nist-publications-raw / .gitattributes
ethanolivertroy's picture
Add Report on the Design-A-Thon_ Designing Effective and Accessible Approaches for Digital Product Cybersecurity Education and Awareness.pdf
bb5fe28 verified
raw
history blame
5.68 kB
*.7z filter=lfs diff=lfs merge=lfs -text
*.arrow filter=lfs diff=lfs merge=lfs -text
*.bin filter=lfs diff=lfs merge=lfs -text
*.bz2 filter=lfs diff=lfs merge=lfs -text
*.ckpt filter=lfs diff=lfs merge=lfs -text
*.ftz filter=lfs diff=lfs merge=lfs -text
*.gz filter=lfs diff=lfs merge=lfs -text
*.h5 filter=lfs diff=lfs merge=lfs -text
*.joblib filter=lfs diff=lfs merge=lfs -text
*.lfs.* filter=lfs diff=lfs merge=lfs -text
*.lz4 filter=lfs diff=lfs merge=lfs -text
*.mds filter=lfs diff=lfs merge=lfs -text
*.mlmodel filter=lfs diff=lfs merge=lfs -text
*.model filter=lfs diff=lfs merge=lfs -text
*.msgpack filter=lfs diff=lfs merge=lfs -text
*.npy filter=lfs diff=lfs merge=lfs -text
*.npz filter=lfs diff=lfs merge=lfs -text
*.onnx filter=lfs diff=lfs merge=lfs -text
*.ot filter=lfs diff=lfs merge=lfs -text
*.parquet filter=lfs diff=lfs merge=lfs -text
*.pb filter=lfs diff=lfs merge=lfs -text
*.pickle filter=lfs diff=lfs merge=lfs -text
*.pkl filter=lfs diff=lfs merge=lfs -text
*.pt filter=lfs diff=lfs merge=lfs -text
*.pth filter=lfs diff=lfs merge=lfs -text
*.rar filter=lfs diff=lfs merge=lfs -text
*.safetensors filter=lfs diff=lfs merge=lfs -text
saved_model/**/* filter=lfs diff=lfs merge=lfs -text
*.tar.* filter=lfs diff=lfs merge=lfs -text
*.tar filter=lfs diff=lfs merge=lfs -text
*.tflite filter=lfs diff=lfs merge=lfs -text
*.tgz filter=lfs diff=lfs merge=lfs -text
*.wasm filter=lfs diff=lfs merge=lfs -text
*.xz filter=lfs diff=lfs merge=lfs -text
*.zip filter=lfs diff=lfs merge=lfs -text
*.zst filter=lfs diff=lfs merge=lfs -text
*tfevents* filter=lfs diff=lfs merge=lfs -text
# Audio files - uncompressed
*.pcm filter=lfs diff=lfs merge=lfs -text
*.sam filter=lfs diff=lfs merge=lfs -text
*.raw filter=lfs diff=lfs merge=lfs -text
# Audio files - compressed
*.aac filter=lfs diff=lfs merge=lfs -text
*.flac filter=lfs diff=lfs merge=lfs -text
*.mp3 filter=lfs diff=lfs merge=lfs -text
*.ogg filter=lfs diff=lfs merge=lfs -text
*.wav filter=lfs diff=lfs merge=lfs -text
# Image files - uncompressed
*.bmp filter=lfs diff=lfs merge=lfs -text
*.gif filter=lfs diff=lfs merge=lfs -text
*.png filter=lfs diff=lfs merge=lfs -text
*.tiff filter=lfs diff=lfs merge=lfs -text
# Image files - compressed
*.jpg filter=lfs diff=lfs merge=lfs -text
*.jpeg filter=lfs diff=lfs merge=lfs -text
*.webp filter=lfs diff=lfs merge=lfs -text
# Video files - compressed
*.mp4 filter=lfs diff=lfs merge=lfs -text
*.webm filter=lfs diff=lfs merge=lfs -text
Identifying[[:space:]]and[[:space:]]Estimating[[:space:]]Cybersecurity[[:space:]]Risk[[:space:]]for[[:space:]]Enterprise[[:space:]]Risk[[:space:]]Management.pdf filter=lfs diff=lfs merge=lfs -text
