Kids Library Home

Welcome to the Kids' Library!

Search for books, movies, music, magazines, and more.

     
Available items only
Nearby SuDoc Numbers are:
Result Page   Prev Next
Add Marked to Bag Add All On Page
Mark   Media Year
C 13. 10 : 800- 73- 2    
      Interfaces for Personal Identity Verification [electronic resource] / Ramaswamy Chandramouli [and oth C 13.10:800-73-2 ; Axe Federal Documents Online:Available   E-Book/E-Doc 2008
      Interfaces for Personal Identity Verification [electronic resource] / Ramaswamy Chandramouli [and oth Axe Federal Documents Online:Available   E-Book/E-Doc 2008
C 13. 10 : 800- 73- 3    
      Interfaces for Personal Identity Verification [electronic resource] / Ramaswamy Chandramouli ... [et C 13.10:800-73-3 ; Axe Federal Documents Online:Available   E-Book/E-Doc 2010
      Interfaces for Personal Identity Verification [electronic resource] / Ramaswamy Chandramouli ... [et Axe Federal Documents Online:Available   E-Book/E-Doc 2010
C 13. 10 : 800- 76    
      Information security [electronic resource] : biometric data specification for personal identity verif C 13.10:800-76 ; Axe Federal Documents Online:Available   E-Book/E-Doc 2006
      Biometric data specification for Personal Identity Verification [electronic resource] / Charles Wilso C 13.10:800-76 ; Axe Federal Documents Online:Available   E-Book/E-Doc 2006
      Biometric data specification for Personal Identity Verification [electronic resource] / Charles Wilso Axe Federal Documents Online:Available   E-Book/E-Doc 2006
      Information security [electronic resource] : biometric data specification for personal identity verif Axe Federal Documents Online:Available   E-Book/E-Doc 2006
C 13. 10 : 800- 76- 2    
      Biometric specifications for Personal Identity Verification / Patrick Grother, Wayne Salamon, Ramaswa C 13.10:800-76-2 ; Axe Federal Documents Online:Available   E-Book/E-Doc 2013
      Biometric specifications for Personal Identity Verification / Patrick Grother, Wayne Salamon, Ramaswa Axe Federal Documents Online:Available   E-Book/E-Doc 2013
C 13. 10 : 800- 76- 2/Draft    
      Biometric specifications for Personal Identity Verification [electronic resource] / Patrick Grother, C 13.10:800-76-2/DRAFT ; Axe Federal Documents Online:Available   E-Book/E-Doc 2012
      Biometric specifications for Personal Identity Verification [electronic resource] / Patrick Grother, Axe Federal Documents Online:Available   E-Book/E-Doc 2012
C 13. 10 : 800- 77    
      Guide to IPsec VPNs [electronic resource] : recommendations of the National Institute of Standards an C 13.10:800-77 ; Axe Federal Documents Online:Available   E-Book/E-Doc 2005
      Guide to IPsec VPNs [electronic resource] : recommendations of the National Institute of Standards an Axe Federal Documents Online:Available   E-Book/E-Doc 2005
C 13. 10 : 800- 78    
      Cryptographic algorithms and key sizes for personal identity verification [electronic resource] / W. C 13.10:800-78 ; Axe Federal Documents Online:Available   E-Book/E-Doc 2005
      Cryptographic algorithms and key sizes for personal identity verification [electronic resource] / W. Axe Federal Documents Online:Available   E-Book/E-Doc 2005
C 13. 10 : 800- 78- 2    
      Cryptographic algorithms and key sizes for Personal Identity Verification [electronic resource] / W. C 13.10:800-78-2 ; Axe Federal Documents Online:Available   E-Book/E-Doc 2010
      Cryptographic algorithms and key sizes for Personal Identity Verification [electronic resource] / W. Axe Federal Documents Online:Available   E-Book/E-Doc 2010
C 13. 10 : 800- 79- 1    
