|
|
C 13. 10 : 800- 73- 2
|
|
|
Interfaces for Personal Identity Verification [electronic resource] / Ramaswamy Chandramouli [and oth
C 13.10:800-73-2
;
Axe Federal Documents Online:Available
|
|
2008
|
Interfaces for Personal Identity Verification [electronic resource] / Ramaswamy Chandramouli [and oth
Axe Federal Documents Online:Available
|
|
2008
|
|
C 13. 10 : 800- 73- 3
|
|
|
Interfaces for Personal Identity Verification [electronic resource] / Ramaswamy Chandramouli ... [et
C 13.10:800-73-3
;
Axe Federal Documents Online:Available
|
|
2010
|
Interfaces for Personal Identity Verification [electronic resource] / Ramaswamy Chandramouli ... [et
Axe Federal Documents Online:Available
|
|
2010
|
|
C 13. 10 : 800- 76
|
|
|
Information security [electronic resource] : biometric data specification for personal identity verif
C 13.10:800-76
;
Axe Federal Documents Online:Available
|
|
2006
|
Biometric data specification for Personal Identity Verification [electronic resource] / Charles Wilso
C 13.10:800-76
;
Axe Federal Documents Online:Available
|
|
2006
|
Biometric data specification for Personal Identity Verification [electronic resource] / Charles Wilso
Axe Federal Documents Online:Available
|
|
2006
|
Information security [electronic resource] : biometric data specification for personal identity verif
Axe Federal Documents Online:Available
|
|
2006
|
|
C 13. 10 : 800- 76- 2
|
|
|
Biometric specifications for Personal Identity Verification / Patrick Grother, Wayne Salamon, Ramaswa
C 13.10:800-76-2
;
Axe Federal Documents Online:Available
|
|
2013
|
Biometric specifications for Personal Identity Verification / Patrick Grother, Wayne Salamon, Ramaswa
Axe Federal Documents Online:Available
|
|
2013
|
|
C 13. 10 : 800- 76- 2/Draft
|
|
|
Biometric specifications for Personal Identity Verification [electronic resource] / Patrick Grother,
C 13.10:800-76-2/DRAFT
;
Axe Federal Documents Online:Available
|
|
2012
|
Biometric specifications for Personal Identity Verification [electronic resource] / Patrick Grother,
Axe Federal Documents Online:Available
|
|
2012
|
|
C 13. 10 : 800- 77
|
|
|
Guide to IPsec VPNs [electronic resource] : recommendations of the National Institute of Standards an
C 13.10:800-77
;
Axe Federal Documents Online:Available
|
|
2005
|
Guide to IPsec VPNs [electronic resource] : recommendations of the National Institute of Standards an
Axe Federal Documents Online:Available
|
|
2005
|
|
C 13. 10 : 800- 78
|
|
|
Cryptographic algorithms and key sizes for personal identity verification [electronic resource] / W.
C 13.10:800-78
;
Axe Federal Documents Online:Available
|
|
2005
|
Cryptographic algorithms and key sizes for personal identity verification [electronic resource] / W.
Axe Federal Documents Online:Available
|
|
2005
|
|
C 13. 10 : 800- 78- 2
|
|
|
Cryptographic algorithms and key sizes for Personal Identity Verification [electronic resource] / W.
C 13.10:800-78-2
;
Axe Federal Documents Online:Available
|
|
2010
|
Cryptographic algorithms and key sizes for Personal Identity Verification [electronic resource] / W.
