top
Biblioteche
Info
Contattaci
Persona
Opera
Persona
Opera
Persona/Opera
Vai a Pubblicazioni
Persona/Ente/Famiglia
Espandi
Riduci
Questo autore in
Export / Download
PDF
Excel
Unimarc (binario)
Marc XML
Marc (testo)
Kent, Karen
ID:
1352442
Opere
Altre forme del nome
Kent, Karen
Kent Karen (Karen Ann)
Kent Karen
Seleziona tutte
Deseleziona
Espandi
Riduci
A-C
BIOS integrity measurements guidelines (draft)
...
Common planform enumeration
...
Common platform enumeration
...
Common platform enumeration
...
Computer security incident handling guide
...
D-E
Derived Personal Identity Verification (PIV) credentials (DPC) proof of concept research
...
F-J
Guidance for securing Microsoft Windows XP Home Edition
...
Guidance for securing Microsoft Windows XP for IT Professionals
...
Guide to Bluetooth security
...
Guide to Industrial Control Systems (ICS) security
...
Guide to Malware incident prevention and handling
...
Guide to computer security log management
...
Guide to enterprise password management (draft)
...
Guide to enterprise patch management technologies (draft)
...
Guide to enterprise telework and remote access security
...
Guide to enterprise telework and remote access security (draft)
...
Guide to general server security
...
Guide to integrating forensic techniques into incident response
...
Guide to intrusion detection and prevention systems (IDPS)
...
Guide to protecting the confidentiality of Personally Identifiable Information (PII)
...
Guide to protecting the confidentiality of Personally Identifiable Information (PII) (draft)
...
Guide to secure Web services
...
Guide to securing Microsoft Windows XP systems for IT professionals
...
Guide to securing WiMAX wireless communications
...
Guide to securing legacy IEEE 802.11 wireless networks
...
Guide to security for WiMAX technologies (draft)
...
Guide to security for full virtualization technologies
...
Guide to storage encryption technologies for end user devices (NIST special publication 800-111)
...
Guide to using vulnerability naming schemes
...
Guidelines for access control system evaluation metrics
...
Guidelines for managing and securing mobile devices in the enterprise (draft)
...
Guidelines for securing wireless local area networks (WLANs)
...
Guidelines for securing wireless local area networks (WLANs) (draft)
...
Guidelines on active content and mobile code
...
Guidelines on cell phone and PDA security
...
Guidelines on firewalls and firewall policy (draft)
...
K-O
National checklist program for IT products
...
P-T
Security of interactive and automated access management using secure shell (SSH)
...
Specification for the open checklist interactive language (OCIL) version 2.0
...
System and network security acronyms and abbreviations
...
System and network security acronyms and abbreviations (draft)
...
Technical guide to information security testing and assessment
...
The Common Misuse Scoring System (CMSS)
...
The Common Vulnerability Scoring System (CVSS) and its applicability to Federal agency systems
...
The common configuration scoring system (CCSS)
...
The technical specification for the Security Content Automation Protocol (SCAP), SCAP version 1.1
...
Trusted geolocation in the cloud
...
U-Z
User's guide to securing external devices for telework and remote access
...
User's guide to securing external devices for telework and remote access
...
Wireless network security for IEEE 802.11a
...