说明:最全专利文库
文库搜索
切换导航
文件分类
频道
文件分类
批量下载
NIST.SP.800-76-2 Biometric Specifications for Personal Identity Verification.pdf
NIST.SP.800-178 A Comparison of ABAC Standards for Data ServiceApplications.pdf
NIST.SP.1800-21-draft Mobile Device Security.pdf
NIST.SP.800-177r1 Trustworthy Email.pdf
NIST.SP.800-77 Guide to IPsec VPNs.pdf
NIST.IR.8286A-draft2.pdf
NIST.SP.800-155_Dec2011 draft BIOS Integrity Measurement Guidelines.pdf
NIST.SP.800-57pt1r4 Recommendation for Key Management.pdf
NIST.SP.800-153 Guidelines for Securing Wireless Local.pdf
NIST.SP.800-38G Recommendation for Block Cipher.pdf
NIST.SP.800-147B BIOS Protection Guidelines.pdf
NIST.SP.800-67r2 Recommendation for the Triple Data Encryption Standard (TDEA) Block Cipher.pdf
NIST.SP.800-125B Secure Virtual Network Configuration for Virtual Machine (VM) Protection.pdf
NIST.SP.800-87r2 Codes for the Identification of Federal and Federally-Assisted Organizations.pdf
NIST.SP.800-125Ar1 Security Recommendations for Server-based Hypervisor Platforms.pdf
NIST.SP.800-63a Digital Identity Guidelines Enrollment and Identity Proofing.pdf
NIST.SP.800-125 Guide to Security for Full Virtualization Technologies.pdf
NIST.SP.800-54 Border Gateway Protocol Security.pdf
NIST.SP.800-123 Guide to General Server Security.pdf
NIST.SP.800-12r1 An Introduction to Information Security.pdf
NIST.SP.800-121r2 Guide to BluetoothSecurity.pdf
NIST.SP.800-119 Guidelines for the Secure Deployment of IPv6.pdf
NIST.SP.800-72 Guidelines on PDA Forensics.pdf
NIST.IR.8270-draft.pdf
NIST.SP.800-116r1 Guidelines for the Use of PIV Credentials in Facility Access.pdf
NIST.SP.800-83r1 Guide to Malware Incident Prevention and Handling for Desktops and Laptops.pdf
NIST.SP.800-114r1 User’s Guide to Telework and Bring Your Own Device (BYOD) Security.pdf
NIST.SP.1800-5 IT Asset Management.pdf
NIST.SP.800-113 Guide to SSL VPNs.pdf
NIST.SP.800-82r2 Guide to Industrial Control Systems (ICS) Security.pdf
NIST.SP.800-111 Guide to Storage Encryption Technologies for End User Devices.pdf
NIST.SP.800-81-2 Secure Domain Name System (DNS) Deployment Guide.pdf
NIST.SP.800-98 Guidelines for Securing Radio Frequency Identification (RFID) Systems.pdf
NIST.SP.800-52r1Guidelines for the Selection, Configuration, and Use of Transport Layer Security (TLS) Implementations.pdf
NIST.SP.800-70r4 National Checklist Program for IT Products – Guidelines for Checklist Users and Developers.pdf
NIST.SP.800-203 ANNUAL REPORT 2017.pdf
NIST.SP.1800-16-draft Securing Web Transactions TLS Server Certificate Management.pdf
NIST.SP.800-73-4 Interfaces for Personal Identity Verification – Part 1 PIV Card Application Namespace, Data Model and Representation.pdf
NIST.SP.800-63b Digital Identity Guidelines Authentication and Lifecycle Management.pdf
NIST.SP.800-100 Information Security Handbook A Guide for Managers.pdf
NIST.SP.800-56Br2 Recommendation for Pair-Wise Key Establishment Using Integer Factorization Cryptography.pdf
