LEADER 01858nam 2200469zu 450 001 9910376601403321 005 20210807005226.0 010 $a1-4503-3447-4 035 $a(CKB)3780000000084890 035 $a(SSID)ssj0001664132 035 $a(PQKBManifestationID)16449053 035 $a(PQKBTitleCode)TC0001664132 035 $a(PQKBWorkID)14995216 035 $a(PQKB)10175833 035 $a(WaSeSS)IndRDA00054076 035 $a(Association for Computing Machinery)10.1145/2732516 035 $a(EXLCZ)993780000000084890 100 $a20160829d2015 uy 101 0 $aeng 135 $aur||||||||||| 181 $ctxt 182 $cc 183 $acr 200 00$aSCC '15 : proceedings of the 3rd ACM International Workshop on Security in Cloud Computing : April 14, 2015, Singapore 210 31$a[Place of publication not identified]$cACM$d2015 215 $a1 online resource (82 pages) 225 1 $aACM Conferences 300 $aBibliographic Level Mode of Issuance: Monograph 410 0$aACM Conferences 517 1 $aSecurity in Cloud Computing '15 :$eproceedings of the 3rd Association for Computing Machinery International Workshop on Security in Cloud Computing : April 14, 2015, Singapore 517 1 $aProceedings of the 3rd International Workshop on Security in Cloud Computing 606 $aComputer Science$2HILCC 606 $aEngineering & Applied Sciences$2HILCC 615 7$aComputer Science 615 7$aEngineering & Applied Sciences 700 $aBao$b Feng$0851645 712 02$aAssociation for Computing Machinery Special Interest Group on Security, Audit, and Control, 801 0$bPQKB 906 $aBOOK 912 $a9910376601403321 996 $aSCC '15 : proceedings of the 3rd ACM International Workshop on Security in Cloud Computing : April 14, 2015, Singapore$92237952 997 $aUNINA LEADER 02063nam 2200481 a 450 001 9910699288603321 005 20260122175956.0 035 $a(CKB)5470000002401016 035 $a(OCoLC)471462740 035 $a(EXLCZ)995470000002401016 100 $a20091130d2009 ua 0 101 0 $aeng 135 $aurmn||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aGuide to enterprise telework and remote access security (draft) $erecommendations of the National Institute of Standards and Technology /$fKaren Scarfone, Paul Hoffman, Murugiah Souppaya 205 $aRev. 1., Draft. 210 1$aGaithersburg, MD :$cU.S. Dept. of Commerce, National Institute of Standards and Technology,$d[2009] 215 $a1 online resource (41 unnumbered pages) $ccolor illustrations 225 1 $aNIST special publication ;$v800-46.$aComputer security 300 $aTitle from PDF title screen (NIST, viewed June 23, 2009). 300 $a"February 2009." 320 $aIncludes bibliographical references. 410 0$aNIST special publication ;$v800-46. 410 0$aNIST special publication.$pComputer security. 517 $aGuide to enterprise telework and remote access security 606 $aTelecommuting$xSecurity measures$xStandards$xGovernment policy$zUnited States 606 $aComputer security$xStandards$xGovernment policy$zUnited States 606 $aComputer networks$xSecurity measures 615 0$aTelecommuting$xSecurity measures$xStandards$xGovernment policy 615 0$aComputer security$xStandards$xGovernment policy 615 0$aComputer networks$xSecurity measures. 700 $aScarfone$b Karen$01764277 701 $aHoffman$b Paul$f1957-$0319229 701 $aSouppaya$b Murugiah$01352527 712 02$aNational Institute of Standards and Technology (U.S.) 801 0$bGPO 801 1$bGPO 906 $aBOOK 912 $a9910699288603321 996 $aGuide to enterprise telework and remote access security (draft)$94529823 997 $aUNINA