Showing 101 - 120 results of 230 for search '"Computer security Standards."', query time: 0.07s Refine Results
  1. 101

    Trusted Computing Platforms: TCPA Technology in Context / by Pearson, Siani, Balacheff, Boris, Chen, Liqun, Plaquin, David, Proudler, Graeme

    Published 2002
    Subjects: “…Computer security Standards.…”
    Full Text (via O'Reilly/Safari)
    eBook
  2. 102

    ISO/IEC 27701:2022 : an introduction to information security and the ISMS standard / by Watkins, Steve, 1970-

    Published 2023
    Subjects: “…Computer security Standards.…”
    Streaming Audio (via Skillsoft)
    Electronic Audio
  3. 103

    ISO/IEC 27701:2022 : an introduction to information security and the ISMS standard / by Watkins, Steve, 1970-

    Published 2023
    Subjects: “…Computer security Standards.…”
    Streaming Audio (via O'Reilly/Safari)
    Electronic Audio
  4. 104

    ISO/IEC 27701:2019 : an introduction to privacy information management / by Shipman, Alan, 1946-, Watkins, Steve, 1970-

    Published 2020
    Subjects: “…Computer security Standards.…”
    Full Text (via O'Reilly/Safari)
    eBook
  5. 105

    Guidelines on PDA forensics recommendations of the National Institute of Standards and Technology / by Jansen, Wayne A.

    Published 2004
    Subjects: “…Computer security Standards United States.…”
    Online Access
    Online Access
    Online Access
    Government Document Electronic eBook
  6. 106

    Framework for Emergency Response official (ERO) authentication and authorization infrastructure by Chandramouli, Ramaswamy

    Published 2010
    Subjects:
    Online Access
    Online Access
    Government Document Electronic eBook
  7. 107

    Performance measurement guide for information security by Chew, Elizabeth

    Published 2007
    Subjects:
    Online Access
    Online Access
    Government Document Electronic eBook
  8. 108
  9. 109

    Threat assessment of malicious code and human threats by Bassham, Lawrence E.

    Published 1992
    Subjects: “…Computer security Standards. http://id.loc.gov/authorities/subjects/sh99004226.…”
    Online Access
    Online Access
    Government Document Electronic eBook
  10. 110
  11. 111

    Contingency planning guide for information technology systems : recommendations of the National Institute of Standards and Technology /

    Published 2002
    Subjects: “…Computer security Standards United States.…”
    Online Access
    Online Access
    Government Document eBook
  12. 112
  13. 113
  14. 114
  15. 115

    Recommendation for block cipher modes of operation methods and techniques / by Dworkin, Morris

    Published 2001
    Subjects: “…Computer security Standards United States.…”
    Online Access
    Online Access
    Government Document Electronic eBook
  16. 116

    Recommendation for pair-wise key establishment schemes using discrete logarithm cryptography by Barker, Elaine B.

    Published 2006
    Subjects:
    Online Access
    Online Access
    Government Document Electronic eBook
  17. 117

    Recommendation for the Triple Data Encryption Algorithm (TDEA) block cipher by Barker, William C.

    Published 2004
    Subjects:
    Online Access
    Online Access
    Government Document Electronic eBook
  18. 118

    Generally accepted principles and practices for securing information technology systems by Swanson, Marianne

    Published 1996
    Subjects:
    Online Access
    Online Access
    Government Document Electronic eBook
  19. 119

    Recommendation for the entropy sources used for random bit generator by Barker, Elaine B.

    Published 2012
    Subjects:
    Online Access
    Online Access
    Government Document Electronic eBook
  20. 120

    Recommendation for the Triple Data Encryption Algorithm (TDEA) block cipher by Barker, William C. (William Curt)

    Published 2011
    Subjects:
    Online Access
    Online Access
    Government Document Electronic eBook
Search Tools: RSS Feed Save Search