|
|
C 13. 10 : 800- 53/Rev. 3/Excerpt
|
|
|
Recommended security controls for federal information systems and organizations [electronic resource]
C 13.10:800-53/REV.3/EXCERPT
;
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2009
|
Recommended security controls for federal information systems and organizations [electronic resource]
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2009
|
|
C 13. 10 : 800- 53/Rev. 4/Draft
|
|
|
Security and privacy controls for federal information systems and organizations [electronic resource]
C 13.10:800-53/REV.4/DRAFT
;
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2012
|
Security and privacy controls for federal information systems and organizations [electronic resource]
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2012
|
|
C 13. 10 : 800- 53a/ 2008
|
|
|
Guide for assessing the security controls in federal information systems [electronic resource] : buil
C 13.10:800-53 A/2008
;
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2008
|
Guide for assessing the security controls in federal information systems [electronic resource] : buil
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2008
|
|
C 13. 10 : 800- 54/ 2007
|
|
|
Border Gateway Protocol security [electronic resource] : recommendations of the National Institute of
C 13.10:800-54/2007
;
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2007
|
Border Gateway Protocol security [electronic resource] : recommendations of the National Institute of
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2007
|
|
C 13. 10 : 800- 55/ 2/Rev. 1
|
|
|
Performance measurement guide for information security [electronic resource] / Elizabeth Chew ... [et
C 13.10:800-55/2/REV.1
;
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2008
|
Performance measurement guide for information security [electronic resource] / Elizabeth Chew ... [et
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2008
|
|
C 13. 10 : 800- 56a/Rev.
|
|
|
Recommendation for pair-wise key establishment schemes using discrete logarithm cryptography : (revis
C 13.10:800-56 A/REV.
;
Axe Federal Documents Online:Available
|
|
2007
|
Recommendation for pair-wise key establishment schemes using discrete logarithm cryptography : (revis
Axe Federal Documents Online:Available
|
|
2007
|
|
C 13. 10 : 800- 56b
|
|
|
Recommendation for pair-wise key establishment schemes using integer factorization cryptography [elec
C 13.10:800-56 B
;
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2009
|
Recommendation for pair-wise key establishment schemes using integer factorization cryptography [elec
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2009
|
|
C 13. 10 : 800- 56c
|
|
|
Recommendation for key derivation through extraction-then-expansion [electronic resource] / Lily Chen
C 13.10:800-56 C
;
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2011
|
Recommendation for key derivation through extraction-then-expansion [electronic resource] / Lily Chen
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2011
|
|
C 13. 10 : 800- 57/Pt. 1/Rev.
|
|
|
Recommendation for key management. Part 1, General / Elaine Barker [and others].
C 13.10:800-57/PT.1/REV.
;
Axe Federal Documents Online:Available
|
|
2006
|
Recommendation for key management. Part 1, General / Elaine Barker [and others].