      Guidelines for the accreditation of personal identity verification card issuers [electronic resource] C 13.10:800-79-1 ; Axe Federal Documents Online:Available   E-Book/E-Doc 2008
      Guidelines for the accreditation of personal identity verification card issuers [electronic resource] Axe Federal Documents Online:Available   E-Book/E-Doc 2008
C 13. 10 : 800- 80/Draft    
      Guide for developing performance metrics for information security [electronic resource] : recommendat C 13.10:800-80/DRAFT ; Axe Federal Documents Online:Available   E-Book/E-Doc 2006
      Guide for developing performance metrics for information security [electronic resource] : recommendat Axe Federal Documents Online:Available   E-Book/E-Doc 2006
C 13. 10 : 800- 81r 1    
      Secure Domain Name System (DNS) deployment guide [electronic resource] : recommendations of the Natio C 13.10:800-81 R 1 ; Axe Federal Documents Online:Available   E-Book/E-Doc 2010
      Secure Domain Name System (DNS) deployment guide [electronic resource] : recommendations of the Natio Axe Federal Documents Online:Available   E-Book/E-Doc 2010
C 13. 10 : 800- 82/Draft/Final    
      Guide to Industrial Control Systems (ICS) security : Supervisory Control and Data Acquisition (SCADA) C 13.10:800-82/DRAFT/FINAL ; Axe Federal Documents Online:Available   E-Book/E-Doc 2008
      Guide to Industrial Control Systems (ICS) security : Supervisory Control and Data Acquisition (SCADA) Axe Federal Documents Online:Available   E-Book/E-Doc 2008
C 13. 10 : 800- 82/Draft/Rev.    
      Guide to Industrial Control Systems (ICS) security : Supervisory Control and Data Acquisition (SCADA) C 13.10:800-82/DRAFT/REV. ; Axe Federal Documents Online:Available   E-Book/E-Doc 2007
      Guide to Industrial Control Systems (ICS) security : Supervisory Control and Data Acquisition (SCADA) Axe Federal Documents Online:Available   E-Book/E-Doc 2007
C 13. 10 : 800- 83    
      Guide to Malware incident prevention and handling [electronic resource] / Peter Mell, Karen Kent, Jos C 13.10:800-83 ; Axe Federal Documents Online:Available   E-Book/E-Doc 2005
      Guide to Malware incident prevention and handling [electronic resource] / Peter Mell, Karen Kent, Jos Axe Federal Documents Online:Available   E-Book/E-Doc 2005
C 13. 10 : 800- 84    
      Guide to test, training, and exercise programs for IT plans and capabilities [electronic resource] : C 13.10:800-84 ; Axe Federal Documents Online:Available   E-Book/E-Doc 2006
      Guide to test, training, and exercise programs for IT plans and capabilities [electronic resource] : Axe Federal Documents Online:Available   E-Book/E-Doc 2006
C 13. 10 : 800- 85a    
      PIV card application and middleware interface test guidelines (SP800-73 compliance) [electronic resou C 13.10:800-85 A ; Axe Federal Documents Online:Available   E-Book/E-Doc 2006
      PIV card application and middleware interface test guidelines (SP800-73 compliance) [electronic resou Axe Federal Documents Online:Available   E-Book/E-Doc 2006
C 13. 10 : 800- 85a- 1    
      PIV card application and middleware interface test guidelines (SP 800-73-2 compliance) [electronic re C 13.10:800-85 A-1 ; Axe Federal Documents Online:Available   E-Book/E-Doc 2009
      PIV card application and middleware interface test guidelines (SP 800-73-2 compliance) [electronic re Axe Federal Documents Online:Available   E-Book/E-Doc 2009
C 13. 10 : 800- 85a- 2    
      PIV card application and middleware interface test guidelines (SP 800-73-3 compliance) [electronic re C 13.10:800-85 A-2 ; Axe Federal Documents Online:Available   E-Book/E-Doc 2010
