|
NIST SP 800-152 A Profile for U. S. Federal Cryptographic Key Management Systems
by
0.00 avg rating — 0 ratings
|
|
|
Secure Inter-Domain Routing: NIST Whitepaper
by
0.00 avg rating — 0 ratings
|
|
|
Data Integrity Recovering from Ransomware and Other Destructive Events: NIST SP 1800-11 Complete Draft Vol. 11A, 11B & 11C - Sept 2017
by
0.00 avg rating — 0 ratings
|
|
|
Blockchain Technology Overview - NISTIR 8202: Released October 2, 2018
by
0.00 avg rating — 0 ratings
|
|
|
NISTIR 8089 An Industrial Control System Cybersecurity Performance Testbed: Nov 2015
by
0.00 avg rating — 0 ratings
|
|
|
NIST guide to supporting services
by
0.00 avg rating — 0 ratings
|
|
|
Characterization of Clocks and Oscillators NIST Technical Note 1337
by
0.00 avg rating — 0 ratings
|
|
|
NIST SP 800-31 Intrusion Detection Systems: November 2001
by
0.00 avg rating — 0 ratings
|
|
|
Recommendation for the Entropy Sources Used for Random Bit Generation: NIST SP 800-90B
by
0.00 avg rating — 0 ratings
|
|
|
BIOS Integrity Measurement Guidelines: nist sp 800-155
by
0.00 avg rating — 0 ratings
|
|
|
Guidelines for Derived Personal Identity Verification (PIV) Credentials: NIST SP 800-157
by
0.00 avg rating — 0 ratings
|
|
|
NISTIR 8139 Identifying Uniformity with Entropy and Divergence: February 2017
by
0.00 avg rating — 0 ratings
|
|
|
Data Format for the Interchange of Fingerprint, Facial & Other Biometric Information: NIST SP 500-304
by
0.00 avg rating — 0 ratings
|
|
|
NIST SP 800-83 R1 - Guide to Malware Incident Prevention and Handling for Deskto: July 2013
by
0.00 avg rating — 0 ratings
|
|
|
NIST SP 800-146 Cloud Computing Synopsis and Recommendations
by
0.00 avg rating — 0 ratings
|
|
|
[(Survey of Industrial Manipulation Technologies for Autonomous Assembly Applications)] [By (author) National Institute of Standards and Tech] published on (January, 2014)
by
0.00 avg rating — 0 ratings
—
published
2014
—
4 editions
|
|
|
NIST SP 800-156 Representation of PIV Chain-of-Trust for Import and Export
by
0.00 avg rating — 0 ratings
|
|
|
NIST SP 800-153 Guidelines for Securing Wireless Local Area Networks (WLANs): NIST SP 800-153
by
0.00 avg rating — 0 ratings
|
|
|
Vulnerability Description Ontology (VDO): NISTIR 8138
by
0.00 avg rating — 0 ratings
|
|
|
Security Architecture Design Process for Health Information Exchanges (HIEs): NISTIR 7497
by
0.00 avg rating — 0 ratings
|
|
|
A Rational Foundation for Software Metrology: NISTIR 8101
by
0.00 avg rating — 0 ratings
|
|
|
NIST SP 800-127 Guide to Securing WiMAX Wireless Communications: NIST SP 800-127
by
0.00 avg rating — 0 ratings
|
|
|
NIST Cryptographic Standards and Guidelines Development Process NISTIR 7977
by
0.00 avg rating — 0 ratings
|
|
|
Cybersecurity Framework Manufacturing Profile: NIST Whitepaper
by
0.00 avg rating — 0 ratings
|
|
|
Guideline, codes for named populated places, primary county divisions, and other locational entities of the United States, Puerto Rico, and the outlying areas. Volume bk.5 1994 [Leather Bound]
by
0.00 avg rating — 0 ratings
|
|
|
Guideline, codes for named populated places, primary county divisions, and other locational entities of the United States, Puerto Rico, and the outlying areas. Volume bk.2 1994 [Leather Bound]
by
0.00 avg rating — 0 ratings
|
|
|
Publications of the National Institute of Standards and Technology ... catalog Volume SUPP.20 1996 [Leather Bound]
by
0.00 avg rating — 0 ratings
|
|
|
NIST special publication U.S. Department of Commerce, National Institute of Standards and Technology. Volume no.400:1-10
by
0.00 avg rating — 0 ratings
|
|
|
NIST special publication U.S. Department of Commerce, National Institute of Standards and Technology. Volume no.522-523
by
0.00 avg rating — 0 ratings
|
|
|
NIST special publication U.S. Department of Commerce, National Institute of Standards and Technology. Volume no.451-454
by
0.00 avg rating — 0 ratings
|
|
* Note: these are all the books on Goodreads for this author. To add more books,
click here.