SEARCH THE HSDL

Advanced search    Help

Searching for terms: EXACT: "Scarfone, Karen"   in: author

Set an Alert to get future results

Results  1 - 30 (of 51)          sorted by relevance     sort by date

Clear all search criteria

Only 2/3! You are seeing results from the Public Collection, not the complete Full Collection. Sign in to search everything (see eligibility).

  • Guide for Cybersecurity Event Recovery
    National Institute of Standards and Technology (U.S.)
    Bartock, Michael; Cichonski, Jeffrey; Souppaya, Murugiah . . .
    2016-12
  • ITL Bulletin: Security for Enterprise Telework and Remote Access Solutions (June 2009)
    National Institute of Standards and Technology (U.S.); Information Technology Laboratory (National Institute of Standards and Technology). Computer Security Division
    Scarfone, Karen
    2009-06
  • ITL Bulletin: Federal Desktop Core Configuration (FDCC): Improving Security for Windows Desktop Operating Systems [February 2008]
    National Institute of Standards and Technology (U.S.); Information Technology Laboratory (National Institute of Standards and Technology). Computer Security Division
    Radack, Shirley M.; Scarfone, Karen
    2008-02
  • Guide to Bluetooth Security [Revision 2]
    National Institute of Standards and Technology (U.S.)
    Padgette, John; Chen, Lily; Scarfone, Karen . . .
    2017-05
  • Application Container Security Guide
    National Institute of Standards and Technology (U.S.)
    Souppaya, Murugiah; Morello, John; Scarfone, Karen
    2017-09
  • Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.0
    National Institute of Standards and Technology (U.S.)
    Scarfone, Karen; Johnson, Christopher A.; Quinn, Stephen D. . . .
    2009-11
  • Guide to Enterprise Password Management (Draft)
    National Institute of Standards and Technology (U.S.)
    Souppaya, Murugiah; Scarfone, Karen
    2009-04
  • Guide to Enterprise Telework and Remote Access Security
    National Institute of Standards and Technology (U.S.)
    Souppaya, Murugiah; Scarfone, Karen; Hoffman, Paul
    2009-06
  • System and Network Security Acronyms and Abbreviations
    National Institute of Standards and Technology (U.S.)
    Scarfone, Karen; Thompson, Victoria
    2009-09
  • Guide to Bluetooth Security: Recommendations of the National Institute of Standards and Technology
    National Institute of Standards and Technology (U.S.)
    Scarfone, Karen; Padgette, John
    2008-09
  • Guide to Protecting the Confidentiality of Personally Identifiable Information (PII) (DRAFT)
    National Institute of Standards and Technology (U.S.)
    Grance, Tim; Scarfone, Karen; McCallister, Erika
    2009-01
  • Guidelines on Firewalls and Firewall Policy
    National Institute of Standards and Technology (U.S.)
    Scarfone, Karen; Hoffman, Paul
    2009-09
  • Guide to Protecting the Confidentiality of Personally Identifiable Information (PII)
    Information Technology Laboratory (National Institute of Standards and Technology). Computer Security Division
    McCallister, Erika; Grance, Tim; Scarfone, Karen
    2010-04
  • Considerations for Managing Internet of Things (IoT) Cybersecurity and Privacy Risks
    National Institute of Standards and Technology (U.S.)
    Boeckl, Katie; Fagan, Michael; Fisher, William . . .
    2019-06
  • Guide to Computer Security Log Management: Recommendations of the National Institute of Standards and Technology [Draft April 2006]
    National Institute of Standards and Technology (U.S.)
    Souppaya, Murugiah; Scarfone, Karen
    2006-04
  • Guide to Computer and Network Data Analysis: Applying Forensic Techniques to Incident Response
    National Institute of Standards and Technology (U.S.)
    Grance, Tim; Chevalier, Suzanne; Scarfone, Karen
    2005-08
  • Guide to Intrusion Detection and Prevention Systems (IDPS): Recommendations of the National Institute of Standards and Technology
    National Institute of Standards and Technology (U.S.)
    Scarfone, Karen; Mell, Peter
    2007-02
  • Guide to Malware Incident Prevention and Handling: Recommendations of the National Institute of Standards and Technology
    National Institute of Standards and Technology (U.S.)
    Mell, Peter; Nusbaum, Joseph; Scarfone, Karen
    2005-11
  • Security Configuration Checklists Program for IT Products - Guidance for Checklists Users and Developers
    National Institute of Standards and Technology (U.S.)
    Wack, John P.; Souppaya, Murugiah; Scarfone, Karen
    2005-05
  • Guide to Securing Legacy IEEE 802.11 Wireless Networks
    National Institute of Standards and Technology (U.S.)
    Scarfone, Karen; Dicoi, Derrick; Sexton, Matthew
    2008-07
  • Guide to Industrial Control Systems (ICS) Security: Recommendations of the National Institute of Standards and Technology
    National Institute of Standards and Technology (U.S.)
    Falco, Joe; Scarfone, Karen; Stouffer, Keith
    2007-09
  • Technical Guide to Information Security Testing and Assessment: Recommendations of the National Institute of Standards and Technology
    National Institute of Standards and Technology (U.S.)
    Souppaya, Murugiah; Scarfone, Karen; Cody, Amanda
    2008-09
  • Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.2: Recommendations of the National Institute of Standards and Technology
    Information Technology Laboratory (National Institute of Standards and Technology). Computer Security Division
    Waltermire, David; Quinn, Stephen D.; Scarfone, Karen
    2011-09
  • Guide to Bluetooth Security (Draft): Recommendations of the National Institute of Standards and Technology
    Information Technology Laboratory (National Institute of Standards and Technology). Computer Security Division
    Scarfone, Karen; Padgette, John
    2011-09
  • Guidelines for Securing Wireless Local Area Networks (WLANs): Recommendations of the National Institute of Standards and Technology
    Information Technology Laboratory (National Institute of Standards and Technology). Computer Security Division
    Scarfone, Karen; Souppaya, Murugiah
    2012-02
  • ITL Bulletin: Implementing Trusted Geolocation Services in the Cloud (February 2016)
    Information Technology Laboratory (National Institute of Standards and Technology)
    Feldman, Larry; Scarfone, Karen; Bartock, Michael . . .
    2016-02
  • Guide to Application Whitelisting
    National Institute of Standards and Technology (U.S.)
    Souppaya, Murugiah; Scarfone, Karen; Sedgewick, Adam
    2015-11-05
  • ITL Bulletin: Securing Radio Frequency Identification (RFID) Systems [May 2007]
    National Institute of Standards and Technology (U.S.); Information Technology Laboratory (National Institute of Standards and Technology). Computer Security Division
    Scarfone, Karen
    2007-05
  • ITL Bulletin: Securing Interactive and Automated Access Management Using Secure Shell (SSH) (January 2016)
    National Institute of Standards and Technology (U.S.); Information Technology Laboratory (National Institute of Standards and Technology). Computer Security Division
    Souppaya, Murugiah; Scarfone, Karen; Feldman, Larry
    2016-01
  • ITL Bulletin: Stopping Malware and Unauthorized Software Through Application Whitelisting (December 2015)
    National Institute of Standards and Technology (U.S.); Information Technology Laboratory (National Institute of Standards and Technology). Computer Security Division
    Sedgewick, Adam; Souppaya, Murugiah; Scarfone, Karen . . .
    2015-12
      1   2