Axe Federal Documents Online:Available
|
|
2006
|
|
C 13. 10 : 800- 57/Pt. 1/Rev. 3
|
|
|
Recommendation for key management. Part 1, General (revision 3) [electronic resource] / Elaine Barker
C 13.10:800-57/PT.1/REV.3
;
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2012
|
Recommendation for key management. Part 1, General (revision 3) [electronic resource] / Elaine Barker
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2012
|
|
C 13. 10 : 800- 57/Pt. 2
|
|
|
Recommendation for key management. Part 2 [electronic resource] : best practices for key management o
C 13.10:800-57/PT.2
;
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2007
|
Recommendation for key management. Part 2 [electronic resource] : best practices for key management o
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2007
|
|
C 13. 10 : 800- 57/Pt. 3
|
|
|
Recommendation for key management. Part 3 [electronic resource] : application-specific key management
C 13.10:800-57/PT.3
;
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2009
|
Recommendation for key management. Part 3 [electronic resource] : application-specific key management
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2009
|
|
C 13. 10 : 800- 58
|
|
|
Security considerations for voice over IP systems [electronic resource] : recommendations of the Nati
C 13.10:800-58
;
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2005
|
Security considerations for voice over IP systems [electronic resource] : recommendations of the Nati
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2005
|
|
C 13. 10 : 800- 59
|
|
|
Guideline for identifying an information system as a national security system [electronic resource] /
C 13.10:800-59
;
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2003
|
Guideline for identifying an information system as a national security system [electronic resource] /
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2003
|
|
C 13. 10 : 800- 60
|
|
|
Guide for mapping types of information and information systems to security categories [electronic res
C 13.10:800-60
;
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2004
|
Guide for mapping types of information and information systems to security categories [electronic res
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2004
|
|
C 13. 10 : 800- 60/Rev. 1
|
|
|
Guide for mapping types of information and information systems to security categories [electronic res
C 13.10:800-60/REV.1
;
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2008
|
Guide for mapping types of information and information systems to security categories [electronic res
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2008
|
|
C 13. 10 : 800- 63- 1/ 2011
|
|
|
Electronic authentication guideline [electronic resource] : recommendations of the National Institute
C 13.10:800-63-1/2011
;
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2011
|
Electronic authentication guideline [electronic resource] : recommendations of the National Institute
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2011
|
|
C 13. 10 : 800- 64/Rev. 2
|
|
|
Security considerations in the system development life cycle [electronic resource] / Richard Kissell
C 13.10:800-64/REV.2
;
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2008
|
Security considerations in the system development life cycle [electronic resource] / Richard Kissell
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2008
|
|
C 13. 10 : 800- 65
|
|
|
Integrating IT security into the capital planning and investment control process [electronic resource
C 13.10:800-65
;
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2005
|
Integrating IT security into the capital planning and investment control process [electronic resource
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2005
|
|
C 13. 10 : 800- 65/Rev. 1/Draft
|
|
|
Recommendations for integrating information security into the capital planning and investment control
C 13.10:800-65/REV.1/DRAFT
;
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2009
|
Recommendations for integrating information security into the capital planning and investment control
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2009
|
|
C 13. 10 : 800- 66/Rev. 1
|
|
|
An introductory resource guide for implementing the Health Insurance Portability and Accountability A
C 13.10:800-66/REV.1
;
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2008
|
An introductory resource guide for implementing the Health Insurance Portability and Accountability A
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2008
|
|
C 13. 10 : 800- 67/ 2011
|
|
|
Recommendation for the Triple Data Encryption Algorithm (TDEA) block cipher [electronic resource] / W
C 13.10:800-67/2011
;
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2011
|
Recommendation for the Triple Data Encryption Algorithm (TDEA) block cipher [electronic resource] / W
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2011
|
|
C 13. 10 : 800- 68/Rev. 1/Draft
|
|
|
Guide to securing Microsoft Windows XP systems for IT professionals [electronic resource] : a NIST se
C 13.10:800-68/REV.1/DRAFT
;
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2008
|
Guide to securing Microsoft Windows XP systems for IT professionals [electronic resource] : a NIST se
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2008
|
|
C 13. 10 : 800- 69
|
|
|
Guidance for securing Microsoft Windows XP Home Edition [electronic resource] : a NIST security confi
C 13.10:800-69
;
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2006
|
Guidance for securing Microsoft Windows XP Home Edition [electronic resource] : a NIST security confi
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2006
|
|
C 13. 10 : 800- 70/Rev. 2
|
|
|
National Checklist Program for IT products [electronic resource] : guidelines for checklist users and
