Publications of the National Institute of Standards and Technology 1994-1996 Catalog ... Nist Special Publication 305 - Supplement 26 ... U
Title | Publications of the National Institute of Standards and Technology 1994-1996 Catalog ... Nist Special Publication 305 - Supplement 26 ... U PDF eBook |
Author | |
Publisher | |
Pages | |
Release | 1998* |
Genre | |
ISBN |
Publications of the National Institute of Standards and Technology ... Catalog
Title | Publications of the National Institute of Standards and Technology ... Catalog PDF eBook |
Author | National Institute of Standards and Technology (U.S.) |
Publisher | |
Pages | 1162 |
Release | 1994 |
Genre | |
ISBN |
NIST Standard Reference Data Products Catalog 1994
Title | NIST Standard Reference Data Products Catalog 1994 PDF eBook |
Author | National Institute of Standards and Technology |
Publisher | |
Pages | 109 |
Release | 1994 |
Genre | |
ISBN |
NIST standard reference materials catalog
Title | NIST standard reference materials catalog PDF eBook |
Author | Nancy M. Trahey |
Publisher | |
Pages | 167 |
Release | 1995 |
Genre | |
ISBN |
Publications of the National Bureau of Standards, 1966-1967
Title | Publications of the National Bureau of Standards, 1966-1967 PDF eBook |
Author | United States. National Bureau of Standards |
Publisher | |
Pages | 228 |
Release | 1969 |
Genre | |
ISBN |
The Economic Impacts of Inadequate Infrastructure for Software Testing
Title | The Economic Impacts of Inadequate Infrastructure for Software Testing PDF eBook |
Author | RTI International. Health, Social, and Economics Research |
Publisher | |
Pages | |
Release | 2002 |
Genre | Computer software |
ISBN |
Guide to Bluetooth Security
Title | Guide to Bluetooth Security PDF eBook |
Author | Karen Scarfone |
Publisher | DIANE Publishing |
Pages | 43 |
Release | 2009-05 |
Genre | Computers |
ISBN | 1437913490 |
This document provides info. to organizations on the security capabilities of Bluetooth and provide recommendations to organizations employing Bluetooth technologies on securing them effectively. It discusses Bluetooth technologies and security capabilities in technical detail. This document assumes that the readers have at least some operating system, wireless networking, and security knowledge. Because of the constantly changing nature of the wireless security industry and the threats and vulnerabilities to the technologies, readers are strongly encouraged to take advantage of other resources (including those listed in this document) for more current and detailed information. Illustrations.