LEADER 01719nam 2200433Ia 450 001 9910696807903321 005 20230902161609.0 035 $a(CKB)5470000002382807 035 $a(OCoLC)471457917 035 $a(OCoLC)516352778 035 $a(EXLCZ)995470000002382807 100 $a20091130d2008 ua 0 101 0 $aeng 135 $aurmn||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aRecommendation for applications using approved hash algorithms$b[electronic resource] /$fQuynh Dang 205 $aDraft. 210 1$aGaithersburg, MD :$cU.S. Dept. of Commerce, National Institute of Standards and Technology,$d[2008] 215 $a1 online resource (iii, 17 pages) 225 1 $aNIST special publication ;$v800-107.$aComputer security 300 $aTitle from PDF title screen (NIST, viewed June 17, 2009). 300 $a"July 2008." 320 $aIncludes bibliographical references. 410 0$aNIST special publication ;$v800-107. 410 0$aNIST special publication.$pComputer security. 606 $aSoftware configuration management$xStandards$xGovernment policy$zUnited States 606 $aFederal government$xComputer networks$xSecurity measures$zUnited States 615 0$aSoftware configuration management$xStandards$xGovernment policy 615 0$aFederal government$xComputer networks$xSecurity measures 700 $aDang$b Quynh$01399435 712 02$aNational Institute of Standards and Technology (U.S.) 801 0$bGPO 801 1$bGPO 906 $aBOOK 912 $a9910696807903321 996 $aRecommendation for applications using approved hash algorithms$93473513 997 $aUNINA