00974nam a22002651i 450099100394400970753620030927133207.0031111s1982 fr a||||||||||||||||fre 2070110451b12496686-39ule_instARCHE-052995ExLDip.to LingueitaA.t.i. Arché s.c.r.l. Pandora Sicilia s.r.l.843.912Grenier, Roger393626Album Camus /iconographie choisie et commentée par Roger GrenierParis :Gallimard,1982325 p. :ill. ;17 cmBibliothèque de la Pléiade.Album ;21Camus, AlbertIconografia.b1249668602-04-1413-11-03991003944009707536LE012 848.91 CAM GRE12012000160552le012-E0.00-l- 00000.i1293225513-11-03Album Camus182532UNISALENTOle01213-11-03ma -frefr 0101942oam 2200421Ia 450 991069574880332120070409093806.0(CKB)5470000002372293(OCoLC)86119263(OCoLC)713275388(EXLCZ)99547000000237229320070323d2006 ua 0engurcn|||||||||txtrdacontentcrdamediacrrdacarrierGlossary of key information security terms[electronic resource] /edited by Richard KisselRevision 1.[Gaithersburg, Md.] :U.S. Dept. of Commerce, National Institute of Standards and Technology,[2006]87 pages digital, PDF fileNISTIR ;7298Title from page [2], viewed March 6, 2007."April 25, 2006."Includes bibliographical references.We have received numerous requests to provide a summary glossary for our publications and make it available to practitioners. As a result of those requests, this glossary of basic security terms has been extracted from NIST Federal Information Processing Standards (FIPS) and the Special Publication (SP) 800 series. The terms included are not all inclusive of terms found in these publications, but are a subset of basic terms that are most frequently used. The purpose of this glossary is to provide a central resource of definitions most commonly used in NIST security publications.Computer securityTerminologyComputer securityKissel Richard1393776Kissel Richard1393776National Institute of Standards and Technology (U.S.)NBSNBSGPOBOOK9910695748803321Glossary of key information security terms3455659UNINA