NIST 800x серия
https://yadi.sk/d/nYAxq04X35AnAr
A Recommendation for the Use of PIV Credentials in Physical Access Control Systems (PACS) SP800-116.pdf
A Scheme for PIV Visual Card Topography SP800-104-June29_2007-final.pdf
An Introductory Resource Guide for Implementing the Health Insurance Portability and Accountability Act (HIPAA) Security Rule SP-800-66-Revision1.pdf
Biometric Data Specification for Personal Identity Verification SP800-76-1_012407.pdf
Border Gateway Protocol Security SP800-54.pdf
Building an Information Technology Security Awareness and Training Program NIST-SP800-50.pdf
Codes for Identification of Federal and Federally-Assisted Organizations SP800-87_Rev1-April2008Final.pdf
Computer Security Incident Handling Guide SP800-61rev1.pdf
Contingency Planning Guide for Information Technology Systems sp800-34.pdf
Creating a Patch and Vulnerability Management Program SP800-40v2.pdf
Cryptographic Algorithms and Key Sizes for Personal Identity Verification SP-800-78-1_final2.pdf
Electronic Authentication Guideline SP800-63V1_0_2.pdf
Engineering Principles for Information Technology Security (A Baseline for Achieving Security) SP800-27-RevA.pdf
Establishing Wireless Robust Security Networks- A Guide to IEEE 802.11i SP800-97.pdf
Federal SMIME V3 Client Profile sp800-49.pdf
Guide for Assessing the Security Controls in Federal Information Systems SP800-53A-final-sz.pdf
Guide for Developing Security Plans for Federal Information Systems sp800-18-Rev1-final.pdf
Guide for Mapping Types of Information and Information Systems to Security Categories SP800-60_Vol1-Rev1.pdf
Guide for Mapping Types of Information and Information Systems to Security Categories SP800-60_Vol2-Rev1.pdf
Guide for the Security Certification and Accreditation of Federal Information Systems SP800-37-final.pdf
Guide to Bluetooth Security SP800-121.pdf
Guide to Computer Security Log Management SP800-92.pdf
Guide to Enterprise Telework and Remote Access Security sp800-46r1.pdf
Guide to General Server Security SP800-123.pdf
Guide to Information Technology Security Services NIST-SP800-35.pdf
Guide to Integrating Forensic Techniques into Incident Response SP800-86.pdf
Guide to Intrusion Detection and Prevention Systems (IDPS) SP800-94.pdf
Guide to IPsec VPNs sp800-77.pdf
Guide to Malware Incident Prevention and Handling SP800-83.pdf
Guide to Secure Web Services SP800-95.pdf
Guide to Securing Legacy IEEE 802.11 Wireless Networks SP800-48r1.pdf
Guide to Selecting Information Technology Security Products NIST-SP800-36.pdf
Guide to SSL VPNs SP800-113.pdf
Guide to Storage Encryption Technologies for End User Devices SP800-111.pdf
Guide to Test, Training, and Exercise Programs for IT Plans and Capabilities SP800-84.pdf
Guideline for Identifying an Information System as a National Security System SP800-59.pdf
Guideline for Implementing Cryptography in the Federal Government sp800-21-1_Dec2005.pdf
Guidelines for Media Sanitization NISTSP800-88_rev1.pdf
Guidelines for Securing Radio Frequency Identification (RFID) Systems SP800-98_RFID-2007.pdf
Guidelines for the Accreditation of Personal Identity Verification (PIV) Card Issuers (PCI-s) SP800-79-1.pdf
Guidelines for the Selection and Use of Transport Layer Security (TLS) Implementations SP800-52.pdf
Guidelines on Cell Phone and PDA Security SP800-124.pdf
Guidelines on Cell Phone Forensics SP800-101.pdf
Guidelines on Electronic Mail Security SP800-45v2.pdf
Guidelines on Firewalls and Firewall Policy sp800-41.pdf
Guidelines on PDA Forensics sp800-72.pdf
Guidelines on Securing Public Web Servers SP800-44v2.pdf
Information Security Handbook- A Guide for Managers SP800-100-Mar07-2007.pdf
Interfaces for Personal Identity Verification (4 parts) sp800-73-2_part1-datamodel-final.pdf
Interfaces for Personal Identity Verification (4 parts) sp800-73-2_part2_end-point-piv-card-application-card-command-interface-final.pdf
Interfaces for Personal Identity Verification (4 parts) sp800-73-2_part3_end-point-client-api-final.pdf
Interfaces for Personal Identity Verification (4 parts) sp800-73-2_part4_transitional-specification-final.pdf
Introduction to Public Key Technology and the Federal PKI Infrastructure sp800-32.pdf
Mobile Agent Security sp800-19.pdf
NIST 800x.rar
ntegrating IT Security into the Capital Planning and Investment Control Process SP-800-65-Final.pdf
Performance Measurement Guide for Information Security SP800-55-rev1.pdf
PIV Card Application and Middleware Interface Test Guidelines (SP 800-73-2 Compliance) nist-sp800-85A-1.pdf
PIV Card to Reader Interoperability Guidelines SP800-96-091106.pdf
PIV Data Model Test Guidelines SP800-85b-072406-final.pdf
Randomized Hashing for Digital Signatures NIST-SP-800-106.pdf
Recommendation for Applications Using Approved Hash Algorithms NIST-SP-800-107.pdf
Recommendation for Block Cipher Modes of Operation - Methods and Techniques sp800-38a.pdf
Recommendation for Block Cipher Modes of Operation- the CCM Mode for Authentication and Confidentiality SP800-38C_updated-July20_2007.pdf
Recommendation for Block Cipher Modes of Operation- The CMAC Mode for Authentication SP_800-38B.pdf
Recommendation for Key Derivation Using Pseudorandom Functions sp800-108.pdf
Recommendation for Key Management sp800-57-Part1-revised2_Mar08-2007.pdf
Recommendation for Key Management SP800-57-Part2.pdf
Recommendation for Obtaining Assurances for Digital Signature Applications SP-800-89_November2006.pdf
Recommendation for Pair-Wise Key Establishment Schemes Using Discrete Logarithm Cryptography SP800-56A_Revision1_Mar08-2007.pdf
Recommendation for Random Number Generation Using Deterministic Random Bit Generators SP800-90revised_March2007.pdf
Recommendation for the Triple Data Encryption Algorithm (TDEA) Block Cipher SP800-67.pdf
Recommended Security Controls for Federal Information Systems and Organizations sp800-53-rev3-final-errata.pdf
Risk Management Guide for Information Technology Systems sp800-30.pdf
Secure Domain Name System (DNS) Deployment Guide SP800-81.pdf
Security Considerations for Voice Over IP Systems SP800-58-final.pdf
Security Considerations in the System Development Life Cycle SP800-64-Revision2.pdf
Security Guide for Interconnecting Information Technology Systems sp800-47.pdf
Technical Guide to Information Security Testing and Assessment SP800-115.pdf
Use of the Common Vulnerabilities and Exposures (CVE) Vulnerability Naming Scheme sp800-51.pdf
81 File(s) 161я633я502 bytes
2 Dir(s) 1я365я599я109я120 bytes free