Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations
暂无分享,去创建一个
[1] George Moore,et al. Automation Support for Security Control Assessments: Volume 1: Overview , 2016 .
[2] G. E. Dille. Guidance , 1930 .
[3] Sheila E. Frankel,et al. Establishing Wireless Robust Security Networks: A Guide to IEEE 802.11i , 2007 .
[4] Karen A. Scarfone,et al. Guide to Intrusion Detection and Prevention Systems (IDPS) , 2007 .
[5] Timothy Grance,et al. Guide to Integrating Forensic Techniques into Incident Response , 2006 .
[6] Richard Graubart,et al. Systems Security Engineering: Cyber Resiliency Considerations for the Engineering of Trustworthy Secure Systems , 2018 .
[7] Elaine B. Barker,et al. Recommendation for Pair-Wise Key Establishment Schemes Using Discrete Logarithm Cryptography , 2007 .
[8] Joan Hash,et al. Building an Information Technology Security Awareness and Training Program , 2003 .
[9] Karen A. Scarfone,et al. Guide to Malware Incident Prevention and Handling for Desktops and Laptops , 2013 .
[10] Ronald S. Ross,et al. Assessing Security Requirements for Controlled Unclassified Information , 2018 .
[11] Karen A. Scarfone,et al. Guide to Enterprise Patch Management Technologies , 2013 .
[12] David L. Mills,et al. Internet Engineering Task Force (ietf) Network Time Protocol Version 4: Protocol and Algorithms Specification , 2010 .
[13] John Wack,et al. Guidelines on Firewalls and Firewall Policy , 2002 .
[14] Ramaswamy Chandramouli. Secure Virtual Network Configuration for Virtual Machine (VM) Protection , 2016 .
[15] Ronald S. Ross,et al. Guide for security-focused configuration management of information systems , 2011 .
[16] K. Scarfone,et al. Guidelines for Managing the Security of Mobile Devices in the Enterprise , 2013 .
[17] Thomas J. Walsh,et al. Security Considerations for Voice Over IP Systems , 2005 .
[18] Wayne Jansen,et al. Guidelines on Active Content and Mobile Code , 2008 .