SP 800-66 Rev. 1. An Introductory Resource Guide for Implementing the Health Insurance Portability and Accountability Act (HIPAA) Security Rule
暂无分享,去创建一个
Joan Hash | Kevin M. Stine | Matthew A. Scholl | Daniel Steinberg | P. Bowen | Joan Hash | M. Scholl | D. Steinberg | Carla Dancy Smith | L. A. Johnson | L. Arnold Johnson | Pauline Bowen | Matthew Scholl
[1] Timothy Grance,et al. Contingency Planning Guide For Information Technology Systems: Recommendations Of The National Institute Of Standards And Technology , 2004 .
[2] Marianne Swanson,et al. SP 800-14. Generally Accepted Principles and Practices for Securing Information Technology Systems , 1996 .
[3] Karen A. Scarfone,et al. User's Guide to Securing External Devices for Telework and Remote Access , 2007 .
[4] Timothy Grance,et al. SP 800-47. Security Guide for Interconnecting Information Technology Systems , 2002 .
[5] Gregory B. White,et al. SP 800-84. Guide to Test, Training, and Exercise Programs for IT Plans and Capabilities , 2006 .
[6] Mark Wilson,et al. SP 800-16. Information Technology Security Training Requirements: a Role- and Performance-Based Model , 1998 .
[7] Quynh H. Dang. SP 800-107. Recommendation for Applications Using Approved Hash Algorithms , 2009 .
[8] D. R. Kuhn,et al. Security for Telecommuting and Broadband Communications , 2002 .
[9] Karen A. Scarfone,et al. SP 800-41 Rev. 1. Guidelines on Firewalls and Firewall Policy , 2009 .
[10] Timothy Grance,et al. Guide to Integrating Forensic Techniques into Incident Response , 2006 .
[11] Matthew J. Fanto,et al. SP 800-52. Guidelines for the Selection and Use of Transport Layer Security (TLS) Implementations , 2005 .
[12] Joan Hash,et al. SP 800-100. Information Security Handbook: A Guide for Managers , 2006 .
[13] Peter Mell,et al. SP 800-83. Guide to Malware Incident Prevention and Handling , 2005 .
[14] Karen A. Scarfone,et al. SP 800-111. Guide to Storage Encryption Technologies for End User Devices , 2007 .
[15] Angela Orebaugh,et al. SP 800-113. Guide to SSL VPNs , 2008 .
[16] Edward Roback,et al. SP 800-12. An Introduction to Computer Security: the NIST Handbook , 1995 .
[17] Karen Kent,et al. SP 800-77. Guide to IPsec VPNs , 2005 .
[18] Timothy Grance,et al. SP 800-35. Guide to Information Technology Security Services , 2003 .
[19] Murugiah P. Souppaya,et al. SP 800-92. Guide to Computer Security Log Management , 2006 .
[20] D. Richard Kuhn,et al. SP 800-58. Security Considerations for Voice Over IP Systems , 2005 .
[21] Joan Hash,et al. Building an Information Technology Security Awareness and Training Program , 2003 .
[22] Karen A. Scarfone,et al. Guide to Intrusion Detection and Prevention Systems (IDPS) , 2007 .
[23] Hhs Centers for Medicare Medicare Services. Health insurance reform: security standards. Final rule. , 2003, Federal register.
[24] L. Johnson,et al. Minimum Security Requirements for Federal Information and Information Systems , 2006 .
[25] Marianne M. Swanson,et al. Standards for Security Categorization of Federal Information and Information Systems , 2004 .
[26] G. Stoneburner,et al. Risk Management Guide for Information Technology Systems: Recommendations of the National Institute of Standards and Technology , 2002 .
[27] A. Craig Eddy,et al. The Effect of the Health Insurance Portability and Accountability Act of 1996 (HIPAA) on Health Care Fraud in Montana , 2000 .
[28] William M. Daley,et al. Security Requirements for Cryptographic Modules , 1999 .
[29] Quynh H. Dang. SP 800-106. Randomized Hashing for Digital Signatures , 2009 .