Kids Library Home

Welcome to the Kids' Library!

Search for books, movies, music, magazines, and more.

     
Available items only
Nearby SuDoc Numbers are:
Result Page   Prev Next
Add Marked to Bag Add All On Page
Mark   Media Year
C 13. 10 : 800- 50    
      Building an information technology security awareness and training program [electronic resource] / Ma C 13.10:800-50 ; Axe Federal Documents Online:Available   E-Book/E-Doc 2003
      Building an information technology security awareness and training program [electronic resource] / Ma Axe Federal Documents Online:Available   E-Book/E-Doc 2003
C 13. 10 : 800- 51/Rev. 1    
      Guide to using vulnerability naming schemes [electronic resource] : recommendations of the National I C 13.10:800-51/REV.1 ; Axe Federal Documents Online:Available   E-Book/E-Doc 2011
      Guide to using vulnerability naming schemes [electronic resource] : recommendations of the National I Axe Federal Documents Online:Available   E-Book/E-Doc 2011
C 13. 10 : 800- 52    
      Guidelines for the selection and use of Transport Layer Security (TLS) implementations : recommendati C 13.10:800-52 ; Axe Federal Documents Online:Available   Print Material 2005
      Guidelines for the selection and use of Transport Layer Security (TLS) implementations : recommendati Axe Federal Documents Online:Available   Print Material 2005
C 13. 10 : 800- 53/Rev. 3/Excerpt    
      Recommended security controls for federal information systems and organizations [electronic resource] C 13.10:800-53/REV.3/EXCERPT ; Axe Federal Documents Online:Available   E-Book/E-Doc 2009
      Recommended security controls for federal information systems and organizations [electronic resource] Axe Federal Documents Online:Available   E-Book/E-Doc 2009
C 13. 10 : 800- 53/Rev. 4/Draft    
      Security and privacy controls for federal information systems and organizations [electronic resource] C 13.10:800-53/REV.4/DRAFT ; Axe Federal Documents Online:Available   E-Book/E-Doc 2012
      Security and privacy controls for federal information systems and organizations [electronic resource] Axe Federal Documents Online:Available   E-Book/E-Doc 2012
C 13. 10 : 800- 53a/ 2008    
      Guide for assessing the security controls in federal information systems [electronic resource] : buil C 13.10:800-53 A/2008 ; Axe Federal Documents Online:Available   E-Book/E-Doc 2008
      Guide for assessing the security controls in federal information systems [electronic resource] : buil Axe Federal Documents Online:Available   E-Book/E-Doc 2008
C 13. 10 : 800- 54/ 2007    
      Border Gateway Protocol security [electronic resource] : recommendations of the National Institute of C 13.10:800-54/2007 ; Axe Federal Documents Online:Available   E-Book/E-Doc 2007
      Border Gateway Protocol security [electronic resource] : recommendations of the National Institute of Axe Federal Documents Online:Available   E-Book/E-Doc 2007
C 13. 10 : 800- 55/ 2/Rev. 1    
      Performance measurement guide for information security [electronic resource] / Elizabeth Chew ... [et C 13.10:800-55/2/REV.1 ; Axe Federal Documents Online:Available   E-Book/E-Doc 2008
      Performance measurement guide for information security [electronic resource] / Elizabeth Chew ... [et Axe Federal Documents Online:Available   E-Book/E-Doc 2008
C 13. 10 : 800- 56a/Rev.    
      Recommendation for pair-wise key establishment schemes using discrete logarithm cryptography : (revis C 13.10:800-56 A/REV. ; Axe Federal Documents Online:Available   E-Book/E-Doc 2007
      Recommendation for pair-wise key establishment schemes using discrete logarithm cryptography : (revis Axe Federal Documents Online:Available   E-Book/E-Doc 2007
C 13. 10 : 800- 56b    
      Recommendation for pair-wise key establishment schemes using integer factorization cryptography [elec C 13.10:800-56 B ; Axe Federal Documents Online:Available   E-Book/E-Doc 2009
      Recommendation for pair-wise key establishment schemes using integer factorization cryptography [elec Axe Federal Documents Online:Available   E-Book/E-Doc 2009
C 13. 10 : 800- 56c    
      Recommendation for key derivation through extraction-then-expansion [electronic resource] / Lily Chen C 13.10:800-56 C ; Axe Federal Documents Online:Available   E-Book/E-Doc 2011
      Recommendation for key derivation through extraction-then-expansion [electronic resource] / Lily Chen Axe Federal Documents Online:Available   E-Book/E-Doc 2011
C 13. 10 : 800- 57/Pt. 1/Rev.    
