Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 232,788,133 papers from all fields of science
Search
Sign In
Create Free Account
Security Technical Implementation Guide
Known as:
Stig
A Security Technical Implementation Guide (STIG) is a cybersecurity methodology for standardizing security protocols within networks, servers…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
5 relations
Broader (2)
Computer security
Configuration management
Desktop computer
Information assurance vulnerability alert
Security Content Automation Protocol
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Review
2014
Review
2014
Identification of Talent in Soccer – What Do Coaches Look For ?
S. A. Sæther
2014
Corpus ID: 38856829
Published on the Internet, www.idrottsforum.org/saether140319, (ISSN 1652–7224), 2014-03-19 Copyright © Stig Arve Sæther 2014…
Expand
Review
2007
Review
2007
Volume computation : a comparison of total station versus laser scanner and different software
Bettina Pflipsen
2007
Corpus ID: 96423425
The Laser scanner belongs to the new devices on the market of surveying instruments. Tests and measurements gave and still give…
Expand
2005
2005
SELECTION OF CURRENT TRANSFORMERS & WIRE SIZING IN SUBSTATIONS
S. Ganesan
2005
Corpus ID: 18757008
More and more sub-stations are retrofitted with numerical relays, meters and monitoring devices. Most often, the older relay gets…
Expand
2003
2003
Running research-oriented final year projects for CS and IS students
B. Olsson
,
M. Berndtsson
,
B. Lundell
,
J. Hansson
Technical Symposium on Computer Science Education
2003
Corpus ID: 17943326
In this paper we discuss the difficulties of designing and running a final year project course for computer science and…
Expand
Review
2002
Review
2002
Mutual Recognition of Professional Qualifications
Frances Plimmer
2002
Corpus ID: 154213248
In the light of Europe’s experience of its Directive on mutual recognition of professional qualifications and the World Trade…
Expand
Review
2002
Review
2002
Technical description of GRASP8 [Book Review]
T. Milligan
IEEE Antennas & Propagation Magazine
2002
Corpus ID: 23896360
We have entered an era of self publishing. This book is available directly from TICRA in a downloaded file, which also contains a…
Expand
1996
1996
The expression of modality in Korean
A. Wymann
1996
Corpus ID: 60127189
1996
1996
Multi-Scale Segmentation of Grey-Scale Images
O. F. Olsen
1996
Corpus ID: 18651058
The topic of this thesis is segmentation of grey{scale images by accessing and relating the structures of the image for all…
Expand
Review
1969
Review
1969
Review: Stig Kanger, The Morning Star Paradox; Stig Kanger, A Note on Quantification and Modalities
J. Hintikka
1969
Corpus ID: 117549980
1963
1963
Stig of the Dump
C. King
,
E. Ardizzone
1963
Corpus ID: 106530895
Barney is a solitary eight-year-old, given to wandering off by himself. One day he is lying on the edge of disused chalk-pit when…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE