Effective cybersecurity : understanding and using standards and best practices /Author: Stallings, William,
Publisher: Upper Saddle River, NJ : Addison-Wesley,
Date: [2019] This title can be found in 1 Iowa libraries.
Implementing the ISO/IEC 27001 ISMS standard /Author: Humphreys, Ted,
Publisher: Boston Artech House,
Date: [2016] This title can be found in 1 Iowa libraries.
Practical guide to tpm 2.0 : using the trusted platform module in the new age of security.Author: Arthur, Will.
Publisher: [S.l.] : Apress,
Date: 2015. This title can be found in 1 Iowa libraries.
Data breach and encryption handbook /Publisher: Chicago, Ill. : American Bar Association, Section of Science & Technology Law,
Date: [2011] This title can be found in 1 Iowa libraries.
Cryptographic key management workshop summary, June 8-9, 2009Format: [electronic resource] /
Author: Barker, Elaine B.
Publisher: Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology,
Date: [2010] This title can be found in 1 Iowa libraries.
Digital Signature Standard (DSS)Format: [electronic resource].
Publisher: Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology,
Date: [2009] This title can be found in 1 Iowa libraries.
The technical specification for the Security Content Automation Protocol (SCAP) recommendations of the National Institute of Standards and Technology /Format: [electronic resource] :
Author: Johnson, Christopher
Publisher: Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology,
Date: [2009] This title can be found in 1 Iowa libraries.
Recommendation for block cipher modes of operation the XTS-AES mode for confidentiality on block-oriented storage devices /Format: [electronic resource] :
Author: Dworkin, Morris.
Publisher: [Gaithersburg, Md.] : National Institute of Standards and Technology, Technology Administration, U.S. Dept. of Commerce,
Date: [2009] This title can be found in 1 Iowa libraries.
Security Content Automation Protocol (SCAP) version 1.0 validation program test requirements (draft)Format: [electronic resource] /
Author: Mell, Peter.
Publisher: Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology,
Date: [2009] This title can be found in 1 Iowa libraries.
Guidelines on firewalls and firewall policy recommendations of the National Institute of Standards and Technology /Format: [electronic resource] :
Author: Kent, Karen
Publisher: Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology,
Date: [2009] This title can be found in 1 Iowa libraries.
Cryptographic key management workshop summary, June 8-9, 2009 (draft)Format: [electronic resource] /
Author: Barker, Elaine B.
Publisher: Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology,
Date: [2009] This title can be found in 1 Iowa libraries.
Recommended security controls for federal information systems and organizationsFormat: [electronic resource] /
Author: Ross, Ron.
Publisher: [Gaithersburg, MD] : U.S. Dept. of Commerce, National Institute of Standards and Technology,
Date: [2009] This title can be found in 1 Iowa libraries.
An introductory resource guide for implementing the Health Insurance Portability and Accountability Act (HIPAA) Security RuleFormat: [electronic resource] /
Author: Scholl, Matthew.
Publisher: Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology,
Date: [2008] This title can be found in 1 Iowa libraries.
Digital Signature Standard (DSS)Format: [electronic resource].
Publisher: Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology,
Date: [2008] This title can be found in 1 Iowa libraries.
Guidelines on firewalls and firewall policy (draft) recommendations of the National Institute of Standards and Technology /Format: [electronic resource] :
Author: Kent, Karen
Publisher: Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology,
Date: [2008] This title can be found in 1 Iowa libraries.
Guide for assessing the security controls in federal information systems building effective security assessment plans /Format: [electronic resource] :
Author: Ross, Ron
Publisher: Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology,
Date: [2007] This title can be found in 1 Iowa libraries.
Guidelines on active content and mobile code recommendations of the National Institute of Standards and Technology /Format: [electronic resource] :
Author: Jansen, Wayne A.
Publisher: Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology,
Date: [2007] This title can be found in 1 Iowa libraries.
User's guide to securing external devices for telework and remote access recommendations of the National Institute of Standards and Technology /Format: [electronic resource] :
Author: Kent, Karen
Publisher: Gaithersburg, MD : U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology,
Date: [2007] This title can be found in 1 Iowa libraries.
Performance measurement guide for information securityFormat: [electronic resource] /
Author: Chew, Elizabeth.
Publisher: Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology,
Date: [2007] This title can be found in 1 Iowa libraries.
User's guide to securing external devices for telework and remote access recommendations of the National Institute of Standards and Technology /Format: [electronic resource] :
Author: Kent, Karen
Publisher: Gaithersburg, MD : U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology,
Date: [2007] This title can be found in 1 Iowa libraries.
This resource is supported by the Institute of Museum and Library Services under the provisions of the Library Services and Technology Act as administered by State Library of Iowa.