It looks like you're offline.
Open Library logo
additional options menu

MARC Record from harvard_bibliographic_metadata

Record ID harvard_bibliographic_metadata/ab.bib.13.20150123.full.mrc:519293465:1638
Source harvard_bibliographic_metadata
Download Link /show-records/harvard_bibliographic_metadata/ab.bib.13.20150123.full.mrc:519293465:1638?format=raw

LEADER: 01638nam a2200385 a 4500
001 013463424-1
005 20121115021545.0
006 m o d f
008 121001s2012 mdu ob f000 0 eng c
035 0 $aocn811558970
035 $a(FDLP)ocn811558970
040 $aGPO$cGPO
042 $apcc
043 $an-us---
074 $a0247 (online)
086 0 $aC 13.10:800-124/REV.1/DRAFT
100 1 $aSouppaya, Murugiah.
245 10 $aGuidelines for managing and securing mobile devices in the enterprise (draft)$h[electronic resource] :$brecommendations of the National Institute of Standards and Technology /$cMurugiah Souppaya, Karen Scarfone.
250 $aRevision 1, draft.
260 $aGaithersburg, MD :$bU.S. Dept. of Commerce, National Institute of Standards and Technology,$c[2012]
300 $a1 online resource (viii, 20 p.)
490 1 $aNIST special publication ;$v800-124.$aComputer security
500 $aTitle from PDF title screen (viewed Sept. 27, 2012).
500 $a"July 2012."
504 $aIncludes bibliographical references.
650 0 $aSmartphones$xSecurity measures$xStandards$zUnited States.
650 0 $aMobile computing$xSecurity measures$xStandards$zUnited States.
650 0 $aPortable computers$xSecurity measures$xStandards$zUnited States.
650 0 $aTelecommuting$xSecurity measures$xStandards$zUnited States.
700 1 $aKent, Karen$q(Karen Ann)
710 2 $aNational Institute of Standards and Technology (U.S.)
830 0 $aNIST special publication ;$v800-124.
830 0 $aNIST special publication.$pComputer security.
988 $a20121115
906 $0OCLC