
ilość książek w kategorii: 5024
![]() |
A Recommendation for the Use of PIV Credentials in Physical Access Control Systems (PACS)
ISBN: 9781495984983 / Angielski / Miękka / 2008 / 74 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. The purpose of this document is to describe a strategy allowing agencies to PIV-enable their PACS, and migrate to government-wide interoperability. Specifically, the document recommends a risk-based approach for selecting appropriate PIV authentication mechanisms to manage physical access to Federal government facilities and assets.
The purpose of this document is to describe a strategy allowing agencies to PIV-enable their PACS, and migrate to government-wide interoperability. Sp...
|
cena:
54,67 |
![]() |
Recommendation for the Triple Data Encryption Algorithm (TDEA) Block Cipher
ISBN: 9781497528178 / Angielski / Miękka / 2012 / 36 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. This publication specifies the Triple Data Encryption Algorithm (TDEA), including its primary component cryptographic engine, the Data Encryption Algorithm (DEA). When implemented in an SP 800-38-series-compliant mode of operation and in a FIPS 140-2-compliant cryptographic module, TDEA may be used by Federal organizations to protect sensitive unclassified data. Protection of data during transmission or while in storage may be necessary to maintain the confidentiality and integrity of the information represented by the data. This Recommendation defines the mathematical steps required to...
This publication specifies the Triple Data Encryption Algorithm (TDEA), including its primary component cryptographic engine, the Data Encryption Algo...
|
cena:
54,67 |
![]() |
Cloud Computing Synopsis and Recommendations
ISBN: 9781497549968 / Angielski / Miękka / 2012 / 88 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. This document reprises the NIST-established definition of cloud computing, describes cloud computing benefits and open issues, presents an overview of major classes of cloud technology, and provides guidelines and recommendations on how organizations should consider the relative opportunities and risks of cloud computing. Cloud computing has been the subject of a great deal of commentary. Attempts to describe cloud computing in general terms, however, have been problematic because cloud computing is not a single kind of system, but instead spans a spectrum of underlying technologies,...
This document reprises the NIST-established definition of cloud computing, describes cloud computing benefits and open issues, presents an overview of...
|
cena:
54,67 |
![]() |
#Lazarus10
ISBN: 9780993068737 / Angielski / Miękka / 2016 / 296 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. "He that believeth in me, though he were dead, yet shall he live: And whosoever liveth and believeth in me shall never die". John 11:21-26 Tony Peso's world is turned upside down the first time he is plugged into a cryonically frozen head, to experience their last ten seconds of life. If this was properly marketed, it could be massive... Ignoring the moral implications and ably assisted by Cryo-Biochemist Davis, Brit-abroad Tony makes millions selling this mind-blowing one-off hit to Billionaires. Way out of his depth from layers of deceit, he soon... "He that believeth in me, though he were dead, yet shall he live: And whosoever liveth and believeth in me shall never die". John... |
cena:
54,75 |
![]() |
Cryptocurrency: The Ultimate Guide on Cryptocurrency
ISBN: 9781973879176 / Angielski / Miękka / 2017 / 48 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Do You Want to Master the Next Generation of Currency? Cryptocurrency, or the electronically created line of codes of monetary value, or simply put, digital currency can be defined as a medium of exchange just like the usual currencies such as USD. However, what makes them different from the conventional currencies is that they are designed to exchange digital information by using the principles of cryptography. This cryptography controls the security of transactions as well as the mining of new coins. A Snapshot of What You Will Learn - Cryptocurrency Vs. Fiat Money - How BitCoin Achieved...
Do You Want to Master the Next Generation of Currency? Cryptocurrency, or the electronically created line of codes of monetary value, or simply put, d...
|
cena:
54,90 |
![]() |
How to Bullet Proof Your LinkedIn Profile: 10 Security Issues to Avoid
ISBN: 9781542407724 / Angielski / Miękka / 2017 / 86 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Learn these 10 LinkedIn Security Principles and much more. To create a strong password and use an email address that is only used for LinkedIn.com. No other online accounts should use this email address How to set up two step verification. Important point is to use a cell phone you do not have listed on your LinkedIn profile How much is your data worth? How to remove your birthdate from your profile. How to turn off your profile being public on search engines Phishing - how to recognize a phishing attempt and what LinkedIn does to protect their LinkedIn members Login with less devices. This...
Learn these 10 LinkedIn Security Principles and much more. To create a strong password and use an email address that is only used for LinkedIn.com. No...
|
cena:
54,99 |
![]() |
Cybersecurity
ISBN: 9781482383966 / Angielski / Miękka / 2013 / 66 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. In response to the ongoing threats for federal systems and operations posed by cyber attacks, President Bush established the Comprehensive National Cybersecurity Initiative in 2008.
In response to the ongoing threats for federal systems and operations posed by cyber attacks, President Bush established the Comprehensive National Cy...
|
cena:
55,06 |
![]() |
Cybresecurity: Selected Legal Issues
ISBN: 9781482384062 / Angielski / Miękka / 2013 / 50 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. The federal government's role in protecting U.S. citizens and critical infrastructure from cyber attacks has been the subject of recent congressional interest. Critical infrastructure commonly refers to those entities that are so vital that their incapacitation or destruction would have a debilitating impact on national security, economic security, or the public health and safety. This report discusses selected legal issues that frequently arise in the context of recent legislation to address vulnerabilities of critical infrastructure to cyber threats, efforts to protect government networks...