Axe Federal Documents Online:Available
|
|
2010
|
|
C 13. 10 : 800- 79- 1
|
|
|
Guidelines for the accreditation of personal identity verification card issuers [electronic resource]
C 13.10:800-79-1
;
Axe Federal Documents Online:Available
|
|
2008
|
Guidelines for the accreditation of personal identity verification card issuers [electronic resource]
Axe Federal Documents Online:Available
|
|
2008
|
|
C 13. 10 : 800- 80/Draft
|
|
|
Guide for developing performance metrics for information security [electronic resource] : recommendat
C 13.10:800-80/DRAFT
;
Axe Federal Documents Online:Available
|
|
2006
|
Guide for developing performance metrics for information security [electronic resource] : recommendat
Axe Federal Documents Online:Available
|
|
2006
|
|
C 13. 10 : 800- 81r 1
|
|
|
Secure Domain Name System (DNS) deployment guide [electronic resource] : recommendations of the Natio
C 13.10:800-81 R 1
;
Axe Federal Documents Online:Available
|
|
2010
|
Secure Domain Name System (DNS) deployment guide [electronic resource] : recommendations of the Natio
Axe Federal Documents Online:Available
|
|
2010
|
|
C 13. 10 : 800- 82/Draft/Final
|
|
|
Guide to Industrial Control Systems (ICS) security : Supervisory Control and Data Acquisition (SCADA)
C 13.10:800-82/DRAFT/FINAL
;
Axe Federal Documents Online:Available
|
|
2008
|
Guide to Industrial Control Systems (ICS) security : Supervisory Control and Data Acquisition (SCADA)
Axe Federal Documents Online:Available
|
|
2008
|
|
C 13. 10 : 800- 82/Draft/Rev.
|
|
|
Guide to Industrial Control Systems (ICS) security : Supervisory Control and Data Acquisition (SCADA)
C 13.10:800-82/DRAFT/REV.
;
Axe Federal Documents Online:Available
|
|
2007
|
Guide to Industrial Control Systems (ICS) security : Supervisory Control and Data Acquisition (SCADA)
Axe Federal Documents Online:Available
|
|
2007
|
|
C 13. 10 : 800- 83
|
|
|
Guide to Malware incident prevention and handling [electronic resource] / Peter Mell, Karen Kent, Jos
C 13.10:800-83
;
Axe Federal Documents Online:Available
|
|
2005
|
Guide to Malware incident prevention and handling [electronic resource] / Peter Mell, Karen Kent, Jos
Axe Federal Documents Online:Available
|
|
2005
|
|
C 13. 10 : 800- 84
|
|
|
Guide to test, training, and exercise programs for IT plans and capabilities [electronic resource] :
C 13.10:800-84
;
Axe Federal Documents Online:Available
|
|
2006
|
Guide to test, training, and exercise programs for IT plans and capabilities [electronic resource] :
Axe Federal Documents Online:Available
|
|
2006
|
|
C 13. 10 : 800- 85a
|
|
|
PIV card application and middleware interface test guidelines (SP800-73 compliance) [electronic resou
C 13.10:800-85 A
;
Axe Federal Documents Online:Available
|
|
2006
|
PIV card application and middleware interface test guidelines (SP800-73 compliance) [electronic resou
Axe Federal Documents Online:Available
|
|
2006
|
|
C 13. 10 : 800- 85a- 1
|
|
|
PIV card application and middleware interface test guidelines (SP 800-73-2 compliance) [electronic re
C 13.10:800-85 A-1
;
Axe Federal Documents Online:Available
|
|
2009
|
PIV card application and middleware interface test guidelines (SP 800-73-2 compliance) [electronic re
Axe Federal Documents Online:Available
|
|
2009
|
|
C 13. 10 : 800- 85a- 2
|
|
|
PIV card application and middleware interface test guidelines (SP 800-73-3 compliance) [electronic re
C 13.10:800-85 A-2
;
Axe Federal Documents Online:Available
|
|
2010
|
PIV card application and middleware interface test guidelines (SP 800-73-3 compliance) [electronic re
Axe Federal Documents Online:Available
|
|
2010
|
|
C 13. 10 : 800- 85b- 1/Draft
|
|
|
PIV data model test guidelines [electronic resource] / Ramaswamy Chandramouli ... [et al.].
C 13.10:800-85 B-1/DRAFT
;
Axe Federal Documents Online:Available
|
|
2009
|
PIV data model test guidelines [electronic resource] / Ramaswamy Chandramouli ... [et al.].
