Suggested Topics within your search.
Suggested Topics within your search.
- Standards 228
- Computer security 223
- Security measures 78
- Computer networks 52
- Data protection 48
- Data encryption (Computer science) 37
- Government policy 33
- Information technology 27
- Access control 24
- Management 19
- Federal government 13
- Computers 12
- Data processing 12
- Software configuration management 12
- Cryptography 10
- Privacy, Right of 8
- Digital signatures 7
- Confidential communications 6
- Public key infrastructure (Computer security) 6
- Administrative agencies 5
- Electronic data processing departments 5
- Electronic information resources 5
- Evaluation 5
- Information storage and retrieval systems 5
- Law and legislation 5
- Passwords 5
- Prevention 5
- Programming languages (Electronic computers) 5
- United States 5
- Authentication 4
-
1
ISO/IEC 38500 : a pocket guide /
Published 2019Subjects: “…Computer security Standards.…”
Full Text (via Skillsoft)
Electronic eBook -
2
ISO/IEC 38500 : a pocket guide /
Published 2019Subjects: “…Computer security Standards.…”
Full Text (via O'Reilly/Safari)
eBook -
3
The Cybersecurity Maturity Model Certification (CMMC) : a Pocket Guide /
Published 2020Subjects: Full Text (via Skillsoft)
Electronic eBook -
4
Trust model for security automation data 1.0 (TMSAD)
Published 2011Subjects: “…Computer security Standards United States.…”
Online Access
Online Access
Government Document Electronic eBook -
5
Trust model for security automation data 1.0 (TMSAD) (draft)
Published 2011Subjects: “…Computer security Standards United States.…”
Online Access
Online Access
Government Document Electronic eBook -
6
The Cybersecurity Maturity Model Certification (CMMC) : a Pocket Guide /
Published 2020Subjects: Full Text (via O'Reilly/Safari)
eBook -
7
Using the common criteria for IT security evaluation /
Published 2003Subjects: Full Text (via Taylor & Francis)
eBook -
8
Security standardisation research : second International Conference, SSR 2015, Tokyo, Japan, December 15-16, 2015 : proceedings /
Published 2015Subjects: “…Computer security Standards Congresses.…”
Full Text (via Springer)
Conference Proceeding eBook -
9
Pattern and security requirements : engineering-based establishment of security standards /
Published 2015Subjects: Full Text (via Springer)
eBook -
10
ISO27001/ISO27002 : a pocket guide /
Published 2013Subjects: “…Computer security Standards.…”
Full Text (via O'Reilly/Safari)
eBook -
11
A report on the Privilege (Access) Management Workshop /
Published 2010Subjects: “…Computer security Standards United States Congresses.…”
Online Access
Online Access
Government Document Conference Proceeding eBook -
12
-
13
-
14
Information security risk management for ISO 27001/ISO 27002 /
Published 2019Subjects: Full Text (via Skillsoft)
Electronic eBook -
15
ISO 9001 : 2015 : a pocket guide /
Published 2016Subjects: Full Text (via Skillsoft)
Electronic eBook -
16
Nine steps to success : an ISO 27001:2013 implementation overview /
Published 2016Subjects: Full Text (via Skillsoft)
Electronic eBook -
17
Guide to computer security log management recommendations of the National Institute of Standards and Technology /
Published 2006Subjects: Connect to online resource
Connect to online resource
Government Document Electronic eBook -
18
Guide to computer security log management recommendations of the National Institute of Standards and Technology /
Published 2006Subjects: Online Access
Online Access
Government Document Electronic eBook -
19
An Introduction to information security and ISO27001:2013 : a pocket guide /
Published 2013Subjects: “…Computer security Standards.…”
Full Text (via O'Reilly/Safari)
eBook -
20
The Cybersecurity Maturity Model Certification (CMMC) : a Pocket Guide /
Published 2020Subjects: Full Text (via Knovel)
eBook