Computer security incident handling guide [[electronic resource] ] : recommendations of the National Institute of Standards and Technology / / Tim Grance, Karen Kent, Brian Kim |
Autore | Grance Tim |
Edizione | [Rev. 1.] |
Pubbl/distr/stampa | [Gaithersburg, Md.] : , : U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology |
Descrizione fisica | 1 online resource (147 unnumbered pages) : illustrations (some color) |
Altri autori (Persone) |
KentKaren
KimBrian |
Collana | NIST special publication ;Computer security |
Soggetto topico |
Computer security - United States
Computer networks - Security measures - United States |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti | Computer security incident handling guide |
Record Nr. | UNINA-9910693089603321 |
Grance Tim
![]() |
||
[Gaithersburg, Md.] : , : U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Guidance for securing Microsoft Windows XP for IT Professionals : a NIST security configuration checklist : recommendations of the National Institute of Standards and Technology / / Murugia Souppaya, Karen Kent, Paul M. Johnson |
Autore | Souppaya Murugiah |
Pubbl/distr/stampa | Gaithersburg, MD : , : U.S. Dept. of Commerce, National Institute of Standards and Technology, , 2005 |
Descrizione fisica | 1 online resource |
Altri autori (Persone) |
JohnsonPaul M
KentKaren |
Collana | NIST special publication |
Soggetto non controllato |
Anti-virus
Authentication Computer security COTS Encryption Firewall Hardening IPsec Lockdown Malware Microsoft Operating system Security checklist Security configuration Security controls Security policy Security templates Spyware Threats W |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti | Guidance for securing Microsoft Windows XP for IT Professionals |
Record Nr. | UNINA-9910711179703321 |
Souppaya Murugiah
![]() |
||
Gaithersburg, MD : , : U.S. Dept. of Commerce, National Institute of Standards and Technology, , 2005 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Guidance for securing Microsoft Windows XP Home Edition [[electronic resource] ] : a NIST security configuration checklist : recommendations of the National Institute of Standards and Technology / / Karen Kent, Murugiah Souppaya, John Connor |
Pubbl/distr/stampa | [Gaithersburg, Md.] : , : U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, , [2006] |
Descrizione fisica | 1 online resource (175 unnumbered pages) : illustrations |
Altri autori (Persone) |
KentKaren
SouppayaMurugiah ConnorJohn (Of Booz Allen Hamilton) |
Collana | NIST special publication.Computer security |
Soggetto topico |
Computer security - Standards
Microsoft software - Security measures |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti | Guidance for securing Microsoft Windows XP Home Edition |
Record Nr. | UNINA-9910700820603321 |
[Gaithersburg, Md.] : , : U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, , [2006] | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Guide to computer security log management [[electronic resource] ] : recommendations of the National Institute of Standards and Technology / / Murugiah Souppaya, Karen Kent |
Autore | Souppaya Murugiah |
Edizione | [Draft.] |
Pubbl/distr/stampa | Gaithersburg, MD : , : U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, , [2006] |
Descrizione fisica | 1 volume (various pagings) : digital, PDF file |
Altri autori (Persone) | KentKaren |
Collana | NIST special publication ;Computer security |
Soggetto topico |
Logbooks - Management
Computer security - Standards - United States |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti | Guide to computer security log management |
Record Nr. | UNINA-9910695285203321 |
Souppaya Murugiah
![]() |
||
Gaithersburg, MD : , : U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, , [2006] | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Guide to Malware incident prevention and handling [[electronic resource] /] / Peter Mell, Karen Kent, Joseph Nusbaum |
Autore | Mell Peter |
Pubbl/distr/stampa | Gaithersburg, MD : , : U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, , [2005] |
Descrizione fisica | 101 unnumbered pages : digital, PDF file |
Altri autori (Persone) |
KentKaren
NusbaumJoseph |
Collana | Special publication. |
Soggetto topico |
Computer security
Computer viruses Spyware (Computer software) |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910695198303321 |
Mell Peter
![]() |
||
Gaithersburg, MD : , : U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, , [2005] | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|