89 books • 2 series
Trustworthy Email Draft (2nd) Nist Sp 800-177 REV 1
Specifications, Tolerances, and Other Technical Requirements for Weighing and Measuring Devices
Cybersecurity Framework Manufacturing Profile NISTIR 8183
Recommendation for Key-Derivation Methods in Key-Establishment Schemes
Criticality Analysis Process Model
An Introduction to Information Security
NIST SP 800-152 A Profile for U. S. Federal Cryptographic Key Management Systems
NIST SP 800-130 Framework for Designing Cryptographic Key Management Systems
Federal Information Processing Standards Publications
Guide to Cyber Threat Information Sharing
NISTIR 8144 Assessing Threats to Mobile Devices & Infrastructure
Vulnerability Description Ontology (VDO)
NIST SP 175A & 175B Cryptographic Standards in the Federal Government
NIST SP 800-183 Networks of 'Things'
Identifying and Categorizing Data Types for Public Safety Mobile Applications
Nist Sp 800-57 Part 1 REV 4 Recommendation for Key Management
Nist Sp 1800-4a & 4b Mobile Device Security
Identity and Access Management for Electric Utilities
NIST SP 800-161 Supply Chain Risk Management Practices for Federal Information Systems and Organizations
NISTIR 7823 Advanced Metering Infrastructure Smart Meter Upgradeability Test Fra
NIST SP 800-163 Vetting the Security of Mobile Applications
The U.S. Manufacturing Value Chain
Quantum Computing and Communication
Picture Password