C 13.10:800-70/REV.2
;
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2011
|
National Checklist Program for IT products [electronic resource] : guidelines for checklist users and
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2011
|
|
C 13. 10 : 800- 72
|
|
|
Guidelines on PDA forensics [electronic resource] : recommendations of the National Institute of Stan
C 13.10:800-72
;
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2004
|
Guidelines on PDA forensics [electronic resource] : recommendations of the National Institute of Stan
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2004
|
|
C 13. 10 : 800- 73- 1
|
|
|
Interfaces for Personal Identity Verification [electronic resource] / James F. Dray, Scott B. Guthery
C 13.10:800-73-1
;
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2006
|
Interfaces for Personal Identity Verification [electronic resource] / James F. Dray, Scott B. Guthery
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2006
|
|
C 13. 10 : 800- 73- 2
|
|
|
Interfaces for Personal Identity Verification [electronic resource] / Ramaswamy Chandramouli [and oth
C 13.10:800-73-2
;
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2008
|
Interfaces for Personal Identity Verification [electronic resource] / Ramaswamy Chandramouli [and oth
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2008
|
|
C 13. 10 : 800- 73- 3
|
|
|
Interfaces for Personal Identity Verification [electronic resource] / Ramaswamy Chandramouli ... [et
C 13.10:800-73-3
;
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2010
|
Interfaces for Personal Identity Verification [electronic resource] / Ramaswamy Chandramouli ... [et
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2010
|
|
C 13. 10 : 800- 76
|
|
|
Information security [electronic resource] : biometric data specification for personal identity verif
C 13.10:800-76
;
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2006
|
Biometric data specification for Personal Identity Verification [electronic resource] / Charles Wilso
C 13.10:800-76
;
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2006
|
Biometric data specification for Personal Identity Verification [electronic resource] / Charles Wilso
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2006
|
Information security [electronic resource] : biometric data specification for personal identity verif
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2006
|
|
C 13. 10 : 800- 76- 2
|
|
|
Biometric specifications for Personal Identity Verification / Patrick Grother, Wayne Salamon, Ramaswa
C 13.10:800-76-2
;
Axe Federal Documents Online:Available
|
|
2013
|
Biometric specifications for Personal Identity Verification / Patrick Grother, Wayne Salamon, Ramaswa
Axe Federal Documents Online:Available
|
|
2013
|
|
C 13. 10 : 800- 76- 2/Draft
|
|
|
Biometric specifications for Personal Identity Verification [electronic resource] / Patrick Grother,
C 13.10:800-76-2/DRAFT
;
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2012
|
Biometric specifications for Personal Identity Verification [electronic resource] / Patrick Grother,
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2012
|
|
C 13. 10 : 800- 77
|
|
|
Guide to IPsec VPNs [electronic resource] : recommendations of the National Institute of Standards an
C 13.10:800-77
;
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2005
|
Guide to IPsec VPNs [electronic resource] : recommendations of the National Institute of Standards an
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2005
|
|
C 13. 10 : 800- 78
|
|
|
Cryptographic algorithms and key sizes for personal identity verification [electronic resource] / W.
C 13.10:800-78
;
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2005
|
Cryptographic algorithms and key sizes for personal identity verification [electronic resource] / W.
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2005
|
|
C 13. 10 : 800- 78- 2
|
|
|
Cryptographic algorithms and key sizes for Personal Identity Verification [electronic resource] / W.
C 13.10:800-78-2
;
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2010
|
Cryptographic algorithms and key sizes for Personal Identity Verification [electronic resource] / W.
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2010
|
|
C 13. 10 : 800- 79- 1
|
|
|
Guidelines for the accreditation of personal identity verification card issuers [electronic resource]
C 13.10:800-79-1
;
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2008
|
Guidelines for the accreditation of personal identity verification card issuers [electronic resource]
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2008
|
|
C 13. 10 : 800- 80/Draft
|
|
|
Guide for developing performance metrics for information security [electronic resource] : recommendat
C 13.10:800-80/DRAFT
;
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2006
|
Guide for developing performance metrics for information security [electronic resource] : recommendat
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2006
|
|
C 13. 10 : 800- 81r 1
|
|
|
Secure Domain Name System (DNS) deployment guide [electronic resource] : recommendations of the Natio
C 13.10:800-81 R 1
;
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2010
|
Secure Domain Name System (DNS) deployment guide [electronic resource] : recommendations of the Natio
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2010
|
|
C 13. 10 : 800- 82/Draft/Final
|
|
|
Guide to Industrial Control Systems (ICS) security : Supervisory Control and Data Acquisition (SCADA)
C 13.10:800-82/DRAFT/FINAL
;
Axe Federal Documents Online:Available
|
|
2008
|
Guide to Industrial Control Systems (ICS) security : Supervisory Control and Data Acquisition (SCADA)
Axe Federal Documents Online:Available
|
|
2008
|
|
C 13. 10 : 800- 82/Draft/Rev.
