NIST

Results: 18894



#Item
311

Charter of the Panel of Judges

Add to Reading List

Source URL: patapsco.nist.gov

- Date: 2013-12-30 14:23:16
    312Identity management / Federated identity / Computer access control / Electronic authentication / Politics and technology / Public administration / Authentication / Identity assurance / Biometrics / Token / Identity document / Access token

    Public Comments Received on NIST SP: Electronic Authentication Guideline

    Add to Reading List

    Source URL: csrc.nist.gov

    Language: English
    313Data security / Computer security / Security / National Institute of Standards and Technology / Federal Information Security Management Act / Security controls / Key management / Information security / Personally identifiable information / NIST Special Publication 800-53 / Managed Trusted Internet Protocol Service

    Draft SP 800-175A, Guideline for Using Cryptographic Standards in the Federal Government: Directives, Mandates and Policies

    Add to Reading List

    Source URL: csrc.nist.gov

    Language: English - Date: 2016-04-05 09:50:54
    314

    Navigating Unmountable Media with the Digital Forensics XML
 File System Alex J. Nelson NIST, Computer Security Division CurateGear

    Add to Reading List

    Source URL: ils.unc.edu

    Language: English - Date: 2016-01-14 08:18:20
      315

      NIST SP 800-90A, Recommendation for Random Number Generations Using Deterministic Random Bit Generations

      Add to Reading List

      Source URL: projectbullrun.org

      Language: English - Date: 2014-03-26 23:26:01
        316

        Structure of fcc β-RH2+x LaHx Phase Diagram T,K x

        Add to Reading List

        Source URL: ncnr.nist.gov

        - Date: 2016-03-01 19:01:55
          317

          Guide to Enterprise Telework and Remote Access Security

          Add to Reading List

          Source URL: csrc.nist.gov

          Language: English - Date: 2016-03-14 12:56:02
            318Cyberwarfare / Federal Information Security Management Act / United States Department of Homeland Security / NIST Cybersecurity Framework / Computer security / Chief information security officer / Cyber-security regulation / National Cybersecurity Center of Excellence

            Review-Doc-2015-ITORdocx

            Add to Reading List

            Source URL: www.whitehouse.gov

            Language: English - Date: 2015-10-30 16:10:53
            319

            Best Practices for Privileged User PIV Authentication (Draft)

            Add to Reading List

            Source URL: csrc.nist.gov

            Language: English - Date: 2016-04-22 09:00:13
              320

              FEBRUARYThe National Institute of Standards and Technology’s Hollings Manufacturing Extension Partnership (MEP) works with U.S. manufacturers to help them create and retain jobs, increase profits, and save time

              Add to Reading List

              Source URL: ws680.nist.gov

              Language: English - Date: 2016-02-05 15:29:43
                UPDATE