Add Building a Cybersecurity and Privacy Learning Program.pdf 77e5266 verified ethanolivertroy commited on 19 days ago
Add Data Confidentiality_ Identifying and Protecting Assets Against Data Breaches.pdf 680469d verified ethanolivertroy commited on 19 days ago
Add 5th Annual PKI R&D Workshop _Making PKI Easy to Use_ Proceedings.pdf 0a320af verified ethanolivertroy commited on 19 days ago
Add Cybersecurity Framework Profile for Electric Vehicle Extreme Fast Charging Infrastructure.pdf b741587 verified ethanolivertroy commited on 19 days ago
Add COTS Security Protection Profile - Operating Systems (CSPP-OS) (Worked Example Applying Guidance of NISTIR-6462, CSPP) Version 1.0.pdf 4ebb140 verified ethanolivertroy commited on 19 days ago
Add Ordered t-way Combinations for Testing State-based Systems.pdf d26174f verified ethanolivertroy commited on 19 days ago
Add Computer Security Division 2012 Annual Report.pdf 8a262c9 verified ethanolivertroy commited on 19 days ago
Add Assessing Security Requirements for Controlled Unclassified Information.pdf ed10cb9 verified ethanolivertroy commited on 19 days ago
Add The Common Configuration Scoring System (CCSS)_ Metrics for Software Security Configuration Vulnerabilities.pdf 1af960c verified ethanolivertroy commited on 19 days ago
Add Report on the Block Cipher Modes of Operation in the NIST SP 800-38 Series.pdf 3eb7a35 verified ethanolivertroy commited on 19 days ago
Add Control Baselines for Information Systems and Organizations.pdf d3dc346 verified ethanolivertroy commited on 19 days ago
Add Recommendation for Block Cipher Modes of Operation_ Three Variants of Ciphertext Stealing for CBC Mode.pdf 27e9dbd verified ethanolivertroy commited on 19 days ago
Add The Common Misuse Scoring System (CMSS)_ Metrics for Software Feature Misuse Vulnerabilities.pdf 60276e1 verified ethanolivertroy commited on 19 days ago
Add ISCMA_ An Information Security Continuous Monitoring Program Assessment.pdf cc0d1d9 verified ethanolivertroy commited on 19 days ago
Add Derived PIV Application and Data Model Test Guidelines.pdf 16ec868 verified ethanolivertroy commited on 19 days ago
Add Summary Report for “Workshop on Updating Manufacturer Guidance for Securable Connected Product Development”.pdf 34a2393 verified ethanolivertroy commited on 19 days ago
Add Proceedings of the Cybersecurity in Cyber-Physical Systems Workshop, April 23-24, 2012.pdf f7ce9a3 verified ethanolivertroy commited on 19 days ago
Add Introduction to Cybersecurity for Commercial Satellite Operations.pdf 39cd80d verified ethanolivertroy commited on 19 days ago
Add Status Report on the Third Round of the NIST Post-Quantum Cryptography Standardization Process.pdf d9a117b verified ethanolivertroy commited on 19 days ago
Add Foundational Cybersecurity Activities for IoT Device Manufacturers.pdf b926ea6 verified ethanolivertroy commited on 19 days ago
Add An Introduction to Information Security.pdf 4048070 verified ethanolivertroy commited on 19 days ago
Add Standards for Security Categorization of Federal Information and Information Systems.pdf f92a9af verified ethanolivertroy commited on 19 days ago
Add Automation Support for Security Control Assessments_ Volume 1_ Overview.pdf ed05023 verified ethanolivertroy commited on 19 days ago
Add Transitioning to the Security Content Automation Protocol (SCAP) Version 2.pdf b3d37c6 verified ethanolivertroy commited on 19 days ago
Add Automation Support for Control Assessments_ Project Update and Vision.pdf bfbad7e verified ethanolivertroy commited on 19 days ago
Add Maintenance Testing for the Data Encryption Standard.pdf 10e7e5c verified ethanolivertroy commited on 19 days ago
Add Information Security Handbook_ A Guide for Managers.pdf 2cb3d06 verified ethanolivertroy commited on 19 days ago
Add Data Integrity_ Recovering from Ransomware and Other Destructive Events.pdf 73bf0b0 verified ethanolivertroy commited on 19 days ago
Add Security Property Verification by Transition Model.pdf 3fdf206 verified ethanolivertroy commited on 19 days ago
Add NIST Cybersecurity Framework 2.0_ Quick-Start Guide for Using the CSF Tiers.pdf 9569c23 verified ethanolivertroy commited on 19 days ago
Add Cryptographic Module Validation Program (CMVP) Security Policy Requirements_ CMVP Validation Authority Updates to ISO_IEC 24759 and ISO_IEC 19790 Anne.pdf 8428251 verified ethanolivertroy commited on 19 days ago
Add Technical Guide to Information Security Testing and Assessment.pdf 84574c6 verified ethanolivertroy commited on 19 days ago
Add A Data Structure for Integrity Protection with Erasure Capability.pdf fb65eb4 verified ethanolivertroy commited on 19 days ago
Add Digital Identity Guidelines_ Authentication and Authenticator Management.pdf 078aef1 verified ethanolivertroy commited on 19 days ago
Add 2nd Annual PKI Research Workshop Proceedings.pdf 34b4b1d verified ethanolivertroy commited on 19 days ago
Add Guidelines on Electronic Mail Security.pdf db0a911 verified ethanolivertroy commited on 19 days ago
Add Mobile Device Security_ Cloud and Hybrid Builds.pdf f9c3fad verified ethanolivertroy commited on 19 days ago
Add NIST Test Personal Identity Verification (PIV) Cards.pdf 246abfb verified ethanolivertroy commited on 19 days ago
Add Security Segmentation in a Small Manufacturing Environment.pdf 5f72187 verified ethanolivertroy commited on 19 days ago
Add Specification for Asset Reporting Format 1.1.pdf 0ee5493 verified ethanolivertroy commited on 19 days ago
Add Interfaces for Personal Identity Verification_ Part 1 – PIV Card Application Namespace, Data Model and Representation.pdf e2cf21b verified ethanolivertroy commited on 19 days ago
Add Establishing Wireless Robust Security Networks_ A Guide to IEEE 802.11i.pdf fa54100 verified ethanolivertroy commited on 19 days ago
Add Derived Personal Identity Verification (PIV) Credentials (DPC) Proof of Concept Research.pdf 80b497d verified ethanolivertroy commited on 19 days ago
Add Derived Personal Identity Verification (PIV) Credentials.pdf 2f645cd verified ethanolivertroy commited on 19 days ago
Add User's Guide to Telework and Bring Your Own Device (BYOD) Security.pdf d4b2877 verified ethanolivertroy commited on 19 days ago
Add Codes for Identification of Federal and Federally-Assisted Organizations.pdf 0c4c57b verified ethanolivertroy commited on 19 days ago
Add Guidelines for the Creation of Interoperable Software Identification (SWID) Tags.pdf 0d59c9b verified ethanolivertroy commited on 19 days ago
Add Best Practices for Privileged User PIV Authentication.pdf 8a9263d verified ethanolivertroy commited on 19 days ago