LEADER 02044nam 2200505I 450 001 9910704195703321 005 20240812220346.0 035 $a(CKB)5470000002437703 035 $a(OCoLC)929447786 035 $a(EXLCZ)995470000002437703 100 $a20151116d2015 ua 0 101 0 $aeng 135 $aurmn||||||||| 181 $2rdacontent 182 $2rdamedia 183 $2rdacarrier 200 10$aGuide to application whitelisting /$fAdam Sedgewick, Murugiah Souppaya, Karen Scarfone 210 1$aGaithersburg, MD :$cU.S. Department of Commerce, National Institute of Standards and Technology,$d2015. 215 $a1 online resource (17 pages) 225 1 $aNIST special publication ;$v800-167.$aComputer security 300 $aTitle from title screen (viewed Nov. 16, 2015). 300 $a"October 2015." 320 $aIncludes bibliographical references. 606 $aComputers$xAccess control$xStandards$zUnited States 606 $aComputers$xAccess control$xGovernment policy$zUnited States 606 $aApplication software$xStandards$zUnited States 606 $aApplication software$xGovernment policy$zUnited States 606 $aInformation technology$xSecurity measures$xStandards$zUnited States 606 $aInformation technology$xSecurity measures$xGovernment policy$zUnited States 615 0$aComputers$xAccess control$xStandards 615 0$aComputers$xAccess control$xGovernment policy 615 0$aApplication software$xStandards 615 0$aApplication software$xGovernment policy 615 0$aInformation technology$xSecurity measures$xStandards 615 0$aInformation technology$xSecurity measures$xGovernment policy 700 $aSedgewick$b A$g(Adam),$01412985 702 $aSouppaya$b Murugiah 702 $aScarfone$b Karen 712 02$aNational Institute of Standards and Technology (U.S.), 801 0$bGPO 801 1$bGPO 906 $aBOOK 912 $a9910704195703321 996 $aGuide to application whitelisting$93508240 997 $aUNINA