Axe Federal Documents Online:Available
|
|
2009
|
|
C 13. 10 : 800- 86
|
|
|
Guide to integrating forensic techniques into incident response [electronic resource] : recommendatio
C 13.10:800-86
;
Axe Federal Documents Online:Available
|
|
2006
|
Guide to integrating forensic techniques into incident response [electronic resource] : recommendatio
Axe Federal Documents Online:Available
|
|
2006
|
|
C 13. 10 : 800- 87/Rev. 1/ 2008
|
|
|
Codes for identification of federal and federally-assisted organizations [electronic resource] / Will
C 13.10:800-87/REV.1/2008
;
Axe Federal Documents Online:Available
|
|
2008
|
Codes for identification of federal and federally-assisted organizations [electronic resource] / Will
Axe Federal Documents Online:Available
|
|
2008
|
|
C 13. 10 : 800- 89
|
|
|
Recommendation for obtaining assurances for digital signature applications [electronic resource] / El
C 13.10:800-89
;
Axe Federal Documents Online:Available
|
|
2006
|
Recommendation for obtaining assurances for digital signature applications [electronic resource] / El
Axe Federal Documents Online:Available
|
|
2006
|
|
C 13. 10 : 800- 90
|
|
|
Recommendation for random number generation using deterministic random bit generators [electronic res
C 13.10:800-90
;
Axe Federal Documents Online:Available
|
|
2006
|
Recommendation for random number generation using deterministic random bit generators [electronic res
Axe Federal Documents Online:Available
|
|
2006
|
|
C 13. 10 : 800- 90/Rev.
|
|
|
Recommendation for random number generation using deterministic random bit generators (revised) / Ela
C 13.10:800-90/REV.
;
Axe Federal Documents Online:Available
|
|
2007
|
Recommendation for random number generation using deterministic random bit generators (revised) / Ela
Axe Federal Documents Online:Available
|
|
2007
|
|
C 13. 10 : 800- 90b/Draft
|
|
|
Recommendation for the entropy sources used for random bit generator [electronic resource] / Elaine B
C 13.10:800-90 B/DRAFT
;
Axe Federal Documents Online:Available
|
|
2012
|
Recommendation for the entropy sources used for random bit generator [electronic resource] / Elaine B
Axe Federal Documents Online:Available
|
|
2012
|
|
C 13. 10 : 800- 90c/Draft
|
|
|
Recommendation for random bit generator (RBG) constructions [electronic resource] / Elaine Barker, Jo
C 13.10:800-90 C/DRAFT
;
Axe Federal Documents Online:Available
|
|
2012
|
Recommendation for random bit generator (RBG) constructions [electronic resource] / Elaine Barker, Jo
Axe Federal Documents Online:Available
|
|
2012
|
|
C 13. 10 : 800- 92
|
|
|
Guide to computer security log management [electronic resource] : recommendations of the National Ins
C 13.10:800-92
;
Axe Federal Documents Online:Available
|
|
2006
|
Guide to computer security log management [electronic resource] : recommendations of the National Ins
Axe Federal Documents Online:Available
|
|
2006
|
|
C 13. 10 : 800- 94
|
|
|
Guide to intrusion detection and prevention systems (IDPS) [electronic resource] : recommendations of
C 13.10:800-94
;
Axe Federal Documents Online:Available
|
|
2007
|
Guide to intrusion detection and prevention systems (IDPS) [electronic resource] : recommendations of
Axe Federal Documents Online:Available
|
|
2007
|
|
C 13. 10 : 800- 96
|
|
|
PIV card to reader interoperability guidelines [electronic resource] / James F. Dray ... [et al.].
C 13.10:800-96
;
Axe Federal Documents Online:Available
|
|
2006
|
PIV card to reader interoperability guidelines [electronic resource] / James F. Dray ... [et al.].
