Computer security
Label
Computer security
Name
Computer security
Focus
Actions
Incoming Resources
- Subject of14
- Good security practices for electronic commerce, including electronic data interchange, Roy G. Saltman
- Computer security considerations in federal procurements, a guide for procurement initiators, contracting officers, and computer security officials, Barbara Guttman
- Security issues in the database language SQL, W. Timothy Polk, Lawrence E. Bassham, III
- Security in open systems, John Barkley
- Guide for developing security plans for information technology systems, Marianne Swanson
- Automated tools for testing computer system vulnerability, W. Timothy Polk
- Bibliography of selected computer security publications, January 1980-October 1989, Lawrence E. Bassham III
- Guidance for securing Microsoft Windows XP for IT Professionals, a NIST security configuration checklist : recommendations of the National Institute of Standards and Technology, Murugia Souppaya, Karen Kent, Paul M. Johnson
- Security considerations in the information system development life cycle, T. Grance, J. Hash, M. Stevens
- Modes of Operation Validation System for the Triple Data Encryption Algorithm (TMOVS), requirements and procedures, S. S. Keller
- Border gateway protocol security, D. R. Kuhn, K. Sriram, D. C. Montgomery
- Keeping your site comfortably secure, an introduction to Internet firewalls, John P. Wack, Lisa J. Carnahan
- Engineering principles for information technology security (a baseline for achieving security), recommendations of the National Institute of Standards and Technology, Gary Stoneburner, Clark Hayden, Alexis Feringa
- The impact of the FCC's Open Network Architecture on NS/NP telecommunications security, Karen Olsen, John Tebbutt
Outgoing Resources
- Focus1