wyszukanych pozycji: 103
NIST Special Publication 800-37 (rev 1): Guide for Applying the Risk Management Framework to Federal Information Systems
ISBN: 9781982026271 / Angielski / Miękka / 2018 / 104 str. Termin realizacji zamówienia: ok. 13-18 dni roboczych. |
|
cena:
46,18 zł |
Evaluation of Oral Fluid Testing Devices
ISBN: 9781495963988 / Angielski / Miękka / 2014 / 50 str. Termin realizacji zamówienia: ok. 13-18 dni roboczych. The Office of Law Enforcement Standards (OLES) of the National Institute of Standards and Technology (NIST) furnishes technical support to the National Institute of Justice (NIJ) program to strengthen law enforcement and criminal justice in the United States. OLES's function is to develop standards and conduct research that will assist law enforcement and criminal justice agencies in the selection and procurement of quality equipment.
The Office of Law Enforcement Standards (OLES) of the National Institute of Standards and Technology (NIST) furnishes technical support to the Nationa...
|
|
cena:
78,86 zł |
Performance of Face Recognition Algorithms on Compressed Images: NIST Interagency Report 7830
ISBN: 9781495300370 / Angielski / Miękka / 2014 / 36 str. Termin realizacji zamówienia: ok. 13-18 dni roboczych. |
|
cena:
74,21 zł |
Guide to Computer Security Log Management: Recommendations of the National Institute of Standards and Technology
ISBN: 9781494747794 / Angielski / Miękka / 2014 / 72 str. Termin realizacji zamówienia: ok. 13-18 dni roboczych. A log is a record of the events occurring within an organization's systems and networks. Logs are composed of log entries; each entry contains information related to a specific event that has occurred within a system or network. Many logs within an organization contain records related to computer security. These computer security logs are generated by many sources, including security software, such as antivirus software, firewalls, and intrusion detection and prevention systems; operating systems on servers, workstations, and networking equipment; and applications.
A log is a record of the events occurring within an organization's systems and networks. Logs are composed of log entries; each entry contains informa...
|
|
cena:
74,21 zł |
Quantum Computing and Communication
ISBN: 9781503305144 / Angielski / Miękka / 2014 / 54 str. Termin realizacji zamówienia: ok. 13-18 dni roboczych. A quantum computer, if built, will be to an ordinary computer as a hydrogen bomb is to gunpowder, at least for some types of computations. Today no quantum computer exists, beyond laboratory prototypes capable of solving only tiny problems, and many practical problems remain to be solved. Yet the theory of quantum computing has advanced significantly in the past decade, and is becoming a significant discipline in itself. This article explains the concepts and basic mathematics behind quantum computers and some of the promising approaches for building them. We also discuss quantum...
A quantum computer, if built, will be to an ordinary computer as a hydrogen bomb is to gunpowder, at least for some types of computations. Today no qu...
|
|
cena:
60,11 zł |
An Empirical Study of the Effects of Ex Ante Licensing Disclosure Policies of the Development of Voluntary Technical Standards
ISBN: 9781502416469 / Angielski / Miękka / 2014 / 62 str. Termin realizacji zamówienia: ok. 13-18 dni roboczych. The threat of patens "hold up," in which patent holders demand compensation from implementers of technical standards following wide-scale adoption of those standards, has focused significant governmental, academic and industry attention on means for averting such scenerios.
The threat of patens "hold up," in which patent holders demand compensation from implementers of technical standards following wide-scale adoption of ...
|
|
cena:
78,86 zł |
Multiple-Biometric Evaluation (MBE) 2010 Report on the Evaluation of 2D Still-Image Face Recognition Algorithms
ISBN: 9781496005304 / Angielski / Miękka / 2014 / 62 str. Termin realizacji zamówienia: ok. 13-18 dni roboczych. Facial recognition algorithms from seven commercial providers, and three universities, were tested on one laboratory dataset and two operational face recognition datasets, one comprised of visa images, the other law enforcement mugshots. The population represented in these sets approaches 4 million, such that this report documents the largest public evaluation of face recognition technology to date. The project attracted participation from a majority of the known providers of FR technology including the largest commercial suppliers.