|
|
|
Guide to Industrial Control Systems (ICS) security : Supervisory Control and Data Acquisition (SCADA)
C 13.10:800-82/DRAFT/REV.
;
Axe Federal Documents Online:Available
|
|
2007
|
Guide to Industrial Control Systems (ICS) security : Supervisory Control and Data Acquisition (SCADA)
Axe Federal Documents Online:Available
|
|
2007
|
|
C 13. 10 : 800- 83
|
|
|
Guide to Malware incident prevention and handling [electronic resource] / Peter Mell, Karen Kent, Jos
C 13.10:800-83
;
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2005
|
Guide to Malware incident prevention and handling [electronic resource] / Peter Mell, Karen Kent, Jos
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2005
|
|
C 13. 10 : 800- 84
|
|
|
Guide to test, training, and exercise programs for IT plans and capabilities [electronic resource] :
C 13.10:800-84
;
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2006
|
Guide to test, training, and exercise programs for IT plans and capabilities [electronic resource] :
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2006
|
|
C 13. 10 : 800- 85a
|
|
|
PIV card application and middleware interface test guidelines (SP800-73 compliance) [electronic resou
C 13.10:800-85 A
;
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2006
|
PIV card application and middleware interface test guidelines (SP800-73 compliance) [electronic resou
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2006
|
|
C 13. 10 : 800- 85a- 1
|
|
|
PIV card application and middleware interface test guidelines (SP 800-73-2 compliance) [electronic re
C 13.10:800-85 A-1
;
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2009
|
PIV card application and middleware interface test guidelines (SP 800-73-2 compliance) [electronic re
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2009
|
|
C 13. 10 : 800- 85a- 2
|
|
|
PIV card application and middleware interface test guidelines (SP 800-73-3 compliance) [electronic re
C 13.10:800-85 A-2
;
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2010
|
PIV card application and middleware interface test guidelines (SP 800-73-3 compliance) [electronic re
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2010
|
|
C 13. 10 : 800- 85b- 1/Draft
|
|
|
PIV data model test guidelines [electronic resource] / Ramaswamy Chandramouli ... [et al.].
C 13.10:800-85 B-1/DRAFT
;
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2009
|
PIV data model test guidelines [electronic resource] / Ramaswamy Chandramouli ... [et al.].
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2009
|
|
C 13. 10 : 800- 86
|
|
|
Guide to integrating forensic techniques into incident response [electronic resource] : recommendatio
C 13.10:800-86
;
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2006
|
Guide to integrating forensic techniques into incident response [electronic resource] : recommendatio
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2006
|
|
C 13. 10 : 800- 87/Rev. 1/ 2008
|
|
|
Codes for identification of federal and federally-assisted organizations [electronic resource] / Will
C 13.10:800-87/REV.1/2008
;
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2008
|
Codes for identification of federal and federally-assisted organizations [electronic resource] / Will
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2008
|
|
C 13. 10 : 800- 89
|
|
|
Recommendation for obtaining assurances for digital signature applications [electronic resource] / El
C 13.10:800-89
;
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2006
|
Recommendation for obtaining assurances for digital signature applications [electronic resource] / El
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2006
|
|
C 13. 10 : 800- 90
|
|
|
Recommendation for random number generation using deterministic random bit generators [electronic res
C 13.10:800-90
;
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2006
|
Recommendation for random number generation using deterministic random bit generators [electronic res
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2006
|
Add Marked to Bag
Add All On Page
|