LEADER 02635aam 2200493I 450 001 9910711180703321 005 20151105023937.0 024 8 $aGOVPUB-C13-e1a8f04b2799939a3c918087ba430db4 035 $a(CKB)5470000002480201 035 $a(OCoLC)927737176 035 $a(EXLCZ)995470000002480201 100 $a20151105d1992 ua 0 101 0 $aeng 181 $2rdacontent 182 $2rdamedia 183 $2rdacarrier 200 10$aComputer security considerations in federal procurements $ea guide for procurement initiators, contracting officers, and computer security officials /$fBarbara Guttman 210 1$aGaithersburg, MD :$cU.S. Dept. of Commerce, National Institute of Standards and Technology,$d1992. 215 $a1 online resource 225 1 $aNIST special publication ;$v800-4 300 $a1992. 300 $aContributed record: Metadata reviewed, not verified. Some fields updated by batch processes. 300 $aSuperseded by NIST Special Publication 800-64. 300 $aTitle from PDF title page. 320 $aIncludes bibliographical references. 330 3 $aThis NIST Special Publication provides guidance for federal procurement initiators, contracting officers, and computer security officials on including computer security in acquisitions. To accomplish this goal, computer security and federal information processing (FIP) procurement must be integrated. Computer security is the protection of the integrity, availability and confidentiality of automated information and the resources used to enter, store, process, and communicate the information. Computer security shares properties with systems/software engineering including trustworthiness, system safety, and reliability. FIP procurement is the process of acquiring hardware, software, firmware, computer-related services and telecommunications. FIP procurement begins with the process of determining needs and ends with contract completion. 517 $aComputer security considerations in federal procurements 610 $aAcquisition 610 $aAssurance 610 $aComputer security 610 $aProcurement 610 $aRequirements analysis 610 $aRisk analysis 610 $aSpecifications 700 $aGuttman$b Barbara$01382130 701 $aGuttman$b Barbara$01382130 712 02$aNational Institute of Standards and Technology (U.S.).$bComputer Security Division. 801 0$bNBS 801 1$bNBS 801 2$bGPO 906 $aBOOK 912 $a9910711180703321 996 $aComputer security considerations in federal procurements$93498942 997 $aUNINA