipher modes of operation [electronic resource] : the CCM mode for authentic
C 13.10:800-38 C ;
Axe Federal Documents Online:Available
ElectronicResource GovDoc
2004
Recommendation for block cipher modes of operation [electronic resource] : the CCM mode for authentic
Axe Federal Documents Online:Available
ElectronicResource GovDoc
2004
C 13. 10 : 800- 38d
Recommendation for block cipher modes of operation [electronic resource] : Galois/Counter mode (GCM)
C 13.10:800-38 D ;
Axe Federal Documents Online:Available
ElectronicResource GovDoc
2007
Recommendation for block cipher modes of operation [electronic resource] : Galois/Counter mode (GCM)
Axe Federal Documents Online:Available
ElectronicResource GovDoc
2007
C 13. 10 : 800- 38f/Draft
Recommendation for block cipher modes of operation [electronic resource] : methods for key wrapping /
C 13.10:800-38 F/DRAFT ;
Axe Federal Documents Online:Available
ElectronicResource GovDoc
2011
Recommendation for block cipher modes of operation [electronic resource] : methods for key wrapping /
Axe Federal Documents Online:Available
ElectronicResource GovDoc
2011
C 13. 10 : 800- 39
Managing information security risk [electronic resource] : organization, mission, and information sys
C 13.10:800-39 ;
Axe Federal Documents Online:Available
ElectronicResource GovDoc
2011
Managing information security risk [electronic resource] : organization, mission, and information sys
Axe Federal Documents Online:Available
ElectronicResource GovDoc
2011
C 13. 10 : 800- 40/Rev. 3/Draft
Guide to enterprise patch management technologies (draft) [electronic resource] : recommendations of
C 13.10:800-40/REV.3/DRAFT ;
Axe Federal Documents Online:Available
ElectronicResource GovDoc
2012
Guide to enterprise patch management technologies (draft) [electronic resource] : recommendations of
Axe Federal Documents Online:Available
ElectronicResource GovDoc
2012
C 13. 10 : 800- 41/Rev. 1
Guidelines on firewalls and firewall policy [electronic resource] : recommendations of the National I
C 13.10:800-41/REV.1 ;
Axe Federal Documents Online:Available
ElectronicResource GovDoc
2009
Guidelines on firewalls and firewall policy [electronic resource] : recommendations of the National I
Axe Federal Documents Online:Available
ElectronicResource GovDoc
2009
C 13. 10 : 800- 42
Guideline on network security testing [electronic resource] : recommendations of the National Institu
C 13.10:800-42 ;
Axe Federal Documents Online:Available
ElectronicResource GovDoc
2003
Guideline on network security testing [electronic resource] : recommendations of the National Institu
Axe Federal Documents Online:Available
ElectronicResource GovDoc
2003
C 13. 10 : 800- 44/ 2007
Guidelines on securing public web servers [electronic resource] : recommendations of the National Ins
C 13.10:800-44/2007 ;
Axe Federal Documents Online:Available
ElectronicResource GovDoc
2007
Guidelines on securing public web servers [electronic resource] : recommendations of the National Ins
Axe Federal Documents Online:Available
ElectronicResource GovDoc
2007
C 13. 10 : 800- 45/ 2007
Guidelines on electronic mail security [electronic resource] : recommendations of the National Instit
C 13.10:800-45/2007 ;
Axe Federal Documents Online:Available
ElectronicResource GovDoc
2007
Guidelines on electronic mail security [electronic resource] : recommendations of the National Instit
Axe Federal Documents Online:Available
ElectronicResource GovDoc
2007
C 13. 10 : 800- 46
Security for telecommuting and broadband communications [electronic resource] : recommendations of th
C 13.10:800-46 ;
Axe Federal Documents Online:Available
ElectronicResource GovDoc
2002
Security for telecommuting and broadband communications [electronic resource] : recommendations of th
Axe Federal Documents Online:Available
ElectronicResource GovDoc
2002
C 13. 10 : 800- 46/Rev. 1
Guide to enterprise telework and remote access security [electronic resource] : recommendations of th
C 13.10:800-46/REV.1 ;
Axe Federal Documents Online:Available
ElectronicResource GovDoc
2009
Guide to enterprise telework and remote access security [electronic resource] : recommendations of th
Axe Federal Documents Online:Available
ElectronicResource GovDoc
2009
C 13. 10 : 800- 47
