CSRC

Results: 4036



#Item
131

Automation Support for Security Control Assessments. Volume 1: Overview

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2016-02-02 12:17:39
    132

    Automation Support for Security Control Assessments. Volume 2: Hardware Asset Management

    Add to Reading List

    Source URL: csrc.nist.gov

    Language: English - Date: 2016-02-02 12:17:39
      133

      DRAFT NISTIR 8080, Usability and Security Considerations for Public Safety Mobile Authentication, NISTIR 8080, usaability, Public Safety Mobile Authentication, authentication, identity management, local authentication, p

      Add to Reading List

      Source URL: csrc.nist.gov

      Language: English - Date: 2015-11-19 14:25:16
        134Antivirus software / Computer security / Spamming / Malware / Whitelist / Computer virus / Application software / Software / Privacy software / DriveSentry

        ITL Bulletin December 2015, Stopping Malware and Unauthorized Software through Application Whitelisting

        Add to Reading List

        Source URL: csrc.nist.gov

        Language: English - Date: 2015-12-14 08:58:39
        135Computing / Software / System software / Ethernet / Computer networking / Virtual firewall / VM / Hyper-V / Network function virtualization / Hypervisor / Virtualization / Link aggregation

        ITL BULLETIN FOR JUNE 2016 EXTENDING NETWORK SECURITY INTO VIRTUALIZED INFRASTRUCTURE Ramaswamy Chandramouli, Larry Feldman, 1 and Greg Witte,1 Editors Computer Security Division Information Technology Laboratory Nationa

        Add to Reading List

        Source URL: csrc.nist.gov

        Language: English - Date: 2016-06-02 17:23:03
        136

        Second DRAFT Special Publication, Trustworthy Email

        Add to Reading List

        Source URL: csrc.nist.gov

        Language: English
          137

          Second Draft NIST Special Publication 800-90B, Recommendation for the Entropy Sources Used for Random Bit Generation

          Add to Reading List

          Source URL: csrc.nist.gov

          Language: English - Date: 2016-01-27 10:10:16
            138Computer security / Security / Cyberwarfare / Computer network security / Control engineering / Telemetry / Security controls / ICS / Industrial control system / Vulnerability / NIST Special Publication 800-53 / Incident Command System

            ITL Security Bulletin, Tailoring Security Controls for Industrial Control Systems, (November 2015)

            Add to Reading List

            Source URL: csrc.nist.gov

            Language: English - Date: 2015-11-16 11:39:25
            139

            1 Draft NIST Special Publication

            Add to Reading List

            Source URL: csrc.nist.gov

            Language: English - Date: 2016-03-14 13:07:25
              140Cryptography / Data Encryption Standard / Format-preserving encryption / Block cipher modes of operation / Block cipher / Triple DES / Feistel cipher / Advanced Encryption Standard / Cipher / Symmetric-key algorithm / CCM mode

              ITL BULLETIN FOR APRIL 2016 NEW NIST SECURITY STANDARD CAN PROTECT CREDIT CARDS, HEALTH INFORMATION Morris Dworkin, Larry Feldman, 1 and Greg Witte,1 Editors Computer Security Division Information Technology Laboratory N

              Add to Reading List

              Source URL: csrc.nist.gov

              Language: English - Date: 2016-04-14 13:47:17
              UPDATE