      Recommendation for key management. Part 1, General / Elaine Barker [and others]. C 13.10:800-57/PT.1/REV. ; Axe Federal Documents Online:Available   E-Book/E-Doc 2006
      Recommendation for key management. Part 1, General / Elaine Barker [and others]. Axe Federal Documents Online:Available   E-Book/E-Doc 2006
C 13. 10 : 800- 57/Pt. 1/Rev. 3    
      Recommendation for key management. Part 1, General (revision 3) [electronic resource] / Elaine Barker C 13.10:800-57/PT.1/REV.3 ; Axe Federal Documents Online:Available   E-Book/E-Doc 2012
      Recommendation for key management. Part 1, General (revision 3) [electronic resource] / Elaine Barker Axe Federal Documents Online:Available   E-Book/E-Doc 2012
C 13. 10 : 800- 57/Pt. 2    
      Recommendation for key management. Part 2 [electronic resource] : best practices for key management o C 13.10:800-57/PT.2 ; Axe Federal Documents Online:Available   E-Book/E-Doc 2007
      Recommendation for key management. Part 2 [electronic resource] : best practices for key management o Axe Federal Documents Online:Available   E-Book/E-Doc 2007
C 13. 10 : 800- 57/Pt. 3    
      Recommendation for key management. Part 3 [electronic resource] : application-specific key management C 13.10:800-57/PT.3 ; Axe Federal Documents Online:Available   E-Book/E-Doc 2009
      Recommendation for key management. Part 3 [electronic resource] : application-specific key management Axe Federal Documents Online:Available   E-Book/E-Doc 2009
C 13. 10 : 800- 58    
      Security considerations for voice over IP systems [electronic resource] : recommendations of the Nati C 13.10:800-58 ; Axe Federal Documents Online:Available   E-Book/E-Doc 2005
      Security considerations for voice over IP systems [electronic resource] : recommendations of the Nati Axe Federal Documents Online:Available   E-Book/E-Doc 2005
C 13. 10 : 800- 59    
      Guideline for identifying an information system as a national security system [electronic resource] / C 13.10:800-59 ; Axe Federal Documents Online:Available   E-Book/E-Doc 2003
      Guideline for identifying an information system as a national security system [electronic resource] / Axe Federal Documents Online:Available   E-Book/E-Doc 2003
C 13. 10 : 800- 60    
      Guide for mapping types of information and information systems to security categories [electronic res C 13.10:800-60 ; Axe Federal Documents Online:Available   E-Book/E-Doc 2004
      Guide for mapping types of information and information systems to security categories [electronic res Axe Federal Documents Online:Available   E-Book/E-Doc 2004
C 13. 10 : 800- 60/Rev. 1    
      Guide for mapping types of information and information systems to security categories [electronic res C 13.10:800-60/REV.1 ; Axe Federal Documents Online:Available   E-Book/E-Doc 2008
      Guide for mapping types of information and information systems to security categories [electronic res Axe Federal Documents Online:Available   E-Book/E-Doc 2008
C 13. 10 : 800- 63- 1/ 2011    
      Electronic authentication guideline [electronic resource] : recommendations of the National Institute C 13.10:800-63-1/2011 ; Axe Federal Documents Online:Available   E-Book/E-Doc 2011
      Electronic authentication guideline [electronic resource] : recommendations of the National Institute Axe Federal Documents Online:Available   E-Book/E-Doc 2011
C 13. 10 : 800- 64/Rev. 2    
      Security considerations in the system development life cycle [electronic resource] / Richard Kissell C 13.10:800-64/REV.2 ; Axe Federal Documents Online:Available   E-Book/E-Doc 2008
      Security considerations in the system development life cycle [electronic resource] / Richard Kissell Axe Federal Documents Online:Available   E-Book/E-Doc 2008
C 13. 10 : 800- 65    
      Integrating IT security into the capital planning and investment control process [electronic resource C 13.10:800-65 ; Axe Federal Documents Online:Available   E-Book/E-Doc 2005
