NIST

Results: 18894



#Item
57110 Gigabit Ethernet / Brocade Communications Systems / Ethernet / Doublecortin

Microsoft Word - Brocade_Security_Policy_FOSv721 (Brocade_13.10.29_V1.1).docx

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-05-21 15:52:55
572

Microsoft Word - Brocade_NetIron_5.6.00aa_Security_Policy_(Brocade_13.12.17_V1.4).docx

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-05-21 15:47:41
    573

    POSTAL SECURITY DEVICE SECURITY POLICY Version 3.0 This document is non-proprietary. It may be reproduced or transmitted only in its entirety without revision.

    Add to Reading List

    Source URL: csrc.nist.gov

    Language: English - Date: 2015-05-05 13:24:44
      574Computing / Standards organizations / Computer security / Public safety / Gaithersburg /  Maryland / National Institute of Standards and Technology / Metrology / Cloud computing / Smart grid / Security / Crime prevention / National security

      Information Technology Laboratory Letter from the Director T

      Add to Reading List

      Source URL: www.nist.gov

      Language: English - Date: 2015-05-19 13:24:18
      575Information / Computer data / Data management / Gaithersburg /  Maryland / National Institute of Standards and Technology / Cloud computing / Data architecture / Interoperability / NIST Enterprise Architecture Model / Information technology management / Computing / Standards organizations

      Microsoft Word - M0397_v1_2395481670

      Add to Reading List

      Source URL: bigdatawg.nist.gov

      Language: English - Date: 2015-04-26 21:22:46
      576Data security / Standards organizations / Gaithersburg /  Maryland / National Institute of Standards and Technology / Cloud computing / Privacy / Information security / Computing / NIST Enterprise Architecture Model / Computer security / Security / Ethics

      Microsoft Word - M0395_v1_4717582962

      Add to Reading List

      Source URL: bigdatawg.nist.gov

      Language: English - Date: 2015-04-26 21:21:41
      577Hashing / Cryptographic hash functions / Advanced Encryption Standard / HMAC / FIPS 140-2 / SHA-2 / SHA-1 / FIPS 140 / OpenSSL / Cryptography / Cryptography standards / Cryptographic software

      Microsoft Word - Brocade_Security_Policy_FOSv721 (Brocade_13.10.29_V1.1).docx

      Add to Reading List

      Source URL: csrc.nist.gov

      Language: English - Date: 2015-05-21 15:50:50
      578Health informatics / Health Insurance Portability and Accountability Act / Electronic health record / Health / Medicine / Medical informatics

      Provider User Guide for NIST EHR Randomizer Tool Purpose of the EHR Randomizer: As part of the third measure for the Meaningful Use Stage 2 Transitions of Care Objective, Eligible Providers and Eligible Hospitals are req

      Add to Reading List

      Source URL: hie.cdph.ca.gov

      Language: English - Date: 2015-02-02 18:11:56
      579Interoperability / Cloud computing / Data management / Computing / Software architecture / NIST Enterprise Architecture Model / Standards organizations / Gaithersburg /  Maryland / National Institute of Standards and Technology

      Microsoft Word - M0392_v1_3022325181

      Add to Reading List

      Source URL: bigdatawg.nist.gov

      Language: English - Date: 2015-04-26 21:20:53
      580Security / Cyberwarfare / FIPS 140 / Trusted Computing Group / Critical Security Parameter / Trusted Computing / Authentication / Zeroisation / Key management / Computer security / Cryptography standards / Cryptography

      Microsoft Word - 22e - Security Policy APK-0.6.docx

      Add to Reading List

      Source URL: csrc.nist.gov

      Language: English - Date: 2015-05-21 15:49:37
      UPDATE