Search results for: Hash, Joan

Showing 1 - 8 results of 8 Refine Results
  1. 1

    Integrating IT security into the capital planning and investment control process

    Authors: Hash, Joan
    Published: National Institute of Standards and Technology, Technology Administration, U.S. Dept. of Commerce, 2005
    Physical Description: 1 volume (various pagings) : digital, PDF file.
    Connect to online resource - All users (Federal Depository Library Program Persistant URL)
    Government Document Electronic eBook
  2. 2

    An introductory resource guide for implementing the Health Insurance Portability and Accountability Act (HIPAA) Security Rule

    Authors: Hash, Joan
    Published: U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 2005
    Physical Description: vii, 129 pages : digital, PDF file.
    Connect to online resource - All users (Federal Depository Library Program Persistant URL)
    Government Document Electronic eBook
  3. 3

    Building an information technology security awareness and training program

    Authors: Wilson, Mark, 1952-
    Published: U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology ; For sale by the Supt. of Docs., U.S. G.P.O., 2003
    Other Authors: “…Hash, Joan…”
    Physical Description: 1 volume (various pagings) : digital, PDF file.
    Connect to online resource - All users (Federal Depository Library Program Persistant URL)
    Government Document Electronic eBook
  4. 4

    Guidelines for the certification and accreditation of PIV card issuing organizations

    Authors: Branstad, Dennis K.
    Published: U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 2005
    Other Authors:
    Physical Description: 59 unnumbered pages : digital, PDF file.
    Connect to online resource - All users (Federal Depository Library Program Persistant URL)
    Government Document Electronic eBook
  5. 5

    Security considerations in the information system development life cycle

    Authors: Grance, Tim
    Published: U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 2004
    Other Authors: “…Hash, Joan…”
    Physical Description: 1 volume (various pagings) : digital, PDF file.
    Connect to online resource - All users (Federal Depository Library Program Persistant URL)
    Government Document Electronic eBook
  6. 6

    Guide for developing security plans for federal information systems

    Authors: Swanson, Marianne
    Published: U.S. Dept. of Commerce, National Institute of Standards and Technology, 2006
    Other Authors: “…Hash, Joan…”
    Physical Description: vii, 41 pages : digital, PDF file.
    Connect to online resource - All users (Federal Depository Library Program Persistant URL)
    Government Document Electronic eBook
  7. 7

    Information security guide for government executives

    Authors: Bowen, Pauline
    Published: U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 2007
    Other Authors:
    Physical Description: 14 pages : digital, PDF file.
    Connect to online resource - All users (Federal Depository Library Program Persistant URL)
    Government Document Electronic eBook
  8. 8

    Information security handbook : a guide for managers

    Authors: Bowen, Pauline
    Published: U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 2006
    Other Authors: “…Hash, Joan…”
    Physical Description: 1 online resource (ix, 136, 3, 29 pages) : illustrations.
    Connect to online resource - All users (Federal Depository Library Program Persistant URL)
    Government Document Electronic eBook