Facial recognition algorithms from seven commercial providers, and three universities, were tested on one laboratory dataset and two operational face ...
|
|
cena:
78,86 zł |
The ABC's of Standard Activities
ISBN: 9781495968822 / Angielski / Miękka / 2014 / 42 str. Termin realizacji zamówienia: ok. 13-18 dni roboczych. The Standards Services Division (SSD) within the National Institute of Standards and Technology (NIST) publishes information related to standards and conformity assessment as a service to producers and users of such systems-both in the government and in the private sector. This report provides a basic introduction to the U.S. standards system; explains what is meant by the term, "documentary standard;" and provides an overview of the U.S., international and regional standards systems. In addition, it describes the principles used in effective standards development efforts.
The Standards Services Division (SSD) within the National Institute of Standards and Technology (NIST) publishes information related to standards and ...
|
|
cena:
78,86 zł |
Integrating IT Security into the Capital Planning and Investment Control Process
ISBN: 9781494787462 / Angielski / Miękka / 2014 / 68 str. Termin realizacji zamówienia: ok. 13-18 dni roboczych. The Information Technology Laboratory (ITL) at the National Institute of Standards and Technology promotes the United States economy and public welfare by providing technical leadership for the Nation's measurement and standards infrastructure. ITL develops tests, test methods, reference data, proof-of-concept implementations, and technical analyses to advance the development and productive use of information technology. ITL's responsibilities include the development of management, administrative, technical, and physical standards and guidelines for the cost-effective security and privacy of...
The Information Technology Laboratory (ITL) at the National Institute of Standards and Technology promotes the United States economy and public welfar...
|
|
cena:
74,21 zł |
Test Results for Digital Data Acquisition Tool: DCCIdd (Version 2.0, June 1 2007)
ISBN: 9781502816184 / Angielski / Miękka / 2014 / 126 str. Termin realizacji zamówienia: ok. 13-18 dni roboczych. The Computer Forensics Tool Testing (CFTT) program is a joint project of the National Institute of Justice (NIJ), the research and development organization of the U.S. Department of Justice, and the National Institute of Standards and Technology's (NIST's) Office of Law Enforcement Standards and Information Technology Laboratory. CFTT is supported by other organizations, including the Federal Bureau of Investigation, the U.S. Department of Defense Cyber Crime Center, the U.S. Internal Revenue Service Criminal Investigation Division Electronic Crimes Program, and the U.S. Department of...
The Computer Forensics Tool Testing (CFTT) program is a joint project of the National Institute of Justice (NIJ), the research and development organiz...
|
|
cena:
78,86 zł |
Guide for Assessing the Security Controls in Federal Information Systems and Organizations
ISBN: 9781497360129 / Angielski / Miękka / 2014 / 402 str. Termin realizacji zamówienia: ok. 13-18 dni roboczych. |
|
cena:
92,79 zł |
Assessing Technology Gaps for the Federal Highway Administration Digital Highway Measurement Program
ISBN: 9781495983597 / Angielski / Miękka / 2014 / 126 str. Termin realizacji zamówienia: ok. 13-18 dni roboczych. The ability to automatically collect more and better measurements of roadway assets (e.g., existence, condition, location, type) and to accurately map both geometry and elements of roadway assets is an important mitigating factor in roadway safety. This information serves numerous purposes including verification of road design codes, detecting degradation in roadway elements, detecting roadside hardware and clutter changes which impact safety (e.g., sight lines), creation of a roadway element inventory, analysis of accident data correlated to roadway inventory, and simulation of roadway...
The ability to automatically collect more and better measurements of roadway assets (e.g., existence, condition, location, type) and to accurately map...
|
|
cena:
83,50 zł |
Proceedings of the Static Analysis Summit
ISBN: 9781494747749 / Angielski / Miękka / 2014 / 74 str. Termin realizacji zamówienia: ok. 13-18 dni roboczych. These are the proceedings of a summit held in June 2006 at the National Institute of Standards and Technology (NIST). This Static Analysis Summit is one of a series of meetings in the NIST Software Assurance Measurement and Tool Evaluation (SAMATE) project. This summit convened researchers, developers, and government and industrial users to explore the state of the art in software static analysis tools and techniques with an emphasis on software security. It is also served as a prelude to an international summit in Spring 2007. This proceeding includes the ten papers presented, the keynote...