Axe Federal Documents Online:Available
|
|
2006
|
|
C 13. 10 : 800- 97
|
|
|
Establishing wireless robust security networks [electronic resource] : a guide to IEEE 802.11i : reco
C 13.10:800-97
;
Axe Federal Documents Online:Available
|
|
2007
|
Establishing wireless robust security networks [electronic resource] : a guide to IEEE 802.11i : reco
Axe Federal Documents Online:Available
|
|
2007
|
|
C 13. 10 : 800- 98
|
|
|
Guidelines for securing radio frequency identification (RFID) systems [electronic resource] : recomme
C 13.10:800-98
;
Axe Federal Documents Online:Available
|
|
2007
|
Guidelines for securing radio frequency identification (RFID) systems [electronic resource] : recomme
Axe Federal Documents Online:Available
|
|
2007
|
|
C 13. 10 : 800- 100
|
|
|
Information security handbook [electronic resource] : a guide for managers / Pauline Bowen, Joan Hash
C 13.10:800-100
;
Axe Federal Documents Online:Available
|
|
2006
|
Information security handbook [electronic resource] : a guide for managers / Pauline Bowen, Joan Hash
Axe Federal Documents Online:Available
|
|
2006
|
|
C 13. 10 : 800- 101
|
|
|
Guidelines on cell phone forensics [electronic resource] : recommendations of the National Institute
C 13.10:800-101
;
Axe Federal Documents Online:Available
|
|
2007
|
Guidelines on cell phone forensics [electronic resource] : recommendations of the National Institute
Axe Federal Documents Online:Available
|
|
2007
|
|
C 13. 10 : 800- 102
|
|
|
Recommendation for digital signature timeliness [electronic resource] / Elaine Barker.
C 13.10:800-102
;
Axe Federal Documents Online:Available
|
|
2009
|
Recommendation for digital signature timeliness [electronic resource] / Elaine Barker.
Axe Federal Documents Online:Available
|
|
2009
|
|
C 13. 10 : 800- 103/Draft/Pt. 1-
|
|
|
An ontology of identity credentials [electronic resource] / William MacGregor, William Dutcher, Jamil
C 13.10:800-103/DRAFT/PT.1-
;
Axe Federal Documents Online:Available
|
|
2006
|
An ontology of identity credentials [electronic resource] / William MacGregor, William Dutcher, Jamil
Axe Federal Documents Online:Available
|
|
2006
|
|
C 13. 10 : 800- 106
|
|
|
Randomized hashing for digital signatures [electronic resource] / Quynh Dang.
C 13.10:800-106
;
Axe Federal Documents Online:Available
|
|
2009
|
Randomized hashing for digital signatures [electronic resource] / Quynh Dang.
Axe Federal Documents Online:Available
|
|
2009
|
|
C 13. 10 : 800- 107
|
|
|
Recommendation for applications using approved hash algorithms [electronic resource] / Quynh Dang.
C 13.10:800-107
;
Axe Federal Documents Online:Available
|
|
2009
|
Recommendation for applications using approved hash algorithms [electronic resource] / Quynh Dang.
Axe Federal Documents Online:Available
|
|
2009
|
|
C 13. 10 : 800- 108/Rev.
|
|
|
Recommendation for key derivation using pseudorandom functions (revised) [electronic resource] / Lily
C 13.10:800-108/REV.