      Integrating IT security into the capital planning and investment control process [electronic resource Axe Federal Documents Online:Available   E-Book/E-Doc 2005
C 13. 10 : 800- 65/Rev. 1/Draft    
      Recommendations for integrating information security into the capital planning and investment control C 13.10:800-65/REV.1/DRAFT ; Axe Federal Documents Online:Available   E-Book/E-Doc 2009
      Recommendations for integrating information security into the capital planning and investment control Axe Federal Documents Online:Available   E-Book/E-Doc 2009
C 13. 10 : 800- 66/Rev. 1    
      An introductory resource guide for implementing the Health Insurance Portability and Accountability A C 13.10:800-66/REV.1 ; Axe Federal Documents Online:Available   E-Book/E-Doc 2008
      An introductory resource guide for implementing the Health Insurance Portability and Accountability A Axe Federal Documents Online:Available   E-Book/E-Doc 2008
C 13. 10 : 800- 67/ 2011    
      Recommendation for the Triple Data Encryption Algorithm (TDEA) block cipher [electronic resource] / W C 13.10:800-67/2011 ; Axe Federal Documents Online:Available   E-Book/E-Doc 2011
      Recommendation for the Triple Data Encryption Algorithm (TDEA) block cipher [electronic resource] / W Axe Federal Documents Online:Available   E-Book/E-Doc 2011
C 13. 10 : 800- 68/Rev. 1/Draft    
      Guide to securing Microsoft Windows XP systems for IT professionals [electronic resource] : a NIST se C 13.10:800-68/REV.1/DRAFT ; Axe Federal Documents Online:Available   E-Book/E-Doc 2008
      Guide to securing Microsoft Windows XP systems for IT professionals [electronic resource] : a NIST se Axe Federal Documents Online:Available   E-Book/E-Doc 2008
C 13. 10 : 800- 69    
      Guidance for securing Microsoft Windows XP Home Edition [electronic resource] : a NIST security confi C 13.10:800-69 ; Axe Federal Documents Online:Available   E-Book/E-Doc 2006
      Guidance for securing Microsoft Windows XP Home Edition [electronic resource] : a NIST security confi Axe Federal Documents Online:Available   E-Book/E-Doc 2006
C 13. 10 : 800- 70/Rev. 2    
      National Checklist Program for IT products [electronic resource] : guidelines for checklist users and C 13.10:800-70/REV.2 ; Axe Federal Documents Online:Available   E-Book/E-Doc 2011
      National Checklist Program for IT products [electronic resource] : guidelines for checklist users and Axe Federal Documents Online:Available   E-Book/E-Doc 2011
C 13. 10 : 800- 72    
      Guidelines on PDA forensics [electronic resource] : recommendations of the National Institute of Stan C 13.10:800-72 ; Axe Federal Documents Online:Available   E-Book/E-Doc 2004
      Guidelines on PDA forensics [electronic resource] : recommendations of the National Institute of Stan Axe Federal Documents Online:Available   E-Book/E-Doc 2004
C 13. 10 : 800- 73- 1    
      Interfaces for Personal Identity Verification [electronic resource] / James F. Dray, Scott B. Guthery C 13.10:800-73-1 ; Axe Federal Documents Online:Available   E-Book/E-Doc 2006
      Interfaces for Personal Identity Verification [electronic resource] / James F. Dray, Scott B. Guthery Axe Federal Documents Online:Available   E-Book/E-Doc 2006
C 13. 10 : 800- 73- 2    
      Interfaces for Personal Identity Verification [electronic resource] / Ramaswamy Chandramouli [and oth C 13.10:800-73-2 ; Axe Federal Documents Online:Available   E-Book/E-Doc 2008
      Interfaces for Personal Identity Verification [electronic resource] / Ramaswamy Chandramouli [and oth Axe Federal Documents Online:Available   E-Book/E-Doc 2008
C 13. 10 : 800- 73- 3    
      Interfaces for Personal Identity Verification [electronic resource] / Ramaswamy Chandramouli ... [et C 13.10:800-73-3 ; Axe Federal Documents Online:Available   E-Book/E-Doc 2010
      Interfaces for Personal Identity Verification [electronic resource] / Ramaswamy Chandramouli ... [et Axe Federal Documents Online:Available   E-Book/E-Doc 2010
C 13. 10 : 800- 76    
      Information security [electronic resource] : biometric data specification for personal identity verif C 13.10:800-76 ; Axe Federal Documents Online:Available   E-Book/E-Doc 2006
