Add Data Integrity_ Recovering from Ransomware and Other Destructive Events.pdf 73bf0b0 verified ethanolivertroy commited on 21 days ago
Add Security Property Verification by Transition Model.pdf 3fdf206 verified ethanolivertroy commited on 21 days ago
Add NIST Cybersecurity Framework 2.0_ Quick-Start Guide for Using the CSF Tiers.pdf 9569c23 verified ethanolivertroy commited on 21 days ago
Add Cryptographic Module Validation Program (CMVP) Security Policy Requirements_ CMVP Validation Authority Updates to ISO_IEC 24759 and ISO_IEC 19790 Anne.pdf 8428251 verified ethanolivertroy commited on 21 days ago
Add Technical Guide to Information Security Testing and Assessment.pdf 84574c6 verified ethanolivertroy commited on 21 days ago
Add A Data Structure for Integrity Protection with Erasure Capability.pdf fb65eb4 verified ethanolivertroy commited on 21 days ago
Add Digital Identity Guidelines_ Authentication and Authenticator Management.pdf 078aef1 verified ethanolivertroy commited on 21 days ago
Add 2nd Annual PKI Research Workshop Proceedings.pdf 34b4b1d verified ethanolivertroy commited on 21 days ago
Add Guidelines on Electronic Mail Security.pdf db0a911 verified ethanolivertroy commited on 21 days ago
Add Mobile Device Security_ Cloud and Hybrid Builds.pdf f9c3fad verified ethanolivertroy commited on 21 days ago
Add NIST Test Personal Identity Verification (PIV) Cards.pdf 246abfb verified ethanolivertroy commited on 21 days ago
Add Security Segmentation in a Small Manufacturing Environment.pdf 5f72187 verified ethanolivertroy commited on 21 days ago
Add Specification for Asset Reporting Format 1.1.pdf 0ee5493 verified ethanolivertroy commited on 21 days ago
Add Interfaces for Personal Identity Verification_ Part 1 – PIV Card Application Namespace, Data Model and Representation.pdf e2cf21b verified ethanolivertroy commited on 21 days ago
Add Establishing Wireless Robust Security Networks_ A Guide to IEEE 802.11i.pdf fa54100 verified ethanolivertroy commited on 21 days ago
Add Derived Personal Identity Verification (PIV) Credentials (DPC) Proof of Concept Research.pdf 80b497d verified ethanolivertroy commited on 21 days ago
Add Derived Personal Identity Verification (PIV) Credentials.pdf 2f645cd verified ethanolivertroy commited on 21 days ago
Add User's Guide to Telework and Bring Your Own Device (BYOD) Security.pdf d4b2877 verified ethanolivertroy commited on 21 days ago
Add Codes for Identification of Federal and Federally-Assisted Organizations.pdf 0c4c57b verified ethanolivertroy commited on 21 days ago
Add Guidelines for the Creation of Interoperable Software Identification (SWID) Tags.pdf 0d59c9b verified ethanolivertroy commited on 21 days ago
Add Best Practices for Privileged User PIV Authentication.pdf 8a9263d verified ethanolivertroy commited on 21 days ago
Add Recommendation for Cryptographic Key Generation.pdf 5d43409 verified ethanolivertroy commited on 21 days ago
Add Federal Cybersecurity Role-Based Training Approaches, Successes, and Challenges.pdf 61224ea verified ethanolivertroy commited on 21 days ago
Add Protecting Controlled Unclassified Information (CUI)_ NIST Special Publication 800-171, Revision 3. Small Business Primer.pdf 09fd1bb verified ethanolivertroy commited on 21 days ago
Add Report on the Design-A-Thon_ Designing Effective and Accessible Approaches for Digital Product Cybersecurity Education and Awareness.pdf bb5fe28 verified ethanolivertroy commited on 21 days ago
Add Multi-Factor Authentication for Criminal Justice Information Systems_ Implementation Considerations for Protecting Criminal Justice Information.pdf 1d6abe2 verified ethanolivertroy commited on 21 days ago
Add Sample Statement of Work for Federal Computer Security Services_ For use In-House or Contracting Out.pdf 9241256 verified ethanolivertroy commited on 21 days ago
Add A Profile for U.S. Federal Cryptographic Key Management Systems (CKMS).pdf 0278c95 verified ethanolivertroy commited on 21 days ago
Add Trusted Geolocation in the Cloud_ Proof of Concept Implementation.pdf 52a7bc5 verified ethanolivertroy commited on 21 days ago
Add Annual Report 2018_ NIST_ITL Cybersecurity Program.pdf c514714 verified ethanolivertroy commited on 21 days ago
Add Verification and Test Methods for Access Control Policies_Models.pdf 9f66b81 verified ethanolivertroy commited on 21 days ago
Add Discussion on the Full Entropy Assumption of the SP 800-90 Series.pdf 979a81f verified ethanolivertroy commited on 21 days ago
Add Interfaces for Personal Identity Verification_ Part 3 – PIV Client Application Programming Interface.pdf f19e1b6 verified ethanolivertroy commited on 21 days ago
Add Summary Report for the Virtual Workshop Addressing Public Comment on NIST Cybersecurity for IoT Guidance.pdf bc5ceb5 verified ethanolivertroy commited on 21 days ago
Add Recommendation for Obtaining Assurances for Digital Signature Applications.pdf f1b5600 verified ethanolivertroy commited on 21 days ago
Add Recommendations for Discrete Logarithm-based Cryptography_ Elliptic Curve Domain Parameters.pdf 4979339 verified ethanolivertroy commited on 21 days ago
Add Guide to Information Technology Security Services.pdf 347c8ac verified ethanolivertroy commited on 21 days ago
Add Identifying and Estimating Cybersecurity Risk for Enterprise Risk Management.pdf dce6519 verified ethanolivertroy commited on 21 days ago