Security guide for interconnecting information technology systems [electronic resource] : recommendat
C 13.10:800-47 ;
Axe Federal Documents Online:Available
ElectronicResource GovDoc
2002
Security guide for interconnecting information technology systems [electronic resource] : recommendat
Axe Federal Documents Online:Available
ElectronicResource GovDoc
2002
C 13. 10 : 800- 48/Rev. 1
Guide to securing legacy IEEE 802.11 wireless networks [electronic resource] : recommendations of the
C 13.10:800-48/REV.1 ;
Axe Federal Documents Online:Available
ElectronicResource GovDoc
2008
Guide to securing legacy IEEE 802.11 wireless networks [electronic resource] : recommendations of the
Axe Federal Documents Online:Available
ElectronicResource GovDoc
2008
C 13. 10 : 800- 49
Federal S/MIME V3 client profile [electronic resource] : recommendations of the National Institute of
C 13.10:800-49 ;
Axe Federal Documents Online:Available
ElectronicResource GovDoc
2002
Federal S/MIME V3 client profile [electronic resource] : recommendations of the National Institute of
Axe Federal Documents Online:Available
ElectronicResource GovDoc
2002
C 13. 10 : 800- 50
Building an information technology security awareness and training program [electronic resource] / Ma
C 13.10:800-50 ;
Axe Federal Documents Online:Available
ElectronicResource GovDoc
2003
Building an information technology security awareness and training program [electronic resource] / Ma
Axe Federal Documents Online:Available
ElectronicResource GovDoc
2003
C 13. 10 : 800- 51/Rev. 1
Guide to using vulnerability naming schemes [electronic resource] : recommendations of the National I
C 13.10:800-51/REV.1 ;
Axe Federal Documents Online:Available
ElectronicResource GovDoc
2011
Guide to using vulnerability naming schemes [electronic resource] : recommendations of the National I
Axe Federal Documents Online:Available
ElectronicResource GovDoc
2011
C 13. 10 : 800- 52
Guidelines for the selection and use of Transport Layer Security (TLS) implementations : recommendati
C 13.10:800-52 ;
Axe Federal Documents Online:Available
2005
Guidelines for the selection and use of Transport Layer Security (TLS) implementations : recommendati
Axe Federal Documents Online:Available
2005
C 13. 10 : 800- 53/Rev. 3/Excerpt
Recommended security controls for federal information systems and organizations [electronic resource]
C 13.10:800-53/REV.3/EXCERPT ;
Axe Federal Documents Online:Available
ElectronicResource GovDoc
2009
Recommended security controls for federal information systems and organizations [electronic resource]
Axe Federal Documents Online:Available
ElectronicResource GovDoc
2009
C 13. 10 : 800- 53/Rev. 4/Draft
Security and privacy controls for federal information systems and organizations [electronic resource]
C 13.10:800-53/REV.4/DRAFT ;
Axe Federal Documents Online:Available
ElectronicResource GovDoc
2012
Security and privacy controls for federal information systems and organizations [electronic resource]
Axe Federal Documents Online:Available
ElectronicResource GovDoc
2012
C 13. 10 : 800- 53a/ 2008
Guide for assessing the security controls in federal information systems [electronic resource] : buil
C 13.10:800-53 A/2008 ;
Axe Federal Documents Online:Available
ElectronicResource GovDoc
2008
Guide for assessing the security controls in federal information systems [electronic resource] : buil
Axe Federal Documents Online:Available
ElectronicResource GovDoc
2008
C 13. 10 : 800- 54/ 2007
Border Gateway Protocol security [electronic resource] : recommendations of the National Institute of
C 13.10:800-54/2007 ;
Axe Federal Documents Online:Available
ElectronicResource GovDoc
2007
Border Gateway Protocol security [electronic resource] : recommendations of the National Institute of
Axe Federal Documents Online:Available
ElectronicResource GovDoc
2007
C 13. 10 : 800- 55/ 2/Rev. 1
Performance measurement guide for information security [electronic resource] / Elizabeth Chew ... [et
C 13.10:800-55/2/REV.1 ;
Axe Federal Documents Online:Available
ElectronicResource GovDoc
2008
Performance measurement guide for information security [electronic resource] / Elizabeth Chew ... [et
Axe Federal Documents Online:Available
ElectronicResource GovDoc
2008
C 13. 10 : 800- 56a/Rev.