The federal government's role in protecting U.S. citizens and critical infrastructure from cyber attacks has been the subject of recent congressional ...
|
cena:
55,06 |
![]() |
Cybercrime: Conceptual Issues for Congress and U.S. Law Enforcement
ISBN: 9781477650080 / Angielski / Miękka / 2012 / 32 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
55,06 |
![]() |
Guide to Bluetooth Security: Recommendations of the National Institute of Standards and Technology (Special Publication 800-121 Revision 1)
ISBN: 9781478168966 / Angielski / Miękka / 2012 / 50 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
55,06 |
![]() |
Recommendation for the Triple Data Encryption Algorithm (TDEA) Block Cipher: NIST Special Publication 800-67, Revision 2
ISBN: 9781478178170 / Angielski / Miękka / 2012 / 36 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
55,06 |
![]() |
Mobile Forensic Reference Materials: A Methodology and Reification (NIST IR 7617)
ISBN: 9781478179597 / Angielski / Miękka / 2012 / 38 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
55,06 |
![]() |
Assessment of Access Control Systems
ISBN: 9781493756292 / Angielski / Miękka / 2013 / 72 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Access control is perhaps the most basic aspect of computer security. Nearly all applications that deal with financial, privacy, safety, or defense include some form of access control. In many systems access control takes the form of a simple password mechanism, but many require more sophisticated and complex control. In addition to the authentication mechanism (such as a password), access control is concerned with how authorizations are structured. In some cases, authorization may mirror the structure of the organization, while in others it may be based on the sensitivity level of various...
Access control is perhaps the most basic aspect of computer security. Nearly all applications that deal with financial, privacy, safety, or defense in...
|
cena:
55,06 |
![]() |
Border Gateway Protocol Security
ISBN: 9781494469733 / Angielski / Miękka / 2013 / 64 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. This document introduces the Border Gateway Protocol (BGP), explains its importance to the internet, and provides a set of best practices that can help in protecting BGP. Best practices described here are intended to be implementable on nearly all currently available BGP routers. While a number of enhanced protocols for BGP have been proposed, these generally require substantial changes to the protocol and may not interoperate with current BGP implementations. To improve the security of BGP routers, the recommendations listed below are introduced. While the recommendations can contribute to...
This document introduces the Border Gateway Protocol (BGP), explains its importance to the internet, and provides a set of best practices that can hel...
|
cena:
55,06 |
![]() |
Computer Security Incident Handling Guide
ISBN: 9781494726379 / Angielski / Miękka / 2013 / 94 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Computer security incident response has become an important component of information technology (IT) programs. Securityrelated threats have become not only more numerous and diverse but also more damaging and disruptive. An incident response capability is necessary for rapidly detecting incidents, minimizing loss and destruction, mitigating the weaknesses that were exploited, and restoring computing services. This publication assists organizations in establishing computer security incident response capabilities and handling incidents efficiently and effectively. Topics covered include...
Computer security incident response has become an important component of information technology (IT) programs. Securityrelated threats have become not...
|
cena:
55,06 |
![]() |
Recommendation for Block Cipher Modes of Operation Methods and Techniques
ISBN: 9781495211041 / Angielski / Miękka / 2014 / 70 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. This recommendation defines five confidentiality modes of operation for use with an underlying symmetric key block cipher algorithm: Electronic Codebook (ECB), Cipher Block Chaining (CBC), Cipher Feedback (CFB), Output Feedback (OFB), and Counter (CTR). Used with an underlying block cipher algorithm that is approved in a Federal Information Processing Standard (FIPS), these modes can provide cryptographic protection for sensitive, but unclassified, computer data.
This recommendation defines five confidentiality modes of operation for use with an underlying symmetric key block cipher algorithm: Electronic Codebo...
|
cena:
55,06 |
![]() |
Computer Security Division 2010 Annual Report
ISBN: 9781493763399 / Angielski / Miękka / 2013 / 70 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. This annual report covers the work conducted within the National Institute of Standards and Technology's Computer Security Division during Fiscal Year 2010. It discusses all projects and programs within the Division, staff highlights, and publications.
This annual report covers the work conducted within the National Institute of Standards and Technology's Computer Security Division during Fiscal Year...
|
cena:
55,06 |
![]() |
Computer Security Division 2011 Annual Report
ISBN: 9781493763450 / Angielski / Miękka / 2013 / 80 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Title III of the E-Government Act of 2002, entitled the Federal Information Security Management Act (FISMA) of 2002, requires NIST to prepare an annual public report on activities undertaken in the previous year, and planned for the coming year, to carry out responsibilities under this law. The primary goal of the Computer Security Division (CSD), a component of NIST s Information Technology Laboratory (ITL), is to provide standards and technology that protects information systems against threats to the confidentiality, integrity, and availability of information and services. During Fiscal...
Title III of the E-Government Act of 2002, entitled the Federal Information Security Management Act (FISMA) of 2002, requires NIST to prepare an annua...
|
cena:
55,06 |
![]() |
Creating a Patch and Vulnerability Management Program
ISBN: 9781494729035 / Angielski / Miękka / 2013 / 80 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. This document provides guidance on creating a security patch and vulnerability management program and testing the effectiveness of that program. The primary audience is security managers who are responsible for designing and implementing the program. However, this document also contains information useful to system administrators and operations personnel who are responsible for applying patches and deploying solutions (i.e., information related to testing patches and enterprise patching software).
This document provides guidance on creating a security patch and vulnerability management program and testing the effectiveness of that program. The p...
|
cena:
55,06 |
![]() |
A Recommendation for the Use of PIV Credentials in Physical Access Control Systems (PACS)
ISBN: 9781494458072 / Angielski / Miękka / 2013 / 84 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
55,06 |