Add Recommendation for Cryptographic Key Generation.pdf 5d43409 verified ethanolivertroy commited on 19 days ago
Add Federal Cybersecurity Role-Based Training Approaches, Successes, and Challenges.pdf 61224ea verified ethanolivertroy commited on 19 days ago
Add Protecting Controlled Unclassified Information (CUI)_ NIST Special Publication 800-171, Revision 3. Small Business Primer.pdf 09fd1bb verified ethanolivertroy commited on 19 days ago
Add Report on the Design-A-Thon_ Designing Effective and Accessible Approaches for Digital Product Cybersecurity Education and Awareness.pdf bb5fe28 verified ethanolivertroy commited on 19 days ago
Add Multi-Factor Authentication for Criminal Justice Information Systems_ Implementation Considerations for Protecting Criminal Justice Information.pdf 1d6abe2 verified ethanolivertroy commited on 19 days ago
Add Sample Statement of Work for Federal Computer Security Services_ For use In-House or Contracting Out.pdf 9241256 verified ethanolivertroy commited on 19 days ago
Add A Profile for U.S. Federal Cryptographic Key Management Systems (CKMS).pdf 0278c95 verified ethanolivertroy commited on 19 days ago
Add Trusted Geolocation in the Cloud_ Proof of Concept Implementation.pdf 52a7bc5 verified ethanolivertroy commited on 19 days ago
Add Annual Report 2018_ NIST_ITL Cybersecurity Program.pdf c514714 verified ethanolivertroy commited on 19 days ago
Add Verification and Test Methods for Access Control Policies_Models.pdf 9f66b81 verified ethanolivertroy commited on 19 days ago
Add Discussion on the Full Entropy Assumption of the SP 800-90 Series.pdf 979a81f verified ethanolivertroy commited on 19 days ago
Add Interfaces for Personal Identity Verification_ Part 3 – PIV Client Application Programming Interface.pdf f19e1b6 verified ethanolivertroy commited on 19 days ago
Add Summary Report for the Virtual Workshop Addressing Public Comment on NIST Cybersecurity for IoT Guidance.pdf bc5ceb5 verified ethanolivertroy commited on 19 days ago
Add Recommendation for Obtaining Assurances for Digital Signature Applications.pdf f1b5600 verified ethanolivertroy commited on 19 days ago
Add Recommendations for Discrete Logarithm-based Cryptography_ Elliptic Curve Domain Parameters.pdf 4979339 verified ethanolivertroy commited on 19 days ago
Add Guide to Information Technology Security Services.pdf 347c8ac verified ethanolivertroy commited on 19 days ago
Add Identifying and Estimating Cybersecurity Risk for Enterprise Risk Management.pdf dce6519 verified ethanolivertroy commited on 19 days ago