World Library  



Techonology eBook Collection (2,632 Books)


TA & OTP REPORTS NTIS is the federal government's central source for the sale of scientific, technical, engineering, and related business information by or for the US government and complementary materials from international sources. TA & OTP Reports is a series of studies of global industrial research and development, broadband demand, venture capital for technology, emerging technologies such as nanotechnology, among other topics.

 
  • Cover Image

Eas Desktop Users Guide General Services Administration

Technical Reference Publication

Description: This document contains information regarding the EAS desktop users? guide general services administration.

Read More
  • Cover Image

National Institute of Standards and Technology

Technical Reference Publication

Excerpt: INTRODUCTION TO PARTICLE SIZE CHARACTERIZATION. Knowledge of particle sizes and the size distribution of a powder system is a prerequisite for most production and processing operations. Particle size and size distribution have a significant effect on the mechanical strength, density, electrical and thermal properties of the finished object. Significant production losses can be incurred due to high rejection rates if size and size distribution of powders being us...

Read More
  • Cover Image

Itl Bulletin Series

By: John Wack

Technical Reference Publication

Excerpt: This ITL Bulletin discusses advances in firewall technology and outlines a number of issues involved in selecting the right kind of firewall for your organizational environment. It contains a series of recommendations for configuring and managing firewalls. The bulletin summarizes NIST Special Publication 800-41, Guidelines on Firewalls and Firewall Policy.

Read More
  • Cover Image

Itl Bulletin Series

By: Shirley M. Radack

Technical Reference Publication

Excerpt: Ensure that the mail server operating system is deployed, configured, and managed to meet the security requirements of the organization. The operating system that supports the mail servers must be secure. It is important to check the hardware and software configurations, which may have been set originally to emphasize features, functions, and ease of use, rather than the security of the system. Since each organization has unique security needs, the mail server a...

Read More
  • Cover Image

Itl Bulletin Series

By: Annabelle Lee

Technical Reference Publication

Excerpt: This document summarizes a new ITL document, NIST Special Publication (SP) 800-21?Guideline for Implementing Cryptography in the Federal Government.

Read More
  • Cover Image

Itl Bulletin Series

By: Joan S. Hash

Technical Reference Publication

Excerpt: This ITL Bulletin describes risk management methodology and how to integrate it into an information technology (IT) security program. This means effectively integrating it into an organization?s systems development life cycle (SDLC). Key to implementation of a successful enterprise-wide IT security program is the ability to identify and protect critical information assets. A sound risk management program is the enabler needed to make the implementation successfu...

Read More
  • Cover Image

Itl Bulletin Series

Technical Reference Publication

Excerpt: The Internet provides access to an ever-expanding storehouse of electronic information via the World Wide Web. Many people use the Web to browse, explore, and search for information. Organizations find the Web invaluable in providing information about their services and products. Web technology has been successful in linking homes, businesses, and governments together, and new applications involving connection to the Internet are appearing daily. This bulletin o...

Read More
  • Cover Image

Itl Bulletin Series

Technical Reference Publication

Excerpt: To provide needed increased security protection of sensitive, unclassified information in federal computer systems, NIST's Information Technology Laboratory recently took steps to enhance two Federal Information Processing Standards (FIPS): FIPS 46-2, Data Encryption Standard, and FIPS 186, Digital Signature Standard. These two standards are discussed below.

Read More
  • Cover Image

Review and Approval

Technical Reference Publication

Excerpt: Routing a Requisition for Review and Approval Requisitions and supporting documentation can be routed to one or more users for review and approval BEFORE they are submitted to the Contracting Activity. The route process should include, for example, the Approving Official, Funds Certifying Official, Contract Manager, and Contracting Activity Team Leader or Contract Specialist, as appropriate.

Read More
  • Cover Image

Itl Bulletin Series

By: Wayne A. Jansen

Technical Reference Publication

Introduction: In today?s world, both private and public sectors depend upon information technology (IT) systems to perform essential and mission-critical functions. Often, as technology improves to provide new capabilities and features, new vulnerabilities are introduced along with these functional improvements. Organizations implementing and using these advanced technologies must, therefore, be increasingly on guard.