      PIV card application and middleware interface test guidelines (SP 800-73-3 compliance) [electronic re Axe Federal Documents Online:Available   E-Book/E-Doc 2010
C 13. 10 : 800- 85b- 1/Draft    
      PIV data model test guidelines [electronic resource] / Ramaswamy Chandramouli ... [et al.]. C 13.10:800-85 B-1/DRAFT ; Axe Federal Documents Online:Available   E-Book/E-Doc 2009
      PIV data model test guidelines [electronic resource] / Ramaswamy Chandramouli ... [et al.]. Axe Federal Documents Online:Available   E-Book/E-Doc 2009
C 13. 10 : 800- 86    
      Guide to integrating forensic techniques into incident response [electronic resource] : recommendatio C 13.10:800-86 ; Axe Federal Documents Online:Available   E-Book/E-Doc 2006
      Guide to integrating forensic techniques into incident response [electronic resource] : recommendatio Axe Federal Documents Online:Available   E-Book/E-Doc 2006
C 13. 10 : 800- 87/Rev. 1/ 2008    
      Codes for identification of federal and federally-assisted organizations [electronic resource] / Will C 13.10:800-87/REV.1/2008 ; Axe Federal Documents Online:Available   E-Book/E-Doc 2008
      Codes for identification of federal and federally-assisted organizations [electronic resource] / Will Axe Federal Documents Online:Available   E-Book/E-Doc 2008
C 13. 10 : 800- 89    
      Recommendation for obtaining assurances for digital signature applications [electronic resource] / El C 13.10:800-89 ; Axe Federal Documents Online:Available   E-Book/E-Doc 2006
      Recommendation for obtaining assurances for digital signature applications [electronic resource] / El Axe Federal Documents Online:Available   E-Book/E-Doc 2006
C 13. 10 : 800- 90    
      Recommendation for random number generation using deterministic random bit generators [electronic res C 13.10:800-90 ; Axe Federal Documents Online:Available   E-Book/E-Doc 2006
      Recommendation for random number generation using deterministic random bit generators [electronic res Axe Federal Documents Online:Available   E-Book/E-Doc 2006
C 13. 10 : 800- 90/Rev.    
      Recommendation for random number generation using deterministic random bit generators (revised) / Ela C 13.10:800-90/REV. ; Axe Federal Documents Online:Available   E-Book/E-Doc 2007
      Recommendation for random number generation using deterministic random bit generators (revised) / Ela Axe Federal Documents Online:Available   E-Book/E-Doc 2007
C 13. 10 : 800- 90b/Draft    
      Recommendation for the entropy sources used for random bit generator [electronic resource] / Elaine B C 13.10:800-90 B/DRAFT ; Axe Federal Documents Online:Available   E-Book/E-Doc 2012
      Recommendation for the entropy sources used for random bit generator [electronic resource] / Elaine B Axe Federal Documents Online:Available   E-Book/E-Doc 2012
C 13. 10 : 800- 90c/Draft    
      Recommendation for random bit generator (RBG) constructions [electronic resource] / Elaine Barker, Jo C 13.10:800-90 C/DRAFT ; Axe Federal Documents Online:Available   E-Book/E-Doc 2012
      Recommendation for random bit generator (RBG) constructions [electronic resource] / Elaine Barker, Jo Axe Federal Documents Online:Available   E-Book/E-Doc 2012
C 13. 10 : 800- 92    
      Guide to computer security log management [electronic resource] : recommendations of the National Ins C 13.10:800-92 ; Axe Federal Documents Online:Available   E-Book/E-Doc 2006
      Guide to computer security log management [electronic resource] : recommendations of the National Ins Axe Federal Documents Online:Available   E-Book/E-Doc 2006
C 13. 10 : 800- 94    
