Commit History

Add Building a Cybersecurity and Privacy Learning Program.pdf
77e5266
verified

ethanolivertroy commited on

Add Data Confidentiality_ Identifying and Protecting Assets Against Data Breaches.pdf
680469d
verified

ethanolivertroy commited on

Add 5th Annual PKI R&D Workshop _Making PKI Easy to Use_ Proceedings.pdf
0a320af
verified

ethanolivertroy commited on

Add Cybersecurity Framework Profile for Electric Vehicle Extreme Fast Charging Infrastructure.pdf
b741587
verified

ethanolivertroy commited on

Add COTS Security Protection Profile - Operating Systems (CSPP-OS) (Worked Example Applying Guidance of NISTIR-6462, CSPP) Version 1.0.pdf
4ebb140
verified

ethanolivertroy commited on

Add Ordered t-way Combinations for Testing State-based Systems.pdf
d26174f
verified

ethanolivertroy commited on

Add Computer Security Division 2012 Annual Report.pdf
8a262c9
verified

ethanolivertroy commited on

Add Assessing Security Requirements for Controlled Unclassified Information.pdf
ed10cb9
verified

ethanolivertroy commited on

Add Secure Hash Standard (SHS).pdf
183e2f9
verified

ethanolivertroy commited on

Add The Common Configuration Scoring System (CCSS)_ Metrics for Software Security Configuration Vulnerabilities.pdf
1af960c
verified

ethanolivertroy commited on

Add Guide to Bluetooth Security.pdf
c478032
verified

ethanolivertroy commited on

Add Report on the Block Cipher Modes of Operation in the NIST SP 800-38 Series.pdf
3eb7a35
verified

ethanolivertroy commited on

Add Control Baselines for Information Systems and Organizations.pdf
d3dc346
verified

ethanolivertroy commited on

Add Recommendation for Block Cipher Modes of Operation_ Three Variants of Ciphertext Stealing for CBC Mode.pdf
27e9dbd
verified

ethanolivertroy commited on

Add The Common Misuse Scoring System (CMSS)_ Metrics for Software Feature Misuse Vulnerabilities.pdf
60276e1
verified

ethanolivertroy commited on

Add ISCMA_ An Information Security Continuous Monitoring Program Assessment.pdf
cc0d1d9
verified

ethanolivertroy commited on

Add Derived PIV Application and Data Model Test Guidelines.pdf
16ec868
verified

ethanolivertroy commited on

Add Summary Report for “Workshop on Updating Manufacturer Guidance for Securable Connected Product Development”.pdf
34a2393
verified

ethanolivertroy commited on

Add Proceedings of the Cybersecurity in Cyber-Physical Systems Workshop, April 23-24, 2012.pdf
f7ce9a3
verified

ethanolivertroy commited on

Add Introduction to Cybersecurity for Commercial Satellite Operations.pdf
39cd80d
verified

ethanolivertroy commited on

Add Status Report on the Third Round of the NIST Post-Quantum Cryptography Standardization Process.pdf
d9a117b
verified

ethanolivertroy commited on

Add Foundational Cybersecurity Activities for IoT Device Manufacturers.pdf
b926ea6
verified

ethanolivertroy commited on

Add An Introduction to Information Security.pdf
4048070
verified

ethanolivertroy commited on

Add Standards for Security Categorization of Federal Information and Information Systems.pdf
f92a9af
verified

ethanolivertroy commited on

Add Automation Support for Security Control Assessments_ Volume 1_ Overview.pdf
ed05023
verified

ethanolivertroy commited on

Add Transitioning to the Security Content Automation Protocol (SCAP) Version 2.pdf
b3d37c6
verified

ethanolivertroy commited on

Add Automation Support for Control Assessments_ Project Update and Vision.pdf
bfbad7e
verified

ethanolivertroy commited on

Add Maintenance Testing for the Data Encryption Standard.pdf
10e7e5c
verified

ethanolivertroy commited on

Add Information Security Handbook_ A Guide for Managers.pdf
2cb3d06
verified

ethanolivertroy commited on

Add Data Integrity_ Recovering from Ransomware and Other Destructive Events.pdf
73bf0b0
verified

ethanolivertroy commited on

Add Security Property Verification by Transition Model.pdf
3fdf206
verified

ethanolivertroy commited on

Add NIST Cybersecurity Framework 2.0_ Quick-Start Guide for Using the CSF Tiers.pdf
9569c23
verified

ethanolivertroy commited on

Add Cryptographic Module Validation Program (CMVP) Security Policy Requirements_ CMVP Validation Authority Updates to ISO_IEC 24759 and ISO_IEC 19790 Anne.pdf
8428251
verified

ethanolivertroy commited on

Add Technical Guide to Information Security Testing and Assessment.pdf
84574c6
verified

ethanolivertroy commited on

Add A Data Structure for Integrity Protection with Erasure Capability.pdf
fb65eb4
verified

ethanolivertroy commited on

Add Digital Identity Guidelines_ Authentication and Authenticator Management.pdf
078aef1
verified

ethanolivertroy commited on

Add 2nd Annual PKI Research Workshop Proceedings.pdf
34b4b1d
verified

ethanolivertroy commited on

Add Guidelines on Electronic Mail Security.pdf
db0a911
verified

ethanolivertroy commited on

Add Mobile Device Security_ Cloud and Hybrid Builds.pdf
f9c3fad
verified

ethanolivertroy commited on

Add NIST Test Personal Identity Verification (PIV) Cards.pdf
246abfb
verified

ethanolivertroy commited on

Add Security Segmentation in a Small Manufacturing Environment.pdf
5f72187
verified

ethanolivertroy commited on

Add Specification for Asset Reporting Format 1.1.pdf
0ee5493
verified

ethanolivertroy commited on

Add Interfaces for Personal Identity Verification_ Part 1 – PIV Card Application Namespace, Data Model and Representation.pdf
e2cf21b
verified

ethanolivertroy commited on

Add Establishing Wireless Robust Security Networks_ A Guide to IEEE 802.11i.pdf
fa54100
verified

ethanolivertroy commited on

Add Derived Personal Identity Verification (PIV) Credentials (DPC) Proof of Concept Research.pdf
80b497d
verified

ethanolivertroy commited on

Add Derived Personal Identity Verification (PIV) Credentials.pdf
2f645cd
verified

ethanolivertroy commited on

Add User's Guide to Telework and Bring Your Own Device (BYOD) Security.pdf
d4b2877
verified

ethanolivertroy commited on

Add Codes for Identification of Federal and Federally-Assisted Organizations.pdf
0c4c57b
verified

ethanolivertroy commited on

Add Guidelines for the Creation of Interoperable Software Identification (SWID) Tags.pdf
0d59c9b
verified

ethanolivertroy commited on

Add Best Practices for Privileged User PIV Authentication.pdf
8a9263d
verified

ethanolivertroy commited on