These are the proceedings of a summit held in June 2006 at the National Institute of Standards and Technology (NIST). This Static Analysis Summit is o...
|
|
cena:
74,21 zł |
Smart Cards and Mobile Device Authentication: An Overview and Implementation
ISBN: 9781503230989 / Angielski / Miękka / 2014 / 50 str. Termin realizacji zamówienia: ok. 13-18 dni roboczych. The use of mobile handheld devices within the workplace is expanding rapidly. These devices are no longer viewed as coveted gadgets for early technology adopters, but have instead become indispensable tools that offer competitive business advantages for the mobile workforce. While these devices provide productivity benefits, they also pose new risks to an organization's security by the information they contain or can access remotely. Enabling adequate user authentication is the first line of defense against unauthorized use of an unattended, lost, or stolen handheld device. Smart cards have...
The use of mobile handheld devices within the workplace is expanding rapidly. These devices are no longer viewed as coveted gadgets for early technolo...
|
|
cena:
69,39 zł |
Test Report - Exposure and Ambient Dose Equivalent Rate Measurements in Support of the ITRAP+10 Testing
ISBN: 9781499528497 / Angielski / Miękka / 2014 / 32 str. Termin realizacji zamówienia: ok. 13-18 dni roboczych. |
|
cena:
78,86 zł |
Mobile ID Device Best Practice Recommendation Version 1.0
ISBN: 9781495968686 / Angielski / Miękka / 2014 / 56 str. Termin realizacji zamówienia: ok. 13-18 dni roboczych. The term "Mobile ID" can conjure up several different interpretations. In the strictest sense, it may consist of an un-tethered device used to capture one or more biometric samples from a subject. The captured data sample(s) may then be compared to other samples contained in a database resident on that device. The data may also be transmitted to and compared to samples in a central repository or an onboard computer repository located in a nearby vehicle. Such vehicles may include jurisdictional police cars, border patrol vehicles, military combat vehicles such as Humvees1, etc. This scenario...
The term "Mobile ID" can conjure up several different interpretations. In the strictest sense, it may consist of an un-tethered device used to capture...
|
|
cena:
78,86 zł |
Survey of Industrial Manipulation Technologies for Autonomous Assembly Applications
ISBN: 9781495302985 / Angielski / Miękka / 2014 / 64 str. Termin realizacji zamówienia: ok. 13-18 dni roboczych. |
|
cena:
40,61 zł |
Border Gateway Protocol Security
ISBN: 9781494750152 / Angielski / Miękka / 2014 / 62 str. Termin realizacji zamówienia: ok. 13-18 dni roboczych. This document introduces the Border Gateway Protocol (BGP), explains its importance to the Internet, and provides a set of best practices that can help in protecting BGP. Best practices described here are intended to be implementable on nearly all currently available BGP routers. While a number of enhanced protocols for BGP have been proposed, these generally require substantial changes to the protocol and may not interoperate with current BGP implementations. While the recommendations in this documentcan contribute to greatly improved BGP security, they are not a complete defense against all...
This document introduces the Border Gateway Protocol (BGP), explains its importance to the Internet, and provides a set of best practices that can hel...
|
|
cena:
74,21 zł |
Test Results for Digital Data Acquisition Tool: IXimager (Version 2.0, Feb-01 2006)
ISBN: 9781502816078 / Angielski / Miękka / 2014 / 120 str. Termin realizacji zamówienia: ok. 13-18 dni roboczych. The tested tool acquired all visible and hidden sectors completely and accurately from the test media. In the case of a hard drive with 22 defective sectors, the sectors of the image corresponding to the defective sectors were replaced with forensically benign content.
The tested tool acquired all visible and hidden sectors completely and accurately from the test media. In the case of a hard drive with 22 defective s...
|
|
cena:
69,57 zł |
Recommended Security Controls for Federal Information Systems and Organizations
ISBN: 9781495968853 / Angielski / Miękka / 2014 / 244 str. Termin realizacji zamówienia: ok. 13-18 dni roboczych. This publication has been developed by NIST to further its statutory responsibilities under the Federal Information Security Management Act (FISMA), Public Law (P.L.) 107-347. NIST is responsible for developing information security standards and guidelines, including minimum requirements for federal information systems, but such standards and guidelines shall not apply to national security systems without the express approval of appropriate federal officials exercising policy authority over such systems. This guideline is consistent with the requirements of the Office of Management and Budget...
This publication has been developed by NIST to further its statutory responsibilities under the Federal Information Security Management Act (FISMA), P...
|
|
cena:
83,50 zł |