;
Axe Federal Documents Online:Available
|
|
2009
|
Recommendation for key derivation using pseudorandom functions (revised) [electronic resource] / Lily
Axe Federal Documents Online:Available
|
|
2009
|
|
C 13. 10 : 800- 110/Draft
|
|
|
Information System Security Reference Data Model [electronic resource] / Elizabeth Chew, Keven Stine,
C 13.10:800-110/DRAFT
;
Axe Federal Documents Online:Available
|
|
2007
|
Information System Security Reference Data Model [electronic resource] / Elizabeth Chew, Keven Stine,
Axe Federal Documents Online:Available
|
|
2007
|
|
C 13. 10 : 800- 111
|
|
|
Guide to storage encryption technologies for end user devices [electronic resource] / Karen Scarfone,
C 13.10:800-111
;
Axe Federal Documents Online:Available
|
|
2007
|
Guide to storage encryption technologies for end user devices [electronic resource] / Karen Scarfone,
Axe Federal Documents Online:Available
|
|
2007
|
|
C 13. 10 : 800- 113
|
|
|
Guide to SSL VPNs [electronic resource] : recommendations of the National Institute of Standards and
C 13.10:800-113
;
Axe Federal Documents Online:Available
|
|
2008
|
Guide to SSL VPNs [electronic resource] : recommendations of the National Institute of Standards and
Axe Federal Documents Online:Available
|
|
2008
|
|
C 13. 10 : 800- 115
|
|
|
Technical guide to information security testing and assessment [electronic resource] : recommendation
C 13.10:800-115
;
Axe Federal Documents Online:Available
|
|
2008
|
Technical guide to information security testing and assessment [electronic resource] : recommendation
Axe Federal Documents Online:Available
|
|
2008
|
|
C 13. 10 : 800- 116
|
|
|
A recommendation for the use of PIV credentials in physical access control systems (PACS) [electronic
C 13.10:800-116
;
Axe Federal Documents Online:Available
|
|
2008
|
A recommendation for the use of PIV credentials in physical access control systems (PACS) [electronic
Axe Federal Documents Online:Available
|
|
2008
|
|
C 13. 10 : 800- 117
|
|
|
Guide to adopting and using the Security Content Automation Protocol (SCAP) version 1.0 [electronic r
C 13.10:800-117
;
Axe Federal Documents Online:Available
|
|
2010
|
Guide to adopting and using the Security Content Automation Protocol (SCAP) version 1.0 [electronic r
Axe Federal Documents Online:Available
|
|
2010
|
|
C 13. 10 : 800- 119
|
|
|
Guidelines for the secure deployment of IPv6 [electronic resource] : recommendations of the National
C 13.10:800-119
;
Axe Federal Documents Online:Available
|
|
2010
|
Guidelines for the secure deployment of IPv6 [electronic resource] : recommendations of the National
Axe Federal Documents Online:Available
|
|
2010
|
|
C 13. 10 : 800- 120
|
|
|
Recommendation for EAP methods used in wireless network access authentication [electronic resource] /
C 13.10:800-120
;
Axe Federal Documents Online:Available
|
|
2009
|
Recommendation for EAP methods used in wireless network access authentication [electronic resource] /
Axe Federal Documents Online:Available
|
|
2009
|
|
C 13. 10 : 800- 122
|
|
|
Guide to protecting the confidentiality of Personally Identifiable Information (PII) [electronic reso
C 13.10:800-122
;
Axe Federal Documents Online:Available
|
|
2010
|
Guide to protecting the confidentiality of Personally Identifiable Information (PII) [electronic reso
Axe Federal Documents Online:Available
|
|
2010
|
|
C 13. 10 : 800- 123
|
|
|
Guide to general server security [electronic resource] : recommendations of the National Institute of
C 13.10:800-123
;
Axe Federal Documents Online:Available
|
|
2008
|
Guide to general server security [electronic resource] : recommendations of the National Institute of
Axe Federal Documents Online:Available
|
|
2008
|
|
C 13. 10 : 800- 125
|
|
|
Guide to security for full virtualization technologies [electronic resource] : recommendations of the
C 13.10:800-125
;
Axe Federal Documents Online:Available
|
|
2011
|
Guide to security for full virtualization technologies [electronic resource] : recommendations of the
Axe Federal Documents Online:Available
|
|
2011
|
|
C 13. 10 : 800- 126/Rev. 1
|
|
|
The technical specification for the Security Content Automation Protocol (SCAP), SCAP version 1.1 [el
C 13.10:800-126/REV.1
;
Axe Federal Documents Online:Available
|
|
2011
|
The technical specification for the Security Content Automation Protocol (SCAP), SCAP version 1.1 [el
Axe Federal Documents Online:Available
|
|
2011
|
Add Marked to Bag
Add All On Page
|