NIST.SP.800-56Ar3 Recommendation for Pair-Wise Key-Establishment Schemes Using Discrete Logarithm Cryptography.pdf
NIST.SP.1800-1 Securing Electronic Health Records on Mobile Devices.pdf
NIST.SP.800-52r2-draft2 Transport Layer Security (TLS) prot.pdf
NIST.SP.1800-19b-preliminary-draft Trusted Cloud Security Practice Guide for VMware Hybrid Cloud.pdf
NIST.SP.800-47 Security Guide for Interconnecting Information Technology Systems.pdf
NIST.SP.1500-1 Big Data Interoperability Framework Volume 1, Definitions.pdf
NIST.SP.800-204B-draft.pdf
NIST.SP.800-46r2Guide to Enterprise Telework, Remote Access, and Bring Your Own Device (BYOD) Security.pdf
NIST.SP.1800-2 Identity and Access Management for Electric Utilities.pdf
NIST.SP.800-45ver2 Guidelines on Electronic Mail Security.pdf
NIST.SP.800-202 Quick Start Guide for Populating Mobile Test Devices.pdf
NIST.SP.800-41r1 Guidelines on Firewalls and Firewall Policy.pdf
NIST.IR.8335-draft Identity as a Service for public safety organizations.pdf
NIST.SP.800-28ver2 Guidelines on Active Content and Mobile Code.pdf
NIST.SP.1800-4 Mobile Device Security Cloud and Hybrid Builds.pdf
NIST.SP.800-133r1 Recommendation for Cryptographic Key Generation.pdf
NIST.SP.1500-1r1 Big Data Interoperability Framework Volume 1, Definitions.pdf
NIST.IR.8221A Methodology for Enabling Forensic Analysis Using Hypervisor Vulnerabilities Data.pdf
NIST.SP.800-208 Recommendation for Stateful Hash-Based Signature Schemes.pdf
NIST.IR.8183 Cybersecurity Framework Manufacturing Profile.pdf
NIST.SP.800-213-draft IoT Device Cybersecurity Guidance.pdf
NIST.TN.2051 Cybersecurity Framework Smart Grid Profile.pdf
NIST.SP.1500-6 Big Data Interoperability Framework Volume 6 Reference Architecture.pdf
NIST.IR.8228 Considerations for Managing Internet of Things (IoT) Cybersecurity and Privacy Risks.pdf
NIST.SP.1500-4 Big Data Interoperability Framework Volume 4 Security and Privacy.pdf
Draft-NISTIR-7800.en.zh-CN .pdf
NIST.SP.1800-14 Protecting the Integrity of Internet Routing Border Gateway Protocol (BGP) Route Origin Validation.pdf
NIST.IR.8320-draft Hardware-Enabled Security.pdf
NIST.SP.1800-17 Multifactor Authentication for E-Commerce.pdf
NIST.SP.1800-6 Domain Name System-Based Electronic Mail Security.pdf
NIST.SP.1500-7 Big Data Interoperability Framework Volume 7 Standards Roadmap.pdf
NIST.SP.1800-8 Securing Wireless Infusion Pumps in Healthcare Delivery Organizations.pdf
NIST.SP.1500-7r1 Big Data Interoperability Framework Volume 7 Standards Roadmap .pdf
NIST.SP.1800-7 Situational Awareness for Electric Utilities.pdf
NIST.SP.800-175A.pdf
NIST.SP.1500-4r1 Big Data Interoperability Framework Volume 4 Security and Privacy.pdf
NIST.SP.800-209 Security Guidelines for Storage Infrastructure.pdf
NIST.SP.800-204 Security Strategies for Microservices-based Application Systems.pdf
NIST.SP.800-207 Zero Trust Architecture .pdf
NIST.IR.8356-draft.pdf
NIST.IR.8278A.pdf
