| |
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9910690435603321 |
|
|
Titolo |
Acquisition reform : implementation of key aspects of the Federal Acquisition Streamlining Act of 1994 : report to congressional committees |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Washington, D.C. (P.O. Box 37050, Washington, D.C. 20013) |
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
2. |
Record Nr. |
UNINA9910698307703321 |
|
|
Autore |
Kent Karen (Karen Ann) |
|
|
Titolo |
Guide to storage encryption technologies for end user devices (NIST special publication 800-111) : recommendations of the National Institute of Standards and Technology / / Karen Kent, Murugiah Souppaya, Matthew Sexton |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Gaithersburg, Md. : , : U.S. Dept. of Commerce, , 2007 |
|
|
|
|
|
|
|
Edizione |
[Draft.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (40 pages) : illustrations |
|
|
|
|
|
|
Collana |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Computer networks - Security measures - United States |
Computer security - Standards |
Data encryption (Computer science) |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Title from title screen (viewed on July 16, 2008). |
"August 2007." |
|
|
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references. |
|
|
|
|
|
|
Sommario/riassunto |
|
Many threats against end user devices, such as desktop and laptop computers, smart phones, personal digital assistants, and removable media, could cause information stored on the devices to be accessed by unauthorized parties. To prevent such disclosures of information, the information needs to be secured. This publication explains the basics |
|
|
|
|
|
|
|
|
|
|
of storage encryption, which is the process of using encryption and authentication to restrict access to and use of stored information. The appropriate storage encryption solution for a particular situation depends primarily upon the type of storage, the amount of information that needs to be protected, the environments where the storage will be located, and the threats that need to be mitigated. This publication describes three types of solutions⁰́₄full disk encryption, volume and virtual disk encryption, and file/folder encryption⁰́₄and makes recommendations for implementing and using each type. This publication also includes several use case examples, which illustrate that there are multiple ways to meet most storage encryption needs. |
|
|
|
|
|
| |