SEARCH THE HSDL
Searching for terms: EXACT: "Scarfone, Karen" in: author
Set an Alert to get future results
Results 1 - 30 (of 53) sorted by relevance sort by date
Only 2/3! You are seeing results from the Public Collection, not the complete Full Collection. Sign in to search everything (see eligibility).
-
Guide for Cybersecurity Event RecoveryNational Institute of Standards and Technology (U.S.)Bartock, Michael; Cichonski, Jeffrey; Souppaya, Murugiah . . .2016-12
-
ITL Bulletin: Security for Enterprise Telework and Remote Access Solutions (June 2009)National Institute of Standards and Technology (U.S.); Information Technology Laboratory (National Institute of Standards and Technology). Computer Security DivisionScarfone, Karen2009-06
-
ITL Bulletin: Federal Desktop Core Configuration (FDCC): Improving Security for Windows Desktop Operating Systems [February 2008]National Institute of Standards and Technology (U.S.); Information Technology Laboratory (National Institute of Standards and Technology). Computer Security DivisionRadack, Shirley M.; Scarfone, Karen2008-02
-
Guide to Bluetooth Security [Revision 2]National Institute of Standards and Technology (U.S.)Padgette, John; Chen, Lily; Scarfone, Karen . . .2017-05
-
Application Container Security GuideNational Institute of Standards and Technology (U.S.)Souppaya, Murugiah; Morello, John; Scarfone, Karen2017-09
-
Guide to Enterprise Password Management (Draft)National Institute of Standards and Technology (U.S.)Souppaya, Murugiah; Scarfone, Karen2009-04
-
Guide to Enterprise Telework and Remote Access SecurityNational Institute of Standards and Technology (U.S.)Souppaya, Murugiah; Scarfone, Karen; Hoffman, Paul2009-06
-
System and Network Security Acronyms and AbbreviationsNational Institute of Standards and Technology (U.S.)Scarfone, Karen; Thompson, Victoria2009-09
-
Guide to Bluetooth Security: Recommendations of the National Institute of Standards and TechnologyNational Institute of Standards and Technology (U.S.)Scarfone, Karen; Padgette, John2008-09
-
Guide to Protecting the Confidentiality of Personally Identifiable Information (PII) (DRAFT)National Institute of Standards and Technology (U.S.)Grance, Tim; Scarfone, Karen; McCallister, Erika2009-01
-
Guidelines on Firewalls and Firewall PolicyNational Institute of Standards and Technology (U.S.)Scarfone, Karen; Hoffman, Paul2009-09
-
Guide to Protecting the Confidentiality of Personally Identifiable Information (PII)Information Technology Laboratory (National Institute of Standards and Technology). Computer Security DivisionMcCallister, Erika; Grance, Tim; Scarfone, Karen2010-04
-
Considerations for Managing Internet of Things (IoT) Cybersecurity and Privacy RisksNational Institute of Standards and Technology (U.S.)Boeckl, Katie; Fagan, Michael; Fisher, William . . .2019-06
-
Guide to Industrial Control Systems (ICS) Security: Supervisory Control and Data Acquisition (SCADA) Systems, Distributed Control Systems (DCS), and Other Control System Configurations Such as Programmable Logic Controllers (PLC):National Institute of Standards and Technology (U.S.)Falco, Joe; Scarfone, Karen; Stouffer, Keith2011-06
-
Guide to Industrial Control Systems (ICS) Security: Recommendations of the National Institute of Standards and TechnologyNational Institute of Standards and Technology (U.S.)Falco, Joe; Scarfone, Karen; Stouffer, Keith2007-09
-
Guide to Industrial Control Systems (ICS) Security: Supervisory Control and Data Acquisition (SCADA) Systems, Distributed Control Systems (DCS), and Other Control System Configurations Such as Programmable Logic Controllers (PLC): Recommendations of the National Institute of Standards and Technology, Final Public DraftNational Institute of Standards and Technology (U.S.)Falco, Joe; Scarfone, Karen; Stouffer, Keith2008-09
-
Guide to Computer Security Log Management: Recommendations of the National Institute of Standards and Technology [Draft April 2006]National Institute of Standards and Technology (U.S.)Souppaya, Murugiah; Scarfone, Karen2006-04
-
Guide to Computer and Network Data Analysis: Applying Forensic Techniques to Incident ResponseNational Institute of Standards and Technology (U.S.)Grance, Tim; Chevalier, Suzanne; Scarfone, Karen2005-08
-
Guide to Intrusion Detection and Prevention Systems (IDPS): Recommendations of the National Institute of Standards and TechnologyNational Institute of Standards and Technology (U.S.)Scarfone, Karen; Mell, Peter2007-02
-
Guide to Malware Incident Prevention and Handling: Recommendations of the National Institute of Standards and TechnologyNational Institute of Standards and Technology (U.S.)Mell, Peter; Nusbaum, Joseph; Scarfone, Karen2005-11
-
Security Configuration Checklists Program for IT Products - Guidance for Checklists Users and DevelopersNational Institute of Standards and Technology (U.S.)Wack, John P.; Souppaya, Murugiah; Scarfone, Karen2005-05
-
Guide to Securing Legacy IEEE 802.11 Wireless NetworksNational Institute of Standards and Technology (U.S.)Scarfone, Karen; Dicoi, Derrick; Sexton, Matthew2008-07
-
Technical Guide to Information Security Testing and Assessment: Recommendations of the National Institute of Standards and TechnologyNational Institute of Standards and Technology (U.S.)Souppaya, Murugiah; Scarfone, Karen; Cody, Amanda2008-09
-
Guide to Bluetooth Security (Draft): Recommendations of the National Institute of Standards and TechnologyInformation Technology Laboratory (National Institute of Standards and Technology). Computer Security DivisionScarfone, Karen; Padgette, John2011-09
-
Guidelines for Securing Wireless Local Area Networks (WLANs): Recommendations of the National Institute of Standards and TechnologyInformation Technology Laboratory (National Institute of Standards and Technology). Computer Security DivisionScarfone, Karen; Souppaya, Murugiah2012-02
-
ITL Bulletin: Implementing Trusted Geolocation Services in the Cloud (February 2016)Information Technology Laboratory (National Institute of Standards and Technology)Feldman, Larry; Scarfone, Karen; Bartock, Michael . . .2016-02
-
Guide to Application WhitelistingNational Institute of Standards and Technology (U.S.)Souppaya, Murugiah; Scarfone, Karen; Sedgewick, Adam2015-11-05
-
ITL Bulletin: Securing Radio Frequency Identification (RFID) Systems [May 2007]National Institute of Standards and Technology (U.S.); Information Technology Laboratory (National Institute of Standards and Technology). Computer Security DivisionScarfone, Karen2007-05
-
ITL Bulletin: Securing Interactive and Automated Access Management Using Secure Shell (SSH) (January 2016)National Institute of Standards and Technology (U.S.); Information Technology Laboratory (National Institute of Standards and Technology). Computer Security DivisionSouppaya, Murugiah; Scarfone, Karen; Feldman, Larry2016-01
-
ITL Bulletin: Stopping Malware and Unauthorized Software Through Application Whitelisting (December 2015)National Institute of Standards and Technology (U.S.); Information Technology Laboratory (National Institute of Standards and Technology). Computer Security DivisionSedgewick, Adam; Souppaya, Murugiah; Scarfone, Karen . . .2015-12