top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Foundations of a security policy for use of the National Research and Educational Network [[electronic resource] /] / Arthur E. Oldehoeft
Foundations of a security policy for use of the National Research and Educational Network [[electronic resource] /] / Arthur E. Oldehoeft
Autore Oldehoeft Arthur E
Pubbl/distr/stampa Gaithersburg, Md. : , : U.S. Dept. of Commerce, National Institute of Standards and Technology, , [1992]
Descrizione fisica viii, 47 pages : digital, PDF file
Collana NISTIR
Soggetto topico National Research and Education Network (Computer network)
Internet - Security measures
Computer networks - Security measures - United States
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910697305903321
Oldehoeft Arthur E  
Gaithersburg, Md. : , : U.S. Dept. of Commerce, National Institute of Standards and Technology, , [1992]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
The future of information security [[electronic resource] /] / by Martin Libicki
The future of information security [[electronic resource] /] / by Martin Libicki
Autore Libicki Martin C
Pubbl/distr/stampa [Washington, D.C.] : , : Institute for National Strategic Studies, , [2002?]
Soggetto topico Computer networks - Security measures - United States
Data protection - United States
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910691662903321
Libicki Martin C  
[Washington, D.C.] : , : Institute for National Strategic Studies, , [2002?]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Grizzly steppe : Russian malicious cyber activity
Grizzly steppe : Russian malicious cyber activity
Pubbl/distr/stampa [Washington, D.C.] : , : U.S. Department of Homeland Security, NCCIC : , : Department of Justice, Federal Bureau of Investigation, , 2016
Descrizione fisica 1 online resource (13 pages) : color illustrations
Soggetto topico Espionage, Russian - United States
Internet in espionage
Computer security - United States
Computer networks - Security measures - United States
Cyberterrorism - United States - Prevention
Cyberterrorism - Russia (Federation)
Hacking - Prevention
Computer crimes - Prevention
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti Grizzly steppe
Record Nr. UNINA-9910707821303321
[Washington, D.C.] : , : U.S. Department of Homeland Security, NCCIC : , : Department of Justice, Federal Bureau of Investigation, , 2016
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Guide to Bluetooth security [[electronic resource] ] : recommendations of the National Institute of Standards and Technology / / Karen Scarfone, John Padgette
Guide to Bluetooth security [[electronic resource] ] : recommendations of the National Institute of Standards and Technology / / Karen Scarfone, John Padgette
Autore Kent Karen (Karen Ann)
Edizione [Draft.]
Pubbl/distr/stampa Gaithersburg, MD : , : U.S. Dept. of Commerce, National Institute of Standards and Technology, , [2008]
Descrizione fisica 1 online resource (43 unnumbered pages) : color illustrations
Altri autori (Persone) PadgetteJohn
Collana NIST special publication ;Computer security
Soggetto topico Bluetooth technology - Security measures - Standards - Government policy - United States
Computer networks - Security measures - United States
Federal government - Computer networks - Security measures - United States
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti Guide to Bluetooth security
Record Nr. UNINA-9910699289203321
Kent Karen (Karen Ann)  
Gaithersburg, MD : , : U.S. Dept. of Commerce, National Institute of Standards and Technology, , [2008]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Guide to securing Microsoft Windows XP systems for IT professionals [[electronic resource] ] : a NIST security configuration checklist : recommendations of the National Institute of Standards and Technology / / Murugiah Souppaya, Karen Scarfone, Paul M Johnson
Guide to securing Microsoft Windows XP systems for IT professionals [[electronic resource] ] : a NIST security configuration checklist : recommendations of the National Institute of Standards and Technology / / Murugiah Souppaya, Karen Scarfone, Paul M Johnson
Autore Souppaya Murugiah
Edizione [Rev. 1, Draft.]
Pubbl/distr/stampa Gaithersburg, MD : , : Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology, , [2008]
Descrizione fisica 1 online resource (127 unnumbered pages) : illustrations (some color)
Altri autori (Persone) KentKaren (Karen Ann)
JohnsonPaul M
Collana NIST special publication
Soggetto topico Computer networks - Security measures - United States
Federal government - Computer networks - Security measures - United States
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti Guide to securing Microsoft Windows XP systems for IT professionals
Record Nr. UNINA-9910699139303321
Souppaya Murugiah  
Gaithersburg, MD : , : Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology, , [2008]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Guide to storage encryption technologies for end user devices (NIST special publication 800-111) : recommendations of the National Institute of Standards and Technology / / Karen Kent, Murugiah Souppaya, Matthew Sexton
Guide to storage encryption technologies for end user devices (NIST special publication 800-111) : recommendations of the National Institute of Standards and Technology / / Karen Kent, Murugiah Souppaya, Matthew Sexton
Autore Kent Karen (Karen Ann)
Edizione [Draft.]
Pubbl/distr/stampa Gaithersburg, Md. : , : U.S. Dept. of Commerce, , 2007
Descrizione fisica 1 online resource (40 pages) : illustrations
Disciplina 005.8
Collana NIST special publication
Soggetto topico Computer networks - Security measures - United States
Computer security - Standards
Data encryption (Computer science)
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti Guide to Storage Encryption Technologies for End User Devices
Record Nr. UNINA-9910698307703321
Kent Karen (Karen Ann)  
Gaithersburg, Md. : , : U.S. Dept. of Commerce, , 2007
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Guide to the Distributed Energy Resources Cybersecurity Framework / / Charisa Powell [and five others]
Guide to the Distributed Energy Resources Cybersecurity Framework / / Charisa Powell [and five others]
Autore Powell Charisa
Pubbl/distr/stampa Golden, CO : , : National Renewable Energy Laboratory, , December 2019
Descrizione fisica 1 online resource (viii, 39 pages) : color illustrations
Collana NREL/TP
Soggetto topico Computer security - United States
Computer networks - Security measures - United States
Energy industries - Security measures - United States
Soggetto genere / forma Technical reports.
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910713610003321
Powell Charisa  
Golden, CO : , : National Renewable Energy Laboratory, , December 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Guidelines on firewalls and firewall policy [[electronic resource] ] : recommendations of the National Institute of Standards and Technology / / John Wack, Ken Cutler, Jamie Pole
Guidelines on firewalls and firewall policy [[electronic resource] ] : recommendations of the National Institute of Standards and Technology / / John Wack, Ken Cutler, Jamie Pole
Autore Wack John P
Edizione [Rev. 1.]
Pubbl/distr/stampa Gaithersburg, MD : , : U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology
Descrizione fisica x, 64 pages : digital, PDF file
Altri autori (Persone) CutlerKen
PoleJamie
Collana NIST special publication ;Computer security
Soggetto topico Firewalls (Computer security) - Standards - United States
Federal government - Computer networks - Security measures - United States
Computer networks - Security measures - United States
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910698281803321
Wack John P  
Gaithersburg, MD : , : U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Guidelines on firewalls and firewall policy (draft) [[electronic resource] ] : recommendations of the National Institute of Standards and Technology / / Karen Scarfone, Paul Hoffman
Guidelines on firewalls and firewall policy (draft) [[electronic resource] ] : recommendations of the National Institute of Standards and Technology / / Karen Scarfone, Paul Hoffman
Autore Kent Karen (Karen Ann)
Edizione [Rev. 1, Draft.]
Pubbl/distr/stampa Gaithersburg, MD : , : U.S. Dept. of Commerce, National Institute of Standards and Technology, , [2008]
Descrizione fisica 43 unnumbered pages : digital, PDF file
Altri autori (Persone) HoffmanPaul
Collana NIST special publication ;Computer security
Soggetto topico Firewalls (Computer security) - Standards - United States
Federal government - Computer networks - Security measures - United States
Computer networks - Security measures - United States
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti Guidelines on firewalls and firewall policy
Record Nr. UNINA-9910698968903321
Kent Karen (Karen Ann)  
Gaithersburg, MD : , : U.S. Dept. of Commerce, National Institute of Standards and Technology, , [2008]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
H.R. 285 : : Department of Homeland Security Cybersecurity Enhancement Act of 2005 : hearing before the Subcommittee on Economic Security, Infrastructure Protection, and Cybersecurity of the Committee on Homeland Security, House of Representatives, One Hundred Ninth Congress, first session, April 20, 2005
H.R. 285 : : Department of Homeland Security Cybersecurity Enhancement Act of 2005 : hearing before the Subcommittee on Economic Security, Infrastructure Protection, and Cybersecurity of the Committee on Homeland Security, House of Representatives, One Hundred Ninth Congress, first session, April 20, 2005
Descrizione fisica 1 online resource (394 p.)
Soggetto topico Computer security - Law and legislation - United States
Computer networks - Security measures - United States
National security - United States
Soggetto non controllato Disaster relief
Social science
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti H.R. 285
Record Nr. UNINA-9910693916003321
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui

Data di pubblicazione

Altro...