NIST.SP.1800-15 preliminary-draft Securing Small-Business and Home Internet of Things (IoT) Devices.pdf
NIST.SP.1800-12-v2 Derived Personal Identity Verification (PIV) Credentials.pdf
NIST.SP.800-181r1.pdf
NIST.SP.800-157 Guidelines for Derived personal identity verification credentials.pdf
NIST.SP.1800-13-draft-v2 Mobile Application Single Sign-On Improving Authentication for Public Safety First Responders.pdf
NIST.SP.800-167 Guide to Application Whitelisting.pdf
NIST.IR.8301.pdf
NIST.SP.1800-18-draft Privileged Account Management for the Financial Services Sector.pdf
NIST.SP.800-172A-draft Assessing Enhanced Security Requirements.pdf
NIST.IR.8259b-draft.pdf
NIST.SP.800-53r5 Security and Privacy Controls for Information Systems and Organizations.pdf
NIST.SP.800-166 Derived PIV Application and data model test guidelines.pdf
NIST.SP.800-37r2Risk Management Framework for Information Systems and Organizations.pdf
NIST.IR.8334-draft Using Mobile Device Biometrics for Authenticating First Responders.pdf
NIST.IR.8278.pdf
NIST.SP.800-53Ar4 Assessing Security and Privacy Controls in Federal Information Systems and Organizations.pdf
NIST.SP.800-163r1Vetting the Security of mobile application.pdf
NIST.IR.8286.pdf
NIST.SP.1500-2r1 Big Data Interoperability Framework Volume 2 Big Data Taxonomies.pdf
NIST.SP.800-180_draft.pdf
NIST.SP.800-132.pdf
NIST.IR.8310-draft.pdf
NIST.SP.1500-3r1 Big Data Interoperability Framework Volume 3 Use Cases and General Requirements.pdf
NIST.SP.800-172 Enhanced Security Requirements for protecting controlled Unclassified information.pdf
NIST.SP.1500-5 Big Data Interoperability Framework Volume 5 Architectures White Paper Survey.pdf
NIST.SP.800-160v2 Developing Cyber Resilient Systems.pdf
NIST.IR.8259c-draft.pdf
NIST.SP.1500-6r1 Big Data Interoperability Framework Volume 6 Reference Architecture.pdf
NIST.SP.800-171r2 Protecting Controlled Unclassified information in nonfederal systems.pdf
NIST.SP.1500-9 Big Data Interoperability Framework Volume 8 Reference Architecture Interfaces.pdf
NIST.SP.800-171a Assessing Security Requirements for controlled unclassified information.pdf
NIST.SP.1500-10 Big Data Interoperability Framework Volume 9 Adoption and Modernization.pdf
NIST.SP.800-168 Approximate Matching definition and terminology.pdf
NIST.IR.8246.pdf
NIST.IR.8374-preliminary-draft Cybersecurity Framework Profile for Ransomware Risk Management.pdf
NIST.SP.800-137.pdf
NIST.IR.8212.pdf
NIST.IR.8259D-draft.pdf
NIST.IR.8320A Hardware-Enabled Security container Platform Security Prototype.pdf
NIST.SP.800-175Br1.pdf
NIST.SP.800-130.pdf
NIST.IR.8360-draft.pdf
NIST.IR.8336-draft Background on Identity Federation Technologies for the public safety community.pdf
NIST.SP.800-160v1 Systems Security Engineering.pdf
NIST.IR.8276.pdf
NIST.SP.800-216-draft Recommendations for Federal Vulnerability Disclosure Guidelines.pdf
NIST.SP.800-140.pdf
NIST.SP.800-135r1.pdf
NIST.IR.8355-draft.pdf