Read More
  • Cover Image

Itl Bulletin Series

By: Sheila Frankel

Technical Reference Publication

Excerpt: In its early days, the Internet was the domain of academics and researchers. Its goal was to maximize communication, connectedness and collaboration, and to minimize barriers that would detract from the realization of those goals. By the late 1980s, it became apparent that some individuals were abusing the capabilities of the Internet and were reading or changing information they shouldn?t, and even deliberately causing some Internet services to fail. Security c...

Read More
  • Cover Image

Itl Bulletin Series

By: Shirley M. Radack

Technical Reference Publication

Excerpt: A new Federal Information Processing Standard (FIPS), recently approved by the Secretary of Commerce, will help federal agencies protect the information and information systems that support their operations and assets. FIPS 199, Standards for Security Categorization of Federal Information and Information Systems, is an important component of a suite of standards and guidelines that NIST is developing to improve the security in federal information systems, includ...

Read More
  • Cover Image

Notice of Availability of Government- Owned Invention

Technical Reference Publication

Excerpt: Would be made to the Board on a case by-case basis. In accordance with the Board?s regulations, a member of the FTZ Staff has been designated examiner to investigate the application and report to the Board. Public comment on the application is invited from interested parties. Submissions (original and 3 copies) shall be addressed to the Board?s Executive Secretary at one of the following addresses...

Read More
  • Cover Image

Itl Bulletin Series

Technical Reference Publication

Excerpt: Recent break-ins to U.S. government and university computer systems demonstrate just how vulnerable even the most sophisticated organizations can be to technological assaults. While the new attacks caused no apparent damage to information or to the systems, these incidents are unfortunate reminders that the potential exists for severe damage. Systems are at risk from fraud, user errors, accidents and natural disasters, as well as from sabotage and other malicious acts.

Read More
  • Cover Image

Vendor Management

Technical Reference Publication

Excerpt: At the EAS Desktop, click on the ?Vendor? icon. Or, click on ?Research? from the menu bar, then select ?Vendors? and then select ?Vendor Profiles? from the pull-down menus that appear.

Read More
  • Cover Image

Itl Bulletin Series

By: William E. Burr

Technical Reference Publication

Introduction: In today?s world, both private and public sectors depend upon information technology (IT) systems to perform essential and mission-critical functions. Often, as technology improves to provide new capabilities and features, new vulnerabilities are introduced along with these functional improvements. Organizations implementing and using these advanced technologies must, therefore, be increasingly on guard.

Read More
  • Cover Image

Itl Bulletin Series

By: Shirley M. Radack

Technical Reference Publication

Excerpt: Information technology security products are essential to better secure information technology (IT) systems, and many products to protect IT systems are available in the marketplace today. But IT security products alone will not guarantee that an organization?s IT systems are secure. Security products should be selected and used within the organization?s overall program to manage the design, development, and maintenance of its IT security infrastructure, and to ...

Read More
  • Cover Image

Itl Bulletin Series

Technical Reference Publication

Excerpt: Information technology (IT) security is ?a new high-risk area that touches virtually every major aspect of government operations,? according to a recent U.S. General Accounting Office (GAO) report on federal government information technology systems. GAO cited several factors that contributed to the risks, including insufficient awareness and understanding of information security risks on the part of managers, and a shortage of personnel with sufficient technica...

Read More
  • Cover Image

Itl Bulletin Series

Technical Reference Publication

Excerpt: Today?s rapidly changing technical environment requires federal agencies to adopt a minimum set of management controls to protect vital information technology (IT) resources. These management controls are directed at individual IT users in order to reflect the distributed nature of today?s technology. Technical and operational controls support management controls. To be effective, all of these controls must interrelate.

Read More
  • Cover Image

Credit Card Purchases

Technical Reference Publication

Excerpt: Click on the ?Update Edit Report? button to display a report reflecting any corrections made. If errors are still listed, continue to make corrections and click on the Update Edit Report? button until the message reads ?No errors found! SF 279 passes edit checks.? Click on the ?Print 279? button and then click on the button. The SF 279 will print to the Windows printer.

Read More
 
1
|
2
|
3
|
4
|
5
Records: 1 - 20 of 2,632 - Pages: 



Copyright © World Public Library. All rights reserved. eBooks from World Public Library are sponsored by the World Public Library Association,
a 501c(4) Member's Support Non-Profit Organization, and is NOT affiliated with any governmental agency or department.