nist-publications-raw / .gitattributes

Commit History

Add Data Integrity_ Recovering from Ransomware and Other Destructive Events.pdf
73bf0b0
verified

ethanolivertroy commited on

Add Security Property Verification by Transition Model.pdf
3fdf206
verified

ethanolivertroy commited on

Add NIST Cybersecurity Framework 2.0_ Quick-Start Guide for Using the CSF Tiers.pdf
9569c23
verified

ethanolivertroy commited on

Add Cryptographic Module Validation Program (CMVP) Security Policy Requirements_ CMVP Validation Authority Updates to ISO_IEC 24759 and ISO_IEC 19790 Anne.pdf
8428251
verified

ethanolivertroy commited on

Add Technical Guide to Information Security Testing and Assessment.pdf
84574c6
verified

ethanolivertroy commited on

Add A Data Structure for Integrity Protection with Erasure Capability.pdf
fb65eb4
verified

ethanolivertroy commited on

Add Digital Identity Guidelines_ Authentication and Authenticator Management.pdf
078aef1
verified

ethanolivertroy commited on

Add 2nd Annual PKI Research Workshop Proceedings.pdf
34b4b1d
verified

ethanolivertroy commited on

Add Guidelines on Electronic Mail Security.pdf
db0a911
verified

ethanolivertroy commited on

Add Mobile Device Security_ Cloud and Hybrid Builds.pdf
f9c3fad
verified

ethanolivertroy commited on

Add NIST Test Personal Identity Verification (PIV) Cards.pdf
246abfb
verified

ethanolivertroy commited on

Add Security Segmentation in a Small Manufacturing Environment.pdf
5f72187
verified

ethanolivertroy commited on

Add Specification for Asset Reporting Format 1.1.pdf
0ee5493
verified

ethanolivertroy commited on

Add Interfaces for Personal Identity Verification_ Part 1 – PIV Card Application Namespace, Data Model and Representation.pdf
e2cf21b
verified

ethanolivertroy commited on

Add Establishing Wireless Robust Security Networks_ A Guide to IEEE 802.11i.pdf
fa54100
verified

ethanolivertroy commited on

Add Derived Personal Identity Verification (PIV) Credentials (DPC) Proof of Concept Research.pdf
80b497d
verified

ethanolivertroy commited on

Add Derived Personal Identity Verification (PIV) Credentials.pdf
2f645cd
verified

ethanolivertroy commited on

Add User's Guide to Telework and Bring Your Own Device (BYOD) Security.pdf
d4b2877
verified

ethanolivertroy commited on

Add Codes for Identification of Federal and Federally-Assisted Organizations.pdf
0c4c57b
verified

ethanolivertroy commited on

Add Guidelines for the Creation of Interoperable Software Identification (SWID) Tags.pdf
0d59c9b
verified

ethanolivertroy commited on

Add Best Practices for Privileged User PIV Authentication.pdf
8a9263d
verified

ethanolivertroy commited on

Add Recommendation for Cryptographic Key Generation.pdf
5d43409
verified

ethanolivertroy commited on

Add Federal Cybersecurity Role-Based Training Approaches, Successes, and Challenges.pdf
61224ea
verified

ethanolivertroy commited on

Add Protecting Controlled Unclassified Information (CUI)_ NIST Special Publication 800-171, Revision 3. Small Business Primer.pdf
09fd1bb
verified

ethanolivertroy commited on

Add Report on the Design-A-Thon_ Designing Effective and Accessible Approaches for Digital Product Cybersecurity Education and Awareness.pdf
bb5fe28
verified

ethanolivertroy commited on

Add Multi-Factor Authentication for Criminal Justice Information Systems_ Implementation Considerations for Protecting Criminal Justice Information.pdf
1d6abe2
verified

ethanolivertroy commited on

Add Report_ Authentication Diary Study.pdf
3f674b7
verified

ethanolivertroy commited on

Add Sample Statement of Work for Federal Computer Security Services_ For use In-House or Contracting Out.pdf
9241256
verified

ethanolivertroy commited on

Add A Profile for U.S. Federal Cryptographic Key Management Systems (CKMS).pdf
0278c95
verified

ethanolivertroy commited on

Add Trusted Geolocation in the Cloud_ Proof of Concept Implementation.pdf
52a7bc5
verified

ethanolivertroy commited on

Add Annual Report 2018_ NIST_ITL Cybersecurity Program.pdf
c514714
verified

ethanolivertroy commited on

Add Verification and Test Methods for Access Control Policies_Models.pdf
9f66b81
verified

ethanolivertroy commited on

Add Discussion on the Full Entropy Assumption of the SP 800-90 Series.pdf
979a81f
verified

ethanolivertroy commited on

Add Interfaces for Personal Identity Verification_ Part 3 – PIV Client Application Programming Interface.pdf
f19e1b6
verified

ethanolivertroy commited on

Add Summary Report for the Virtual Workshop Addressing Public Comment on NIST Cybersecurity for IoT Guidance.pdf
bc5ceb5
verified

ethanolivertroy commited on

Add Recommendation for Obtaining Assurances for Digital Signature Applications.pdf
f1b5600
verified

ethanolivertroy commited on

Add Recommendations for Discrete Logarithm-based Cryptography_ Elliptic Curve Domain Parameters.pdf
4979339
verified

ethanolivertroy commited on

Add Guide to Information Technology Security Services.pdf
347c8ac
verified

ethanolivertroy commited on

Add Identifying and Estimating Cybersecurity Risk for Enterprise Risk Management.pdf
dce6519
verified

ethanolivertroy commited on