NIST.SP.800-161 Supply Chain Risk Management practices for federal information systems and organization.pdf
NIST.SP.800-161r1-draft Cyber Supply Chain Risk management practices for systems and organizations.pdf
NIST.SP.800-204C-draft.en.zh-CN .pdf
NIST.SP.1800-23 .pdf
NIST.IR.8347 NIST Test Personal Identity Verification (PIV) Cards Version 2.pdf
NIST.SP.800-47r1-Managing the Security of Information Exchanges.pdf
NIST.SP.800-92 Guide to Computer Security Log Management .pdf
NIST.IR.8333 Workshop Summary Report for “Cybersecurity Risks in Consumer Home Internet of Things (IoT) Devices” Virtual Workshop.pdf
NIST.IR.8060 .pdf
NIST.SP.1800-5 .pdf
NIST.SP.800-204C .pdf
NIST.SP.1800-35b-preliminary-draft.pdf
NIST.IR.8323 Foundational PNT Profile Applying the Cybersecurity Framework for the Responsible Use of Positioning, Navigation, and Timing (PNT) Services.pdf
Draft-NISTIR-7800 .pdf
NIST.SP.800-218-draft .pdf
NIST.SP.800-161r1 .pdf
NIST.IR.8322 Workshop Summary Report for “Building the Federal Profile for IoT Device Cybersecurity” Virtual Workshop.pdf
NIST.IR.8183r1.pdf
Draft-NISTIR-7756_second-public-draft .pdf
NIST SP 800-210 云系统通用访问控制指南 .pdf
NIST.IR.8309 Status Report on the Second Round of the NIST Post-Quantum Cryptography Standardization Process.pdf
NIST.IR.8219.pdf
NIST.IR.8214A.pdf
NIST.IR.8259.pdf
NIST.IR.8259A.pdf
NIST评估信息安全持续监控项目指南评估方法一 .pdf
NIST.IR.8006 NIST Cloud ComputingForensic Science Challenges.pdf
NIST.IR.8196.pdf
NIST.IR.8294.pdf
NISP.SP.800-150 .pdf
NIST评估信息安全持续监控项目指南评估方法二 .pdf
NIST.IR.8011-4 Automation Support for Security Control Assessments Software Vulnerability Management.pdf
NIST.IR.8170.pdf
NIST.IR.8287.pdf
NIST.IR.8268.pdf
NIST.IR.8183A-2.pdf
NIST.IR.8183A-3.pdf
NIST.IR.8227.pdf
NIST.IR.8177.pdf
NIST.IR.8214.pdf
NIST.IR.8240.pdf
NIST.IR.8241.pdf
NIST.IR.8286A .pdf
NIST.信息安全人才框架(NCWF).中文.v2.0 .pdf
NIST.IR.8011-3 Automation Support for Security Control Assessments Software Asset Management.pdf
NIST.IR.8200.pdf
NIST.IR.8202.pdf
Draft-NISTIR-7756_second-public-draft.en.zh-CN .pdf
NIST.SP.1800-31 .pdf
NIST.IR.7511r5 Security Content Automation Protocol (SCAP) Version 1.3 Validation Program Test Requirements.pdf
NIST.IR.8179.pdf
NIST.SP.800-204C-draft .pdf
NIST.CSWP.01162020-NIST PRIVACY FRAMEWORK .pdf
NIST.IR.8112 Attribute Metadata A Proposed Schema for Evaluating Federated Attributes.pdf
NIST.IR.8149.pdf
NIST.IR.8201.pdf
NIST.IR.8176.pdf
NIST.IR.8194.pdf
NIST.IR.8192.pdf
NIST.IR.8188.pdf
NIST.IR.8011-1 .pdf
NIST.SP.800-218.pdf
NIST.IR.8011-2 Automation Support for Security Control Assessments Volume 2 Hardware Asset Management.pdf
NIST.SP.800-161r1-draft2 .pdf
NIST.SP.800-53r5 Security and Privacy Controls for .pdf
公益译文NIST隐私框架通过企业风险管理促进隐私保护初步草案三 .pdf
公益译文NIST隐私框架通过企业风险管理促进隐私保护初步草案一 .pdf
公益译文NIST隐私框架通过企业风险管理促进隐私保护初步草案二 .pdf
NIST.SP.800-55r1 Performance Measurement Guide for Information Security .pdf
1
2
3
4
5
6
7
8
9
10
11
12
13
站内资源均来自网友分享或网络收集整理,若无意中侵犯到您的权利,敬请联系我们
微信(点击查看客服)
,我们将及时删除相关资源。