Kent, Karen, (Karen Ann)
Resource Information
The person Kent, Karen, (Karen Ann) represents an individual (alive, dead, undead, or fictional) associated with resources found in San Francisco Public Library.
The Resource
Kent, Karen, (Karen Ann)
Resource Information
The person Kent, Karen, (Karen Ann) represents an individual (alive, dead, undead, or fictional) associated with resources found in San Francisco Public Library.
- Label
- Kent, Karen, (Karen Ann)
- Alternative name
- Karen Ann
57 Items by the Person Kent, Karen, (Karen Ann)
Context
Context of Kent, Karen, (Karen Ann)Creator of
No resources found
No enriched resources found
- Guide to storage encryption technologies for end user devices
- Computer security incident handling guide : recommendations of the National Institute of Standards and Technology
- Guide to Bluetooth security : recommendations of the National Institute of Standards and Technology
- Guide to Bluetooth security : recommendations of the National Institute of Standards and Technology
- Guide to computer security log management : recommendations of the National Institute of Standards and Technology
- Guide to enterprise password management (draft) : recommendations of the National Institute of Standards and Technology
- Guide to enterprise telework and remote access security (draft) : recommendations of the National Institute of Standards and Technology
- Guide to enterprise telework and remote access security : recommendations of the National Institute of Standards and Technology
- Guide to general server security : recommendations of the National Institute of Standards and Technology
- Guide to intrusion detection and prevention systems (IDPS) : recommendations of the National Institute of Standards and Technology
- Guide to securing WiMAX wireless communications : recommendations of the National Institute of Standards and Technology
- Guide to securing legacy IEEE 802.11 wireless networks : recommendations of the National Institute of Standards and Technology
- Guide to security for WiMAX technologies (draft) : recommendations of the National Institute of Standards and Technology
- Guide to security for full virtualization technologies : recommendations of the National Institute of Standards and Technology
- Guidelines on firewalls and firewall policy (draft) : recommendations of the National Institute of Standards and Technology
- Guidelines on firewalls and firewall policy : recommendations of the National Institute of Standards and Technology
- System and network security acronyms and abbreviations
- System and network security acronyms and abbreviations (draft)
- The common configuration scoring system (CCSS) : metrics for software security configuration vulnerabilities
- The common configuration scoring system (CCSS) : metrics for software security configuration vulnerabilities (draft)
- User's guide to securing external devices for telework and remote access : recommendations of the National Institute of Standards and Technology
- User's guide to securing external devices for telework and remote access : recommendations of the National Institute of Standards and Technology
- Wireless network security for IEEE 802.11a/b/g and Bluetooth : recommendation of the National Institute of Standards and Technology
Contributor of
No resources found
No enriched resources found
- Guide to secure Web services : recommendations of the National Institute of Standards and Technology
- Guide to securing Microsoft Windows XP systems for IT professionals : a NIST security configuration checklist : recommendations of the National Institute of Standards and Technology
- Trusted geolocation in the cloud : proof of concept implementation
- Technical guide to information security testing and assessment : recommendations of the National Institute of Standards and Technology
- The Common Misuse Scoring System (CMSS) : metrics for software feature misuse vulnerabilities
- The Common Misuse Scoring System (CMSS) : metrics for software feature misuse vulnerabilities
- BIOS integrity measurements guidelines (draft) : recommendations of the National Institute of Standards and Technology
- Guide to using vulnerability naming schemes : recommendations of the National Institute of Standards and Technology
- Guidelines for access control system evaluation metrics
- Guidelines for managing and securing mobile devices in the enterprise (draft) : recommendations of the National Institute of Standards and Technology
- Guidelines for securing wireless local area networks (WLANs) (draft) : recommendations of the National Institute of Standards and Technology
- Guidelines for securing wireless local area networks (WLANs) : recommendations of the National Institute of Standards and Technology
- Guidelines on active content and mobile code : recommendations of the National Institute of Standards and Technology
- Common platform enumeration : applicability language specification version 2.3
- Common platform enumeration : dictionary specification version 2.3
- Common platform enumeration : dictionary specification version 2.3 (draft)
- Common platform enumeration : naming specification version 2.3
- Guidelines on cell phone and PDA security : recommendations of the National Institute of Standards and Technology
- Derived Personal Identity Verification (PIV) credentials (DPC) proof of concept research
- Guide to Bluetooth security : recommendations of the National Institute of Standards and Technology
- The Common Vulnerability Scoring System (CVSS) and its applicability to Federal agency systems
- The common configuration scoring system (CCSS) : metrics for software security configuration vulnerabilities
- Guide to Industrial Control Systems (ICS) security : Supervisory Control and Data Acquisition (SCADA) systems, Distributed Control Systems (DCS), and other control system configurations such as Programmable Logic Controllers (PLC) : recommendations of the National Institute of Standards and Technology
- Guide to application whitelisting
- Common planform enumeration : name matching specification version 2.3
- National Checklist Program for IT products : guidelines for checklist users and developers : recommendations of the National Institute of Standards and Technology
- National checklist program for IT products : guidelines for checklist users and developers (draft) : recommendations of the National Institute of Standards and Technology
- Guide to enterprise patch management technologies (draft) : recommendations of the National Institute of Standards and Technology
- Security configuration checklists program for IT products : guidance for checklists users and developers
- Security of interactive and automated access management using secure shell (SSH)
- Specification for the open checklist interactive language (OCIL) version 2.0
- Guide to integrating forensic techniques into incident response : recommendations of the National Institute of Standards and Technology
- The technical specification for the Security Content Automation Protocol (SCAP), SCAP version 1.1 : recommendations of the National Institute of Standards and Technology
- Guide to protecting the confidentiality of Personally Identifiable Information (PII) (draft) : recommendations of the National Institute of Standards and Technology
- Guide to protecting the confidentiality of Personally Identifiable Information (PII) : recommendations of the National Institute of Standards and Technology
Author of
Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.sfpl.org/resource/gr0I-IC-WZE/" typeof="Person http://bibfra.me/vocab/lite/Person"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.sfpl.org/resource/gr0I-IC-WZE/">Kent, Karen, (Karen Ann)</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.sfpl.org/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="https://link.sfpl.org/">San Francisco Public Library</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Person Kent, Karen, (Karen Ann)
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.sfpl.org/resource/gr0I-IC-WZE/" typeof="Person http://bibfra.me/vocab/lite/Person"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.sfpl.org/resource/gr0I-IC-WZE/">Kent, Karen, (Karen Ann)</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.sfpl.org/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="https://link.sfpl.org/">San Francisco Public Library</a></span></span></span></span></div>