IT Downloads Results for "National Institute of Standards and Technology"

All
All
 
 
Showing 1-10 of 106 Results    
 
 
Security95

Guide to Cyber Threat Information Sharing

  ITDownload  
  |     |   Oct 21, 2016
 

This publication provides guidelines for establishing and participating in cyber threat information sharing relationships.

...  More >>

 
email9

Trustworthy Email

  ITDownload  
  |   RESEARCH   |   Sep 22, 2016
 

This document provides recommendations and guidelines for enhancing trust in email, including transmission and content security recommendations.

...  More >>

 
Analytics16

Network of 'Things'

  ITDownload  
  |   RESEARCH   |   Aug 17, 2016
 

This document offers a foundational understanding of IoT based on the realization that IoT involves sensing, computing, communication, and actuation.

...  More >>

 
DataM46

A Rational Foundation for Software Metrology

  ITDownload  
  |   TUTORIALS   |   Feb 22, 2016
 

This report lays the foundation for a rational approach to software metrology, with the scope of the current effort being software as the object of measurement.

...  More >>

 
Checkbox1

National Checklist Program for IT Products – Guidelines for Checklist Users and Developers

  ITDownload  
  |   CHECKLISTS   |   Jan 14, 2016
 

This document makes recommendations for how users and developers should select checklists from the NIST National Checklist Repository, evaluate and test checklists, and apply them to IT products.

...  More >>

 
Security73

Guide to Application Whitelisting

  ITDownload  
  |   TUTORIALS   |   Nov 09, 2015
 

This publication is intended to assist organizations in understanding the basics of application whitelisting. It also explains planning and implementation for whitelisting technologies throughout the security deployment lifecycle.

...  More >>

 
Security29

Security of Interactive and Automated Access Management Using Secure Shell (SSH)

  ITDownload  
  |   TUTORIALS   |   Nov 04, 2015
 

This publication assists organizations in understanding the basics of SSH interactive and automated access management in an enterprise, focusing on the management of SSH user keys.

...  More >>

 
HealthCare01

Technical Evaluation, Testing, and Validation of the Usability of Electronic Health Records

  ITDownload  
  |   TUTORIALS   |   Oct 12, 2015
 

This document provides the empirical rationale for critical patient safety-related usability guidelines for standardization of EHRs.

...  More >>

 
Survey03

Interfaces for Personal Identity Verification

  ITDownload  
  |   TUTORIALS   |   Jun 04, 2015
 

This document contains the technical specifications to interface with the smart card to retrieve and use the PIV identity credentials.

...  More >>

 
Global13

Considerations for Identity Management in Public Safety Networks

  ITDownload  
  |   POLICIES   |   Apr 02, 2015
 

This document analyzes approaches to identity management for public safety networks in an effort to assist individuals developing technical and policy requirements for public safety use.

...  More >>

 
 
 
Pages:   1 2Next »  Last
 
 
Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.