|
News Briefs, Vol. 99: Journal of Research of the National Institute of Standards and Technology; March-April 1994
by
|
|
|
NIST SP 800-115 Technical Guide to Information Security Testing and Assessment: NiST SP 800-115
by
0.00 avg rating — 0 ratings
|
|
|
National Initiative for Cybersecurity Education (NICE) Framework Work Role Capability Indicators: NISTIR 8193
by
|
|
|
NIST Special Publication 800-53 (rev 4): Security and Privacy Controls for Federal Information Systems and Organizations
by
0.00 avg rating — 0 ratings
|
|
|
NIST SP 800-125B & 125 - Secure Virtual Network Configuration for Virtual Machin: Guide to Security for Full Virtualization Technologies
by
0.00 avg rating — 0 ratings
|
|
|
Security Considerations in the System Development Life Cycle NIST SP 800-64 R2
by
0.00 avg rating — 0 ratings
|
|
|
NIST SP 800-113 Guide to SSL VPNs
by
|
|
|
Guidelines for the Selection, Configuration, and Use of Transport Layer Security: NIST SP 800-52 R2
by
|
|
|
NIST SP 800-88 R1 - Guidelines for Media Sanitization
by
|
|
|
NIST SP 800-111 Guide to Storage Encryption Technologies for End User Devices
by
0.00 avg rating — 0 ratings
|
|
|
Considerations for Managing Internet of Things: NISTIR 8228 Cybersecurity and Privacy Risks
by
|
|
|
Risk Management Framework for Information Systems and Organizations: Draft NIST SP 800-37 Rev 2
by
0.00 avg rating — 0 ratings
|
|
|
News Briefs, Vol. 97: September-October 1992
by
|
|
|
News Briefs, Vol. 98: May-June 1993
by
|
|
|
News Briefs, Vol. 96: Journal of Research of the National Institute of Standards and Technology; May-June 1991
by
|
|
|
Vetting the Security of Mobile Applications NIST SP 800-163
by
0.00 avg rating — 0 ratings
|
|
|
News Briefs, Vol. 99: Journal of Research of the National Institute of Standards and Technology; May-June 1994
by
|
|
|
News Briefs, Vol. 97: Journal of Research of the National Institute of Standards and Technology; November-December 1992
by
|
|
|
News Briefs, Vol. 98: Journal of Research of the National Institute of Standards and Technology; November-December, 1993
by
|
|
|
News Briefs, Vol. 99: July-August, 1994
by
|
|
|
User's Guide to Telework and Bring Your Own Device (BYOD) Security: NIST SP 800-114
by
|
|
|
News Briefs, Vol. 97: Journal of Research of the National Institute of Standards and Technology; July-August 1992
by
|
|
|
Establishing Wireless Robust Security Networks: A Guide to IEEE 802.11i: NIST SP 800-97
by
|
|
|
News Briefs, Vol. 97: March-April 1992
by
0.00 avg rating — 0 ratings
|
|
|
News Briefs, Vol. 97: March-April 1992
by
0.00 avg rating — 0 ratings
|
|
|
Multifactor Authentication for E-Commerce: Risk-Based, FIDO Universal Second Factor Implementations for Purchasers
by
|
|
|
NIST SP 800-98 Guidelines for Securing Radio Frequency Identification (RFID) Sys
by
|
|
|
Guide to Enterprise Patch Management Technologies NIST SP 800-40 R3
by
0.00 avg rating — 0 ratings
|
|
|
The NIST Definition of Fog Computing NIST SP 800-191: NIST SP 800-191
by
0.00 avg rating — 0 ratings
|
|
|
NIST SP 1800-12: Derived Personal Identity Verification (PIV) Credentials: NIST SP 1800-12 - SECOND DRAFT - August 2018
by
0.00 avg rating — 0 ratings
|
|
* Note: these are all the books on Goodreads for this author. To add more books,
click here.