      Guide to intrusion detection and prevention systems (IDPS) [electronic resource] : recommendations of C 13.10:800-94 ; Axe Federal Documents Online:Available   E-Book/E-Doc 2007
      Guide to intrusion detection and prevention systems (IDPS) [electronic resource] : recommendations of Axe Federal Documents Online:Available   E-Book/E-Doc 2007
C 13. 10 : 800- 96    
      PIV card to reader interoperability guidelines [electronic resource] / James F. Dray ... [et al.]. C 13.10:800-96 ; Axe Federal Documents Online:Available   E-Book/E-Doc 2006
      PIV card to reader interoperability guidelines [electronic resource] / James F. Dray ... [et al.]. Axe Federal Documents Online:Available   E-Book/E-Doc 2006
C 13. 10 : 800- 97    
      Establishing wireless robust security networks [electronic resource] : a guide to IEEE 802.11i : reco C 13.10:800-97 ; Axe Federal Documents Online:Available   E-Book/E-Doc 2007
      Establishing wireless robust security networks [electronic resource] : a guide to IEEE 802.11i : reco Axe Federal Documents Online:Available   E-Book/E-Doc 2007
C 13. 10 : 800- 98    
      Guidelines for securing radio frequency identification (RFID) systems [electronic resource] : recomme C 13.10:800-98 ; Axe Federal Documents Online:Available   E-Book/E-Doc 2007
      Guidelines for securing radio frequency identification (RFID) systems [electronic resource] : recomme Axe Federal Documents Online:Available   E-Book/E-Doc 2007
C 13. 10 : 800- 100    
      Information security handbook [electronic resource] : a guide for managers / Pauline Bowen, Joan Hash C 13.10:800-100 ; Axe Federal Documents Online:Available   E-Book/E-Doc 2006
      Information security handbook [electronic resource] : a guide for managers / Pauline Bowen, Joan Hash Axe Federal Documents Online:Available   E-Book/E-Doc 2006
C 13. 10 : 800- 101    
      Guidelines on cell phone forensics [electronic resource] : recommendations of the National Institute C 13.10:800-101 ; Axe Federal Documents Online:Available   E-Book/E-Doc 2007
      Guidelines on cell phone forensics [electronic resource] : recommendations of the National Institute Axe Federal Documents Online:Available   E-Book/E-Doc 2007
C 13. 10 : 800- 102    
      Recommendation for digital signature timeliness [electronic resource] / Elaine Barker. C 13.10:800-102 ; Axe Federal Documents Online:Available   E-Book/E-Doc 2009
      Recommendation for digital signature timeliness [electronic resource] / Elaine Barker. Axe Federal Documents Online:Available   E-Book/E-Doc 2009
C 13. 10 : 800- 103/Draft/Pt. 1-    
      An ontology of identity credentials [electronic resource] / William MacGregor, William Dutcher, Jamil C 13.10:800-103/DRAFT/PT.1- ; Axe Federal Documents Online:Available   E-Book/E-Doc 2006
      An ontology of identity credentials [electronic resource] / William MacGregor, William Dutcher, Jamil Axe Federal Documents Online:Available   E-Book/E-Doc 2006
C 13. 10 : 800- 106    
      Randomized hashing for digital signatures [electronic resource] / Quynh Dang. C 13.10:800-106 ; Axe Federal Documents Online:Available   E-Book/E-Doc 2009
      Randomized hashing for digital signatures [electronic resource] / Quynh Dang. Axe Federal Documents Online:Available   E-Book/E-Doc 2009
C 13. 10 : 800- 107    
      Recommendation for applications using approved hash algorithms [electronic resource] / Quynh Dang. C 13.10:800-107 ; Axe Federal Documents Online:Available   E-Book/E-Doc 2009
      Recommendation for applications using approved hash algorithms [electronic resource] / Quynh Dang. Axe Federal Documents Online:Available   E-Book/E-Doc 2009
C 13. 10 : 800- 108/Rev.    
