Withdrawn on August 01, 2018.
Guide to Selecting Information Technology Security Products
Date Published: October 2003
Planning Note (8/1/2018):
Withdrawn: Does not reflect current security product types, and references are outdated.
Keywords computer security; enterprise architecture; life cycle; products; security controls
Security Assessment and Authorization;
Identification and Authentication;
System and Communications Protection;
System and Information Integrity;
System and Services Acquisition;
SP 800-36 (DOI)