Recommendation for pair-wise key establishment schemes using discrete logarithm cryptography : (revis
C 13.10:800-56 A/REV. ;
Axe Federal Documents Online:Available
2007
Recommendation for pair-wise key establishment schemes using discrete logarithm cryptography : (revis
Axe Federal Documents Online:Available
2007
C 13. 10 : 800- 56b
Recommendation for pair-wise key establishment schemes using integer factorization cryptography [elec
C 13.10:800-56 B ;
Axe Federal Documents Online:Available
ElectronicResource GovDoc
2009
Recommendation for pair-wise key establishment schemes using integer factorization cryptography [elec
Axe Federal Documents Online:Available
ElectronicResource GovDoc
2009
C 13. 10 : 800- 56c
Recommendation for key derivation through extraction-then-expansion [electronic resource] / Lily Chen
C 13.10:800-56 C ;
Axe Federal Documents Online:Available
ElectronicResource GovDoc
2011
Recommendation for key derivation through extraction-then-expansion [electronic resource] / Lily Chen
Axe Federal Documents Online:Available
ElectronicResource GovDoc
2011
C 13. 10 : 800- 57/Pt. 1/Rev.
Recommendation for key management. Part 1, General / Elaine Barker [and others].
C 13.10:800-57/PT.1/REV. ;
Axe Federal Documents Online:Available
2006
Recommendation for key management. Part 1, General / Elaine Barker [and others].
Axe Federal Documents Online:Available
2006
C 13. 10 : 800- 57/Pt. 1/Rev. 3
Recommendation for key management. Part 1, General (revision 3) [electronic resource] / Elaine Barker
C 13.10:800-57/PT.1/REV.3 ;
Axe Federal Documents Online:Available
ElectronicResource GovDoc
2012
Recommendation for key management. Part 1, General (revision 3) [electronic resource] / Elaine Barker
Axe Federal Documents Online:Available
ElectronicResource GovDoc
2012
C 13. 10 : 800- 57/Pt. 2
Recommendation for key management. Part 2 [electronic resource] : best practices for key management o
C 13.10:800-57/PT.2 ;
Axe Federal Documents Online:Available
ElectronicResource GovDoc
2007
Recommendation for key management. Part 2 [electronic resource] : best practices for key management o
Axe Federal Documents Online:Available
ElectronicResource GovDoc
2007
C 13. 10 : 800- 57/Pt. 3
Recommendation for key management. Part 3 [electronic resource] : application-specific key management
C 13.10:800-57/PT.3 ;
Axe Federal Documents Online:Available
ElectronicResource GovDoc
2009
Recommendation for key management. Part 3 [electronic resource] : application-specific key management
Axe Federal Documents Online:Available
ElectronicResource GovDoc
2009
C 13. 10 : 800- 58
Security considerations for voice over IP systems [electronic resource] : recommendations of the Nati
C 13.10:800-58 ;
Axe Federal Documents Online:Available
ElectronicResource GovDoc
2005
Security considerations for voice over IP systems [electronic resource] : recommendations of the Nati
Axe Federal Documents Online:Available
ElectronicResource GovDoc
2005
C 13. 10 : 800- 59
Guideline for identifying an information system as a national security system [electronic resource] /
C 13.10:800-59 ;
Axe Federal Documents Online:Available
ElectronicResource GovDoc
2003
Guideline for identifying an information system as a national security system [electronic resource] /
Axe Federal Documents Online:Available
ElectronicResource GovDoc
2003
C 13. 10 : 800- 60
Guide for mapping types of information and information systems to security categories [electronic res
C 13.10:800-60 ;
Axe Federal Documents Online:Available
ElectronicResource GovDoc
2004
Guide for mapping types of information and information systems to security categories [electronic res
Axe Federal Documents Online:Available
ElectronicResource GovDoc
2004
C 13. 10 : 800- 60/Rev. 1
Guide for mapping types of information and information systems to security categories [electronic res
C 13.10:800-60/REV.1 ;
Axe Federal Documents Online:Available
ElectronicResource GovDoc
2008
Guide for mapping types of information and information systems to security categories [electronic res
Axe Federal Documents Online:Available
