![Computing / Cyberwarfare / Crime prevention / National security / Federal Information Security Management Act / National Institute of Standards and Technology / FIPS 140-2 / National Strategy for Trusted Identities in Cyberspace / National Cybersecurity Center / Computer security / Security / Computer network security Computing / Cyberwarfare / Crime prevention / National security / Federal Information Security Management Act / National Institute of Standards and Technology / FIPS 140-2 / National Strategy for Trusted Identities in Cyberspace / National Cybersecurity Center / Computer security / Security / Computer network security](https://www.pdfsearch.io/img/5944df90ce8008d01e443d0e497271a3.jpg) Date: 2014-03-06 12:33:10Computing Cyberwarfare Crime prevention National security Federal Information Security Management Act National Institute of Standards and Technology FIPS 140-2 National Strategy for Trusted Identities in Cyberspace National Cybersecurity Center Computer security Security Computer network security | | Testimony of Charles H. Romine Director Information Technology Laboratory National Institute of Standards and TechnologyAdd to Reading ListSource URL: nist.govDownload Document from Source Website File Size: 117,03 KBShare Document on Facebook
|