NIST

Results: 18894



#Item
611Roper Industries / Advanced manufacturing / Technology / Business / Automatic identification and data capture / Gaithersburg /  Maryland / National Institute of Standards and Technology

The Advanced Manufacturing Technology Consortia (AMTech) Program, Complementary with NNMI Model-Based Enterprise Summit 2014 December 16, 2014

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2015-01-07 16:22:55
612Cyberwarfare / United States Department of Homeland Security / NIST Special Publication 800-53 / United States Computer Emergency Readiness Team / Security controls / Computer security / Security / Computer network security

Cyber Security Evaluation Tool: Performing a Self Assessment

Add to Reading List

Source URL: ics-cert.us-cert.gov

Language: English - Date: 2015-04-29 14:08:30
613System software / Command shells / User interface techniques / 4Sight / COMMAND.COM / Command-line interface / AS/400 Control Language / Batch file / Expr / Computing / Software / Scripting languages

NISTIRA Computer Program for 4SIGHT Manual:

Add to Reading List

Source URL: fire.nist.gov

Language: English - Date: 1997-09-03 13:13:28
614Secure communication / Cryptographic software / Internet standards / Cipher suite / Secure Shell / Transport Layer Security / HMAC / Key size / Public-key cryptography / Cryptography / Cryptographic protocols / Internet protocols

Microsoft Word - 1c - FIPS Avaya Draft Security Policy Jan2015 v4.docx

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-05-07 14:15:51
615Process management / Organizational behavior / Business process / Corporatism / Organizational culture / Business process management / Chief human resources officer / Operational excellence / Enterprise risk management / Management / Business / Human resource management

Table of Contents Eligibility Forms Organizational Chart Form A-1 Glossary of Terms Organizational Profile

Add to Reading List

Source URL: patapsco.nist.gov

Language: English - Date: 2015-03-31 11:22:17
616OSI protocols / Small form-factor pluggable transceiver / Universal Serial Bus / FIPS 140 / Fortinet / Network switch / Personal computer hardware / ProCurve Products / HP Networking Products / Ethernet / Computing / Computer hardware

FIPSSecurity Policy FortiGate-3600C and 3950B FortiGate 3600C USB

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-05-04 14:06:41
617FIPS 140-2 / HMAC / Microsoft CryptoAPI / Critical Security Parameter / Advanced Encryption Standard / SHA-2 / FIPS 140 / Key Wrap / Zeroisation / Cryptography / Cryptographic software / Cryptography standards

Hitachi Virtual Storage Platform (VSP) Encryption Engine FIPSNon-Proprietary Cryptographic Module Security Policy Version: 1.8 Date: April 2, 2015

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-05-22 08:05:36
618FIPS 140-2 / FIPS 140 / Password / Zeroisation / SHA-2 / Universal Flash Storage / Hardware random number generator / Cryptography / Cryptography standards / Randomness

Samsung UFS (Universal Flash Storage) Shark SED FIPSSecurity Policy Document Revision: 1.0 H.W. Version: KLUAG2G1BD-B0B2

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-05-21 15:46:21
619Science / Emerging technologies / Telecommunications / Gaithersburg /  Maryland / National Institute of Standards and Technology / Data analysis / Cloud computing / Interoperability / Smart grid / Computing / Physics / Standards organizations

Microsoft Word - M0394_v1_4746659136

Add to Reading List

Source URL: bigdatawg.nist.gov

Language: English - Date: 2015-04-26 21:21:32
620Cryptographic protocols / Cryptographic software / Hashing / Secure communication / IPsec / HMAC / Secure Shell / Key generation / Cryptographic hash function / Cryptography / Computing / Internet protocols

IC2M Security Policy_rel5

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-05-28 11:20:09
UPDATE