ElectronicResource GovDoc
2008
C 13. 10 : 800- 63- 1/ 2011
Electronic authentication guideline [electronic resource] : recommendations of the National Institute
C 13.10:800-63-1/2011 ;
Axe Federal Documents Online:Available
ElectronicResource GovDoc
2011
Electronic authentication guideline [electronic resource] : recommendations of the National Institute
Axe Federal Documents Online:Available
ElectronicResource GovDoc
2011
C 13. 10 : 800- 64/Rev. 2
Security considerations in the system development life cycle [electronic resource] / Richard Kissell
C 13.10:800-64/REV.2 ;
Axe Federal Documents Online:Available
ElectronicResource GovDoc
2008
Security considerations in the system development life cycle [electronic resource] / Richard Kissell
Axe Federal Documents Online:Available
ElectronicResource GovDoc
2008
C 13. 10 : 800- 65
Integrating IT security into the capital planning and investment control process [electronic resource
C 13.10:800-65 ;
Axe Federal Documents Online:Available
ElectronicResource GovDoc
2005
Integrating IT security into the capital planning and investment control process [electronic resource
Axe Federal Documents Online:Available
ElectronicResource GovDoc
2005
C 13. 10 : 800- 65/Rev. 1/Draft
Recommendations for integrating information security into the capital planning and investment control
C 13.10:800-65/REV.1/DRAFT ;
Axe Federal Documents Online:Available
ElectronicResource GovDoc
2009
Recommendations for integrating information security into the capital planning and investment control
Axe Federal Documents Online:Available
ElectronicResource GovDoc
2009
C 13. 10 : 800- 66/Rev. 1
An introductory resource guide for implementing the Health Insurance Portability and Accountability A
C 13.10:800-66/REV.1 ;
Axe Federal Documents Online:Available
ElectronicResource GovDoc
2008
An introductory resource guide for implementing the Health Insurance Portability and Accountability A
Axe Federal Documents Online:Available
ElectronicResource GovDoc
2008
C 13. 10 : 800- 67/ 2011
Recommendation for the Triple Data Encryption Algorithm (TDEA) block cipher [electronic resource] / W
C 13.10:800-67/2011 ;
Axe Federal Documents Online:Available
ElectronicResource GovDoc
2011
Recommendation for the Triple Data Encryption Algorithm (TDEA) block cipher [electronic resource] / W
Axe Federal Documents Online:Available
ElectronicResource GovDoc
2011
C 13. 10 : 800- 68/Rev. 1/Draft
Guide to securing Microsoft Windows XP systems for IT professionals [electronic resource] : a NIST se
C 13.10:800-68/REV.1/DRAFT ;
Axe Federal Documents Online:Available
ElectronicResource GovDoc
2008
Guide to securing Microsoft Windows XP systems for IT professionals [electronic resource] : a NIST se
Axe Federal Documents Online:Available
ElectronicResource GovDoc
2008
C 13. 10 : 800- 69
Guidance for securing Microsoft Windows XP Home Edition [electronic resource] : a NIST security confi
C 13.10:800-69 ;
Axe Federal Documents Online:Available
ElectronicResource GovDoc
2006
Guidance for securing Microsoft Windows XP Home Edition [electronic resource] : a NIST security confi
Axe Federal Documents Online:Available
ElectronicResource GovDoc
2006
C 13. 10 : 800- 70/Rev. 2
National Checklist Program for IT products [electronic resource] : guidelines for checklist users and
C 13.10:800-70/REV.2 ;
Axe Federal Documents Online:Available
ElectronicResource GovDoc
2011
National Checklist Program for IT products [electronic resource] : guidelines for checklist users and
Axe Federal Documents Online:Available
ElectronicResource GovDoc
2011
C 13. 10 : 800- 72
Guidelines on PDA forensics [electronic resource] : recommendations of the National Institute of Stan
C 13.10:800-72 ;
Axe Federal Documents Online:Available
ElectronicResource GovDoc
2004
Guidelines on PDA forensics [electronic resource] : recommendations of the National Institute of Stan
Axe Federal Documents Online:Available
ElectronicResource GovDoc
2004
Add Marked to Bag
Add All On Page
Result Page
Prev
Next
Brief Display
Limit/Sort Search
Available items only