Add Guidelines for the Authorization of Personal Identity Verification Card Issuers (PCI) and Derived PIV Credential Issuers (DPCI).pdf 1d5d374 verified ethanolivertroy commited on Oct 22
Add Report of the Workshop on Cryptography in Support of Computer Security.pdf 9bbf987 verified ethanolivertroy commited on Oct 22
Add Recommendation for the Entropy Sources Used for Random Bit Generation.pdf 1cb52a3 verified ethanolivertroy commited on Oct 22
Add Cybersecurity Framework Profile for Liquefied Natural Gas.pdf a1523a6 verified ethanolivertroy commited on Oct 22
Add Assessing Security and Privacy Controls in Information Systems and Organizations.pdf 3d054dc verified ethanolivertroy commited on Oct 22
Add Assessing Federal and Commercial Information Security Needs.pdf 5ba3a88 verified ethanolivertroy commited on Oct 22
Add Addressing Visibility Challenges with TLS 1.3 within the Enterprise_ High-Level Document.pdf 9005ac2 verified ethanolivertroy commited on Oct 22
Add Computer Security Division 2013 Annual Report.pdf f896e01 verified ethanolivertroy commited on Oct 22
Add NIST Privacy Framework_ A Tool for Improving Privacy Through Enterprise Risk Management, Version 1.0.pdf 3cf2fe5 verified ethanolivertroy commited on Oct 22
Add Message Authentication Code (MAC) Validation System_ Requirements and Procedures.pdf 46ae353 verified ethanolivertroy commited on Oct 22
Add Taxonomic Rules for Password Policies_ Translating the Informal to the Formal Language.pdf dda726f verified ethanolivertroy commited on Oct 22
Add Audit and Evaluation of Computer Security.pdf 4365860 verified ethanolivertroy commited on Oct 22
Add Performance Assurance and Data Integrity Practices.pdf 35e73ee verified ethanolivertroy commited on Oct 22
Add Securing Telehealth Remote Patient Monitoring Ecosystem.pdf bfb6c05 verified ethanolivertroy commited on Oct 22
Add Strategies for the Integration of Software Supply Chain Security in DevSecOps CI_CD Pipelines.pdf 3945dd4 verified ethanolivertroy commited on Oct 22
Add 2016 NIST_ITL Cybersecurity Program Annual Report.pdf 7fa0c19 verified ethanolivertroy commited on Oct 22
Add BioCTS 2012_ Advanced Conformance Test Architectures and Test Suites for Biometric Data Interchange Formats and Biometric Information Records.pdf 9c5f195 verified ethanolivertroy commited on Oct 22
Add Cryptographic Key Management Issues & Challenges in Cloud Services.pdf 8cb7051 verified ethanolivertroy commited on Oct 22
Add NIST Cloud Computing Forensic Science Challenges.pdf 3297098 verified ethanolivertroy commited on Oct 22
Add Module-Lattice-Based Key-Encapsulation Mechanism Standard.pdf 8d0732c verified ethanolivertroy commited on Oct 22
Add Guide to Computer Security Log Management.pdf 6e1f3eb verified ethanolivertroy commited on Oct 22
Add Guide to Test, Training, and Exercise Programs for IT Plans and Capabilities.pdf b0be4b0 verified ethanolivertroy commited on Oct 22
Add Case Studies in Cyber Supply Chain Risk Management_ Seagate Technology.pdf e85f3e7 verified ethanolivertroy commited on Oct 22
Add Interagency Report on the Status of International Cybersecurity Standardization for the Internet of Things (IoT).pdf 88c39dd verified ethanolivertroy commited on Oct 22
Add Guide to Integrating Forensic Techniques into Incident Response.pdf 52a7899 verified ethanolivertroy commited on Oct 22
Add Measuring the Usability and Security of Permuted Passwords on Mobile Platforms.pdf 823d1b5 verified ethanolivertroy commited on Oct 22
Add Guidelines for API Protection for Cloud-Native Systems.pdf 1aa64fd verified ethanolivertroy commited on Oct 22
Add Measuring the Common Vulnerability Scoring System Base Score Equation.pdf a08138d verified ethanolivertroy commited on Oct 22
Add Fingerprint Identification and Mobile Handheld Devices_ An Overview and Implementation.pdf b3e7876 verified ethanolivertroy commited on Oct 22
Add Trusted Cloud_ Security Practice Guide for VMware Hybrid Cloud Infrastructure as a Service (IaaS) Environments.pdf 3a204fc verified ethanolivertroy commited on Oct 22
Add Case Studies in Cyber Supply Chain Risk Management_ Anonymous Renewable Energy Company.pdf 13fdb87 verified ethanolivertroy commited on Oct 22
Add Manufacturing Profile Implementation Methodology for a Robotic Workcell.pdf 8503d5f verified ethanolivertroy commited on Oct 22
Add Guide to Storage Encryption Technologies for End User Devices.pdf 608546f verified ethanolivertroy commited on Oct 22
Add Bug Framework (BF)_ Formalizing Cybersecurity Weaknesses and Vulnerabilities.pdf c3f47e0 verified ethanolivertroy commited on Oct 22
Add Recommendation for Applications Using Approved Hash Algorithms.pdf d229fb0 verified ethanolivertroy commited on Oct 22
Add A Methodology for Developing Authentication Assurance Level Taxonomy for Smart Card-based Identity Verification.pdf 6c69de2 verified ethanolivertroy commited on Oct 22
Add Conformance Test Architecture and Test Suite for ANSI_NIST-ITL 1-2007.pdf 6fa904a verified ethanolivertroy commited on Oct 22
Add NIST Roadmap Toward Criteria for Threshold Schemes for Cryptographic Primitives.pdf 6f42fd0 verified ethanolivertroy commited on Oct 22
Add CMVP Approved Authentication Mechanisms_ CMVP Validation Authority Requirements for ISO_IEC 19790 Annex E and ISO_IEC 24579 Section 6.17.pdf 97223fc verified ethanolivertroy commited on Oct 22
Add PIV Card to Reader Interoperability Guidelines.pdf 46a38bc verified ethanolivertroy commited on Oct 22
Add Enhanced Security Requirements for Protecting Controlled Unclassified Information_ A Supplement to NIST Special Publication 800-171.pdf 40d417e verified ethanolivertroy commited on Oct 22
Add Security Guidelines for Storage Infrastructure.pdf f06f4e7 verified ethanolivertroy commited on Oct 22
Add Blockchain Networks_ Token Design and Management Overview.pdf d387493 verified ethanolivertroy commited on Oct 22
Add NIST Workshop on the Requirements for an Accordion Cipher Mode 2024_ Workshop Report.pdf 6cba45f verified ethanolivertroy commited on Oct 22
Add Recommendation for Block Cipher Modes of Operation_ the CMAC Mode for Authentication.pdf dc923f5 verified ethanolivertroy commited on Oct 22
Add Requirements for Cryptographic Accordions.pdf 311082c verified ethanolivertroy commited on Oct 22