      Recommendation for key derivation using pseudorandom functions (revised) [electronic resource] / Lily C 13.10:800-108/REV. ; Axe Federal Documents Online:Available   E-Book/E-Doc 2009
      Recommendation for key derivation using pseudorandom functions (revised) [electronic resource] / Lily Axe Federal Documents Online:Available   E-Book/E-Doc 2009
C 13. 10 : 800- 110/Draft    
      Information System Security Reference Data Model [electronic resource] / Elizabeth Chew, Keven Stine, C 13.10:800-110/DRAFT ; Axe Federal Documents Online:Available   E-Book/E-Doc 2007
      Information System Security Reference Data Model [electronic resource] / Elizabeth Chew, Keven Stine, Axe Federal Documents Online:Available   E-Book/E-Doc 2007
C 13. 10 : 800- 111    
      Guide to storage encryption technologies for end user devices [electronic resource] / Karen Scarfone, C 13.10:800-111 ; Axe Federal Documents Online:Available   E-Book/E-Doc 2007
      Guide to storage encryption technologies for end user devices [electronic resource] / Karen Scarfone, Axe Federal Documents Online:Available   E-Book/E-Doc 2007
C 13. 10 : 800- 113    
      Guide to SSL VPNs [electronic resource] : recommendations of the National Institute of Standards and C 13.10:800-113 ; Axe Federal Documents Online:Available   E-Book/E-Doc 2008
      Guide to SSL VPNs [electronic resource] : recommendations of the National Institute of Standards and Axe Federal Documents Online:Available   E-Book/E-Doc 2008
C 13. 10 : 800- 115    
      Technical guide to information security testing and assessment [electronic resource] : recommendation C 13.10:800-115 ; Axe Federal Documents Online:Available   E-Book/E-Doc 2008
      Technical guide to information security testing and assessment [electronic resource] : recommendation Axe Federal Documents Online:Available   E-Book/E-Doc 2008
C 13. 10 : 800- 116    
      A recommendation for the use of PIV credentials in physical access control systems (PACS) [electronic C 13.10:800-116 ; Axe Federal Documents Online:Available   E-Book/E-Doc 2008
      A recommendation for the use of PIV credentials in physical access control systems (PACS) [electronic Axe Federal Documents Online:Available   E-Book/E-Doc 2008
C 13. 10 : 800- 117    
      Guide to adopting and using the Security Content Automation Protocol (SCAP) version 1.0 [electronic r C 13.10:800-117 ; Axe Federal Documents Online:Available   E-Book/E-Doc 2010
      Guide to adopting and using the Security Content Automation Protocol (SCAP) version 1.0 [electronic r Axe Federal Documents Online:Available   E-Book/E-Doc 2010
C 13. 10 : 800- 119    
      Guidelines for the secure deployment of IPv6 [electronic resource] : recommendations of the National C 13.10:800-119 ; Axe Federal Documents Online:Available   E-Book/E-Doc 2010
      Guidelines for the secure deployment of IPv6 [electronic resource] : recommendations of the National Axe Federal Documents Online:Available   E-Book/E-Doc 2010
C 13. 10 : 800- 120    
      Recommendation for EAP methods used in wireless network access authentication [electronic resource] / C 13.10:800-120 ; Axe Federal Documents Online:Available   E-Book/E-Doc 2009
      Recommendation for EAP methods used in wireless network access authentication [electronic resource] / Axe Federal Documents Online:Available   E-Book/E-Doc 2009
C 13. 10 : 800- 122    
      Guide to protecting the confidentiality of Personally Identifiable Information (PII) [electronic reso C 13.10:800-122 ; Axe Federal Documents Online:Available   E-Book/E-Doc 2010
      Guide to protecting the confidentiality of Personally Identifiable Information (PII) [electronic reso Axe Federal Documents Online:Available   E-Book/E-Doc 2010
C 13. 10 : 800- 123    
      Guide to general server security [electronic resource] : recommendations of the National Institute of C 13.10:800-123 ; Axe Federal Documents Online:Available   E-Book/E-Doc 2008
      Guide to general server security [electronic resource] : recommendations of the National Institute of Axe Federal Documents Online:Available   E-Book/E-Doc 2008
C 13. 10 : 800- 125    
      Guide to security for full virtualization technologies [electronic resource] : recommendations of the C 13.10:800-125 ; Axe Federal Documents Online:Available   E-Book/E-Doc 2011
      Guide to security for full virtualization technologies [electronic resource] : recommendations of the Axe Federal Documents Online:Available   E-Book/E-Doc 2011
C 13. 10 : 800- 126/Rev. 1    
      The technical specification for the Security Content Automation Protocol (SCAP), SCAP version 1.1 [el C 13.10:800-126/REV.1 ; Axe Federal Documents Online:Available   E-Book/E-Doc 2011
      The technical specification for the Security Content Automation Protocol (SCAP), SCAP version 1.1 [el Axe Federal Documents Online:Available   E-Book/E-Doc 2011
Add Marked to Bag Add All On Page
Result Page   Prev Next
 
    
Available items only