      Biometric data specification for Personal Identity Verification [electronic resource] / Charles Wilso C 13.10:800-76 ; Axe Federal Documents Online:Available   E-Book/E-Doc 2006
      Biometric data specification for Personal Identity Verification [electronic resource] / Charles Wilso Axe Federal Documents Online:Available   E-Book/E-Doc 2006
      Information security [electronic resource] : biometric data specification for personal identity verif Axe Federal Documents Online:Available   E-Book/E-Doc 2006
C 13. 10 : 800- 76- 2    
      Biometric specifications for Personal Identity Verification / Patrick Grother, Wayne Salamon, Ramaswa C 13.10:800-76-2 ; Axe Federal Documents Online:Available   E-Book/E-Doc 2013
      Biometric specifications for Personal Identity Verification / Patrick Grother, Wayne Salamon, Ramaswa Axe Federal Documents Online:Available   E-Book/E-Doc 2013
C 13. 10 : 800- 76- 2/Draft    
      Biometric specifications for Personal Identity Verification [electronic resource] / Patrick Grother, C 13.10:800-76-2/DRAFT ; Axe Federal Documents Online:Available   E-Book/E-Doc 2012
      Biometric specifications for Personal Identity Verification [electronic resource] / Patrick Grother, Axe Federal Documents Online:Available   E-Book/E-Doc 2012
C 13. 10 : 800- 77    
      Guide to IPsec VPNs [electronic resource] : recommendations of the National Institute of Standards an C 13.10:800-77 ; Axe Federal Documents Online:Available   E-Book/E-Doc 2005
      Guide to IPsec VPNs [electronic resource] : recommendations of the National Institute of Standards an Axe Federal Documents Online:Available   E-Book/E-Doc 2005
C 13. 10 : 800- 78    
      Cryptographic algorithms and key sizes for personal identity verification [electronic resource] / W. C 13.10:800-78 ; Axe Federal Documents Online:Available   E-Book/E-Doc 2005
      Cryptographic algorithms and key sizes for personal identity verification [electronic resource] / W. Axe Federal Documents Online:Available   E-Book/E-Doc 2005
C 13. 10 : 800- 78- 2    
      Cryptographic algorithms and key sizes for Personal Identity Verification [electronic resource] / W. C 13.10:800-78-2 ; Axe Federal Documents Online:Available   E-Book/E-Doc 2010
      Cryptographic algorithms and key sizes for Personal Identity Verification [electronic resource] / W. Axe Federal Documents Online:Available   E-Book/E-Doc 2010
C 13. 10 : 800- 79- 1    
      Guidelines for the accreditation of personal identity verification card issuers [electronic resource] C 13.10:800-79-1 ; Axe Federal Documents Online:Available   E-Book/E-Doc 2008
      Guidelines for the accreditation of personal identity verification card issuers [electronic resource] Axe Federal Documents Online:Available   E-Book/E-Doc 2008
C 13. 10 : 800- 80/Draft    
      Guide for developing performance metrics for information security [electronic resource] : recommendat C 13.10:800-80/DRAFT ; Axe Federal Documents Online:Available   E-Book/E-Doc 2006
      Guide for developing performance metrics for information security [electronic resource] : recommendat Axe Federal Documents Online:Available   E-Book/E-Doc 2006
C 13. 10 : 800- 81r 1    
      Secure Domain Name System (DNS) deployment guide [electronic resource] : recommendations of the Natio C 13.10:800-81 R 1 ; Axe Federal Documents Online:Available   E-Book/E-Doc 2010
      Secure Domain Name System (DNS) deployment guide [electronic resource] : recommendations of the Natio Axe Federal Documents Online:Available   E-Book/E-Doc 2010
C 13. 10 : 800- 82/Draft/Final    
      Guide to Industrial Control Systems (ICS) security : Supervisory Control and Data Acquisition (SCADA) C 13.10:800-82/DRAFT/FINAL ; Axe Federal Documents Online:Available   E-Book/E-Doc 2008
      Guide to Industrial Control Systems (ICS) security : Supervisory Control and Data Acquisition (SCADA) Axe Federal Documents Online:Available   E-Book/E-Doc 2008
C 13. 10 : 800- 82/Draft/Rev.    
