NIST special publication, Information security
Resource Information
The series NIST special publication, Information security represents a set of related resources, especially of a specified kind, found in San Francisco Public Library.
The Resource
NIST special publication, Information security
Resource Information
The series NIST special publication, Information security represents a set of related resources, especially of a specified kind, found in San Francisco Public Library.
- Label
- NIST special publication, Information security
- Title part
- Information security
37 Items in the Series NIST special publication, Information security
Context
Context of NIST special publication, Information securityMembers
No resources found
No enriched resources found
- Security considerations in the system development life cycle
- A recommendation for the use of PIV credentials in physical access control systems (PACS)
- A scheme for PIV visual card topography
- An introductory resource guide for implementing the Health Insurance Portability and Accountability Act (HIPAA) Security Rule
- An ontology of identity credentials
- Biometric data specification for Personal Identity Verification
- Biometric data specification for Personal Identity Verification
- Biometric specifications for Personal Identity Verification
- Biometric specifications for Personal Identity Verification
- Codes for identification of federal and federally-assisted organizations
- Cryptographic algorithms and key sizes for Personal Identity Verification
- Cryptographic algorithms and key sizes for Personal Identity Verification
- Electronic authentication guideline : recommendations of the National Institute of Standards and Technology
- Guide for applying the risk management framework to federal information systems : a security life cycle approach
- Guide for assessing the security controls in federal information systems : building effective security assessment plans
- Guide for conducting risk assessments
- Guide for mapping types of information and information systems to security categories
- Guide for security configuration management of information systems : initial public draft
- Guide for security-focused configuration management of information systems
- Guidelines for the accreditation of personal identity verification card issuers
- Information System Security Reference Data Model
- Information security continuous monitoring (ISCM) for federal information systems and organizations
- Information security handbook : a guide for managers
- Interfaces for Personal Identity Verification
- Interfaces for Personal Identity Verification
- Interfaces for Personal Identity Verification
- Managing information security risk : organization, mission, and information system view
- Managing risk from information systems : an organizational perspective
- PIV card application and middleware interface test guidelines (SP 800-73-2 compliance)
- PIV card application and middleware interface test guidelines (SP 800-73-3 compliance)
- PIV data model test guidelines
- Recommendation for the Triple Data Encryption Algorithm (TDEA) block cipher
- Recommended security controls for federal information systems : public draft
- Recommended security controls for federal information systems and organizations
- Recommended security controls for federal information systems and organizations
- Recommended security controls for federal information systems and organizations
- Security and privacy controls for federal information systems and organizations
Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.sfpl.org/resource/hFfvlhz6IKY/" typeof="Series http://bibfra.me/vocab/lite/Series"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.sfpl.org/resource/hFfvlhz6IKY/">NIST special publication, Information security</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.sfpl.org/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.sfpl.org/">San Francisco Public Library</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Series NIST special publication, Information security
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.sfpl.org/resource/hFfvlhz6IKY/" typeof="Series http://bibfra.me/vocab/lite/Series"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.sfpl.org/resource/hFfvlhz6IKY/">NIST special publication, Information security</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.sfpl.org/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.sfpl.org/">San Francisco Public Library</a></span></span></span></span></div>