Hugging Face
Models
Datasets
Spaces
Community
Docs
Enterprise
Pricing
Log In
Sign Up
Datasets:
ethanolivertroy
/
nist-publications-raw
like
1
Tasks:
Text Generation
Question Answering
Modalities:
Document
Languages:
English
Size:
1K<n<10K
Tags:
cybersecurity
nist
compliance
security-controls
regulations
License:
cc0-1.0
Dataset card
Data Studio
Files
Files and versions
xet
Community
bb5fe28
nist-publications-raw
36.9 MB
1 contributor
History:
18 commits
ethanolivertroy
Add Report on the Design-A-Thon_ Designing Effective and Accessible Approaches for Digital Product Cybersecurity Education and Awareness.pdf
bb5fe28
verified
18 days ago
.gitattributes
Safe
5.68 kB
Add Report on the Design-A-Thon_ Designing Effective and Accessible Approaches for Digital Product Cybersecurity Education and Awareness.pdf
18 days ago
A Profile for U.S. Federal Cryptographic Key Management Systems (CKMS).pdf
1.84 MB
xet
Add A Profile for U.S. Federal Cryptographic Key Management Systems (CKMS).pdf
18 days ago
Annual Report 2018_ NIST_ITL Cybersecurity Program.pdf
726 kB
xet
Add Annual Report 2018_ NIST_ITL Cybersecurity Program.pdf
18 days ago
Discussion on the Full Entropy Assumption of the SP 800-90 Series.pdf
1.01 MB
xet
Add Discussion on the Full Entropy Assumption of the SP 800-90 Series.pdf
18 days ago
Guide to Information Technology Security Services.pdf
2.72 MB
xet
Add Guide to Information Technology Security Services.pdf
18 days ago
Identifying and Estimating Cybersecurity Risk for Enterprise Risk Management.pdf
2.88 MB
xet
Add Identifying and Estimating Cybersecurity Risk for Enterprise Risk Management.pdf
18 days ago
Interfaces for Personal Identity Verification_ Part 3 β PIV Client Application Programming Interface.pdf
658 kB
xet
Add Interfaces for Personal Identity Verification_ Part 3 β PIV Client Application Programming Interface.pdf
18 days ago
Multi-Factor Authentication for Criminal Justice Information Systems_ Implementation Considerations for Protecting Criminal Justice Information.pdf
3.75 MB
xet
Add Multi-Factor Authentication for Criminal Justice Information Systems_ Implementation Considerations for Protecting Criminal Justice Information.pdf
18 days ago
README.md
Safe
5.22 kB
Add dataset card
18 days ago
Recommendation for Obtaining Assurances for Digital Signature Applications.pdf
226 kB
xet
Add Recommendation for Obtaining Assurances for Digital Signature Applications.pdf
18 days ago
Recommendations for Discrete Logarithm-based Cryptography_ Elliptic Curve Domain Parameters.pdf
2.98 MB
xet
Add Recommendations for Discrete Logarithm-based Cryptography_ Elliptic Curve Domain Parameters.pdf
18 days ago
Report on the Design-A-Thon_ Designing Effective and Accessible Approaches for Digital Product Cybersecurity Education and Awareness.pdf
8.89 MB
xet
Add Report on the Design-A-Thon_ Designing Effective and Accessible Approaches for Digital Product Cybersecurity Education and Awareness.pdf
18 days ago
Report_ Authentication Diary Study.pdf
1.75 MB
xet
Add Report_ Authentication Diary Study.pdf
18 days ago
Sample Statement of Work for Federal Computer Security Services_ For use In-House or Contracting Out.pdf
4.57 MB
xet
Add Sample Statement of Work for Federal Computer Security Services_ For use In-House or Contracting Out.pdf
18 days ago
Summary Report for the Virtual Workshop Addressing Public Comment on NIST Cybersecurity for IoT Guidance.pdf
460 kB
xet
Add Summary Report for the Virtual Workshop Addressing Public Comment on NIST Cybersecurity for IoT Guidance.pdf
18 days ago
Trusted Geolocation in the Cloud_ Proof of Concept Implementation.pdf
2.48 MB
xet
Add Trusted Geolocation in the Cloud_ Proof of Concept Implementation.pdf
18 days ago
Verification and Test Methods for Access Control Policies_Models.pdf
1.8 MB
xet
Add Verification and Test Methods for Access Control Policies_Models.pdf
18 days ago
metadata.json
Safe
181 kB
Add metadata with document information
18 days ago