C 13.10:800-57/PT.3/DRAFT
|
Recommendation for key management. Part 3 application-specific key management guidance |
1 |
C 13.10:800-58
|
Security considerations for voice over IP systems recommendations of the National Institute of Standards and Technology |
1 |
C 13.10:800-59
|
Guideline for identifying an information system as a national security system |
1 |
C 13.10:800-60
|
Guide for mapping types of information and information systems to security categories |
1 |
C 13.10:800-60/REV.1
|
Guide for mapping types of information and information systems to security categories |
1 |
C 13.10:800-61
|
Computer security incident handling guide : recommendations of the National Institute of Standards and Technology |
1 |
C 13.10:800-61/REV.1
|
Computer security incident handling guide : recommendations of the National Institute of Standards and Technology |
1 |
C 13.10:800-63
|
Electronic authentication guideline recommendations of the National Institute of Standards and Technology |
1 |
C 13.10:800-63-1
|
Electronic authentication guideline : recommendations of the National Institute of Standards and Technology |
1 |
C 13.10:800-64/REV.1
|
Security considerations in the information system development life cycle |
1 |
C 13.10:800-65
|
Integrating IT security into the capital planning and investment control process |
1 |
C 13.10:800-65/REV.1/DRAFT
|
Recommendations for integrating information security into the capital planning and investment control process (draft) |
1 |
C 13.10:800-66
|
An introductory resource guide for implementing the Health Insurance Portability and Accountability Act (HIPAA) Security Rule |
1 |
C 13.10:800-66/REV.1
|
An introductory resource guide for implementing the Health Insurance Portability and Accountability Act (HIPAA) Security Rule |
1 |
C 13.10:800-67
|
Recommendation for the Triple Data Encryption Algorithm (TDEA) block cipher |
1 |
C 13.10:800-68/REV.1/DRAFT
|
Guide to securing Microsoft Windows XP systems for IT professionals a NIST security configuration checklist : recommendations of the National Institute of Standards and Technology |
1 |
C 13.10:800-70/REV.1/DRAFT
|
National checklist program for IT products guidelines for checklist users and developers (draft) : recommendations of the National Institute of Standards and Technology |
1 |
C 13.10:800-72
|
Guidelines on PDA forensics recommendations of the National Institute of Standards and Technology |
1 |
C 13.10:800-73-1
|
Interfaces for Personal Identity Verification |
1 |
C 13.10:800-73-3/DRAFT/2009/V.1-4
|
Interfaces for Personal Identity Verification |
1 |