๐ Autumn reading time! Let our AI Librarian find your perfect cozy read ๐ซ
Explore the literary world of this author
Recommendations of the National Institute of Standards and Technology
This document provides info. to organizations on the security capabilities of Bluetooth and provide recommendations to organizations employing Bluetoo...
Servers are frequently targeted by attackers because of the value of their data and services. For example, a server might contain personally identifia...
An info. security assessment (ISA) is the process of determining how effectively an entity being assessed (e.g., host, system, network, procedure, per...
Revision 1
This updated report provides an overview of firewall technology, and helps organizations plan for and implement effective firewalls. It explains the t...
Nist Special Publication 800-61, Revision 2
Computer security incident response has become an important component of information technology (IT) programs. Because performing incident response ef...
...
Contains a list of selected acronyms and abbreviations for system and network security terms with their generally accepted or preferred definitions. T...
Recommendations of the NIST
When an IT security configuration checklist (e.g., hardening or lockdown guide) is applied to a system in combination with trained system administrato...
Recommendations of the National Institute of Standards and Technology (NIST)
Provides info. to org. about WiMAX security capabilities. WiMAX is based on the IEEE 802.16 family of standards. Discusses the security of the WiMAX a...
The purpose of SP 800-125 is to discuss the security concerns associated with full virtualization technologies for server and desktop virtualization, ...
The purpose of this document is to assist organizations in understanding the fundamental activities performed as part of securing and maintaining the ...
Computer security incident response has become an important component of information technology (IT) programs. Security-related threats have become no...
Internet Protocol Security (IPsec) is a widely used network layer security control for protecting communications. IPsec is a framework of open standar...
Supervisory Control and Data Ccquisition (SCADA) Systems, Distributed Control Systems (DCS), and Other Control System Configurations Such as Programmable Logic Controllers (PLC)
Intrusion detection is the process of monitoring the events occurring in a computer system or network & analyzing them for signs of possible incidents...
Many people telework, and they use a variety of devices, such as desktop and laptop computers, smartphones, and tablets, to read and send email, acces...
Metrics for Software Feature Misuse Vulnerabilities
A NIST Security Configuration Checklist : Recommendations of the National Institute of Standards and Technology
Recommendations of the National Institute of Standards and Technology (Special Publication 800-126 Revision 2)
The National Institute of Standards and Technology Special Publication 800-126 Revision 2 โThe Technical Specifications for the Security Content Aut...
Guidance for Checklists Users and Developers
Supervisory Control and Data Acquisition (SCADA) Systems, Distributed Control Systems (DCS), and Other Control System Configurations Such As Programmable Logic Controllers (PLC) - Recommendations of the National Institute of Standards and Technology
NIST Special Publication 800-82. This document provides guidance for establishing secure industrial control systems (ICS). These ICS, which include su...
Recommendations of the National Institute of Standards and Technology (Special Publication 800-127)
The purpose of the National Institute of Standards and Technology Special Publication 800-127, Guide to Securing WiMAX Wireless Communications, is to ...
This publication helps teleworkers secure the external devices they use for telework, such as personally owned and third-party privately owned desktop...
Blockchains are tamper evident and tamper resistant digital ledgers implemented in a distributed fashion (i.e., without a central repository) and usua...
Recommendations of the National Institute of Standards and Technology: Nist Special Publication 800-95
This publication of the NIST seeks to assist organizations in understanding the challenges in integrating information security practices into SOA desi...
Recommendations of the National Institute of Standards and Technology (Special Publication 800-97)
The National Institute of Standards and Technology Special Publication 800-97 provides readers with a detailed explanation of next generation 802.11 w...
recommendations of the National Institute of Standards and Technology
Metrics for Software Security Configuration Vulnerabilities (draft)
The Common Configuration Scoring System (CCSS) is a set of measures of the severity of software security configuration issues. CCSS is derived from CV...
Endgame's Guide to Adversary Hunting
The purpose of this document is to provide guidance to organizations in securing their legacy IEEE 802.11 wireless local area networks (WLAN) that can...