Showing 1 - 20 results of 168 for search '"Computer security."', query time: 0.06s Refine Results
  1. 1

    Guide to Industrial Control Systems (ICS) security Supervisory Control and Data Acquisition (SCADA) systems, Distributed Control systems (DCS), and other control system configurati...

    Published 2011
    Subjects: “…Computer security Industrial applications United States.…”
    Online Access
    Government Document Electronic eBook
  2. 2

    Guide to Industrial Control Systems (ICS) security Supervisory Control and Data Acquisition (SCADA) systems, Distributed Control Systems (DCS), and other control system configurati... by Stouffer, Keith

    Published 2007
    Subjects: “…Computer security Industrial applications United States.…”
    Online Access
    Online Access
    Government Document Electronic eBook
  3. 3

    Guide to Industrial Control Systems (ICS) security Supervisory Control and Data Acquisition (SCADA) systems, Distributed Control Systems (DCS), and other control system configurati... by Stouffer, Keith

    Published 2008
    Subjects: “…Computer security Industrial applications United States.…”
    Online Access
    Online Access
    Government Document Electronic eBook
  4. 4

    Bibliography of selected computer security publications, January 1980-October 1989 computer security /

    Published 1990
    Subjects: “…Computer security Bibliography.…”
    Government Document Microfilm Book
  5. 5

    Security metrics guide for information technology systems /

    Published 2003
    Subjects: “…Computer security.…”
    Online Access
    Online Access
    Government Document eBook
  6. 6

    Computer security training guidelines by Todd, Mary Anne

    Published 1989
    Subjects: “…Computer security Study and teaching United States.…”
    Government Document Microfilm Book
  7. 7
  8. 8
  9. 9

    Risk management guide for information technology systems : recommendations of the National Institute of Standards and Technology / by Stoneburner, Gary

    Published 2002
    Subjects: “…Computer security Standards United States.…”
    Connect to online resource
    Online Access
    Government Document eBook
  10. 10

    Recommendation for block cipher modes of operation methods for key wrapping / by Dworkin, Morris

    Published 2011
    Subjects:
    Online Access
    Online Access
    Government Document Electronic eBook
  11. 11
  12. 12

    Managing information security risk organization, mission, and information system view /

    Published 2011
    Subjects: “…Computer security Government policy United States. http:…”
    Online Access
    Online Access
    Government Document Electronic eBook
  13. 13

    Computer security incident handling guide : recommendations of the National Institute of Standards and Technology / by Grance, Tim

    Published 2004
    Subjects: “…Computer security United States.…”
    Online Access
    Online Access
    Government Document eBook
  14. 14

    Security recommendations for hypervisor deployment / by Chandramouli, Ramaswamy

    Published 2014
    Subjects: “…Computer security Standards United States.…”
    Online Access
    Online Access
    Government Document eBook
  15. 15

    Recommendation for obtaining assurances for digital signature applications by Barker, Elaine B.

    Published 2006
    Subjects:
    Connect to online resource
    Connect to online resource
    Government Document Electronic eBook
  16. 16

    Networks of 'things' / by Voas, Jeffrey, 1963-

    Published 2016
    Subjects: “…Computer security. http://id.loc.gov/authorities/subjects/sh90001862.…”
    Online Access
    Government Document eBook
  17. 17

    Recommendation for obtaining assurances for digital signature applications by Barker, Elaine B.

    Published 2006
    Subjects:
    Online Access
    Online Access
    Government Document Electronic eBook
  18. 18

    Establishing a computer security incident response capability (CSIRC) by Wack, John P.

    Published 1991
    Subjects: “…Computer security. http://id.loc.gov/authorities/subjects/sh90001862.…”
    Government Document Microfilm Book
  19. 19

    Recommendation for pair-wise key establishment schemes using integer factorization cryptography

    Published 2009
    Subjects:
    Connect to online resource
    Connect to online resource
    Government Document Electronic eBook
  20. 20
Search Tools: RSS Feed Save Search