      Guide to Industrial Control Systems (ICS) security : Supervisory Control and Data Acquisition (SCADA) C 13.10:800-82/DRAFT/REV. ; Axe Federal Documents Online:Available   E-Book/E-Doc 2007
      Guide to Industrial Control Systems (ICS) security : Supervisory Control and Data Acquisition (SCADA) Axe Federal Documents Online:Available   E-Book/E-Doc 2007
C 13. 10 : 800- 83    
      Guide to Malware incident prevention and handling [electronic resource] / Peter Mell, Karen Kent, Jos C 13.10:800-83 ; Axe Federal Documents Online:Available   E-Book/E-Doc 2005
      Guide to Malware incident prevention and handling [electronic resource] / Peter Mell, Karen Kent, Jos Axe Federal Documents Online:Available   E-Book/E-Doc 2005
C 13. 10 : 800- 84    
      Guide to test, training, and exercise programs for IT plans and capabilities [electronic resource] : C 13.10:800-84 ; Axe Federal Documents Online:Available   E-Book/E-Doc 2006
      Guide to test, training, and exercise programs for IT plans and capabilities [electronic resource] : Axe Federal Documents Online:Available   E-Book/E-Doc 2006
C 13. 10 : 800- 85a    
      PIV card application and middleware interface test guidelines (SP800-73 compliance) [electronic resou C 13.10:800-85 A ; Axe Federal Documents Online:Available   E-Book/E-Doc 2006
      PIV card application and middleware interface test guidelines (SP800-73 compliance) [electronic resou Axe Federal Documents Online:Available   E-Book/E-Doc 2006
C 13. 10 : 800- 85a- 1    
      PIV card application and middleware interface test guidelines (SP 800-73-2 compliance) [electronic re C 13.10:800-85 A-1 ; Axe Federal Documents Online:Available   E-Book/E-Doc 2009
      PIV card application and middleware interface test guidelines (SP 800-73-2 compliance) [electronic re Axe Federal Documents Online:Available   E-Book/E-Doc 2009
C 13. 10 : 800- 85a- 2    
      PIV card application and middleware interface test guidelines (SP 800-73-3 compliance) [electronic re C 13.10:800-85 A-2 ; Axe Federal Documents Online:Available   E-Book/E-Doc 2010
      PIV card application and middleware interface test guidelines (SP 800-73-3 compliance) [electronic re Axe Federal Documents Online:Available   E-Book/E-Doc 2010
C 13. 10 : 800- 85b- 1/Draft    
      PIV data model test guidelines [electronic resource] / Ramaswamy Chandramouli ... [et al.]. C 13.10:800-85 B-1/DRAFT ; Axe Federal Documents Online:Available   E-Book/E-Doc 2009
      PIV data model test guidelines [electronic resource] / Ramaswamy Chandramouli ... [et al.]. Axe Federal Documents Online:Available   E-Book/E-Doc 2009
C 13. 10 : 800- 86    
      Guide to integrating forensic techniques into incident response [electronic resource] : recommendatio C 13.10:800-86 ; Axe Federal Documents Online:Available   E-Book/E-Doc 2006
      Guide to integrating forensic techniques into incident response [electronic resource] : recommendatio Axe Federal Documents Online:Available   E-Book/E-Doc 2006
Add Marked to Bag Add All On Page
Result Page   Prev Next
 
    
Available items only