z-logo
open-access-imgOpen Access
Information system security best practices for UOCAVA-supporting systems
Author(s) -
Andrew Regenscheid,
Geoff Beier,
Santosh Chokhani,
Paul Hoffman,
Jim Knoke,
Scott Shorter
Publication year - 2010
Language(s) - English
Resource type - Reports
DOI - 10.6028/nist.ir.7682
Subject(s) - information systems security , information security , computer science , information system , computer security , business , management information systems , engineering , electrical engineering
Certain commercial entities, equipment, or materials may be identified in this document in order to describe an experimental procedure or concept adequately. Such identification is not intended to imply recommendation or endorsement by NIST, nor is it intended to imply that the entities, materials, or equipment are necessarily the best available for the purpose. There may be references in this publication to other publications currently under development by NIST in accordance with its assigned statutory responsibilities. The information in this publication, including concepts and methodologies, may be used by organizations even before the completion of such companion publications. Thus, until each publication is completed, current requirements, guidelines, and procedures, where they exist, remain operative. For planning and transition purposes, organizations may wish to closely follow the development of these new publications by NIST.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here
Accelerating Research

Address

John Eccles House
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom