CSRC

Results: 4036



#Item
881Health / Health informatics / Privacy law / Data privacy / Health Insurance Portability and Accountability Act / Electronic health record / Information security / Office of the National Coordinator for Health Information Technology / Data breach / Security / Computer security / Data security

HIPAA 2013 Conference, May 21-22, [removed]FINAL AGENDA

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-05-20 22:23:32
882Cryptographic software / FIPS 140-2 / Critical Security Parameter / FIPS 140 / Advanced Encryption Standard / SHA-2 / Microsoft CryptoAPI / Crypto++ / Cryptography / Cryptography standards / Computer security

PDF Document

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-10-29 08:49:50
883Security / Firmware / Computer security / Computing / BIOS / Computer network security / System software

Release of NIST SP 800-147B, BIOS Protection Guidelines for Servers

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-10-28 15:10:45
884Key management / RSA / Key / Optimal asymmetric encryption padding / IEEE P1363 / PKCS1 / Cryptography / Public-key cryptography / Cryptography standards

NIST SP 800-56B, Recommendation for Pair-Wise Key Establishment Schemes Using Integer Factorization Cryptography

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-02-06 14:58:54
885Next Magazine / Album

CSRC ORAL HISTORIES SERIES N O . 9 ,

Add to Reading List

Source URL: www.chicano.ucla.edu

Language: English - Date: 2013-12-19 14:24:15
886Cyberwarfare / Computer crimes / Information technology management / Risk analysis / Cyber-security regulation / International Multilateral Partnership Against Cyber Threats / IT risk / Federal Information Security Management Act / Risk management framework / Security / Computer security / Public safety

Submission to the National Institute Standards of Technology Response to the NIST Cybersecurity Framework Request for Information Comments of Dell, Inc. October 10, 2014 Via [removed]

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-10-14 10:41:24
887

# Type Page # Line # Section Comment (with rationale)

Add to Reading List

Source URL: csrc.nist.gov

- Date: 2014-12-17 16:19:29
    888Computer network security / Crime prevention / National security / Data security / Information security / Penetration test / Vulnerability / International Multilateral Partnership Against Cyber Threats / Cyber security standards / Security / Computer security / Cyberwarfare

    PDF Document

    Add to Reading List

    Source URL: csrc.nist.gov

    Language: English - Date: 2014-12-16 08:07:26
    889Data security / Computing / Crime prevention / National security / FIPS 140-2 / Federal Information Security Management Act / Information security / Security controls / Key management / Security / Computer security / Cryptography standards

    Third Public Draft Special Publication[removed], A Profile for U.S. Federal Cryptographic Key Management Systems

    Add to Reading List

    Source URL: csrc.nist.gov

    Language: English - Date: 2014-12-18 16:46:22
    890Cryptography standards / Internet protocols / Secure communication / Cryptographic protocols / Motorola / FIPS 140-2 / HMAC / Cipher suite / FIPS 140 / Cryptography / Computing / Schaumburg /  Illinois

    Microsoft Word - 1d - AP7131N_Access_Point_Crypto_Module_Security_Policy R1.2.docx

    Add to Reading List

    Source URL: csrc.nist.gov

    Language: English - Date: 2014-12-08 09:50:05
    UPDATE