Guide[[:space:]]to[[:space:]]Information[[:space:]]Technology[[:space:]]Security[[:space:]]Services.pdf filter=lfs diff=lfs merge=lfs -text
Recommendations[[:space:]]for[[:space:]]Discrete[[:space:]]Logarithm-based[[:space:]]Cryptography_[[:space:]]Elliptic[[:space:]]Curve[[:space:]]Domain[[:space:]]Parameters.pdf filter=lfs diff=lfs merge=lfs -text
Recommendation[[:space:]]for[[:space:]]Obtaining[[:space:]]Assurances[[:space:]]for[[:space:]]Digital[[:space:]]Signature[[:space:]]Applications.pdf filter=lfs diff=lfs merge=lfs -text
Summary[[:space:]]Report[[:space:]]for[[:space:]]the[[:space:]]Virtual[[:space:]]Workshop[[:space:]]Addressing[[:space:]]Public[[:space:]]Comment[[:space:]]on[[:space:]]NIST[[:space:]]Cybersecurity[[:space:]]for[[:space:]]IoT[[:space:]]Guidance.pdf filter=lfs diff=lfs merge=lfs -text
Interfaces[[:space:]]for[[:space:]]Personal[[:space:]]Identity[[:space:]]Verification_[[:space:]]Part[[:space:]]3[[:space:]]–[[:space:]]PIV[[:space:]]Client[[:space:]]Application[[:space:]]Programming[[:space:]]Interface.pdf filter=lfs diff=lfs merge=lfs -text
Discussion[[:space:]]on[[:space:]]the[[:space:]]Full[[:space:]]Entropy[[:space:]]Assumption[[:space:]]of[[:space:]]the[[:space:]]SP[[:space:]]800-90[[:space:]]Series.pdf filter=lfs diff=lfs merge=lfs -text
Verification[[:space:]]and[[:space:]]Test[[:space:]]Methods[[:space:]]for[[:space:]]Access[[:space:]]Control[[:space:]]Policies_Models.pdf filter=lfs diff=lfs merge=lfs -text
Annual[[:space:]]Report[[:space:]]2018_[[:space:]]NIST_ITL[[:space:]]Cybersecurity[[:space:]]Program.pdf filter=lfs diff=lfs merge=lfs -text
Trusted[[:space:]]Geolocation[[:space:]]in[[:space:]]the[[:space:]]Cloud_[[:space:]]Proof[[:space:]]of[[:space:]]Concept[[:space:]]Implementation.pdf filter=lfs diff=lfs merge=lfs -text
A[[:space:]]Profile[[:space:]]for[[:space:]]U.S.[[:space:]]Federal[[:space:]]Cryptographic[[:space:]]Key[[:space:]]Management[[:space:]]Systems[[:space:]](CKMS).pdf filter=lfs diff=lfs merge=lfs -text
Sample[[:space:]]Statement[[:space:]]of[[:space:]]Work[[:space:]]for[[:space:]]Federal[[:space:]]Computer[[:space:]]Security[[:space:]]Services_[[:space:]]For[[:space:]]use[[:space:]]In-House[[:space:]]or[[:space:]]Contracting[[:space:]]Out.pdf filter=lfs diff=lfs merge=lfs -text
Report_[[:space:]]Authentication[[:space:]]Diary[[:space:]]Study.pdf filter=lfs diff=lfs merge=lfs -text
Multi-Factor[[:space:]]Authentication[[:space:]]for[[:space:]]Criminal[[:space:]]Justice[[:space:]]Information[[:space:]]Systems_[[:space:]]Implementation[[:space:]]Considerations[[:space:]]for[[:space:]]Protecting[[:space:]]Criminal[[:space:]]Justice[[:space:]]Information.pdf filter=lfs diff=lfs merge=lfs -text
Report[[:space:]]on[[:space:]]the[[:space:]]Design-A-Thon_[[:space:]]Designing[[:space:]]Effective[[:space:]]and[[:space:]]Accessible[[:space:]]Approaches[[:space:]]for[[:space:]]Digital[[:space:]]Product[[:space:]]Cybersecurity[[:space:]]Education[[:space:]]and[[:space:]]Awareness.pdf filter=lfs diff=lfs merge=lfs -text