Joint task force transformation initiative



Download 5.8 Mb.
Page16/186
Date31.01.2017
Size5.8 Mb.
#13082
1   ...   12   13   14   15   16   17   18   19   ...   186

references


LAWS, POLICIES, DIRECTIVES, REGULATIONS, MEMORANDA, STANDARDS, AND GUIDELINES

legislation and executive orders

  1. E-Government Act [includes FISMA] (P.L. 107-347), December 2002.

  1. Federal Information Security Management Act (P.L. 107-347, Title III), December 2002.

  1. Paperwork Reduction Act (P.L. 104-13), May 1995.

  1. USA PATRIOT Act (P.L. 107-56), October 2001.

  1. Privacy Act of 1974 (P.L. 93-579), December 1974.

  2. Freedom of Information Act (FOIA), 5 U.S.C. § 552, As Amended By Public Law No. 104-231, 110 Stat. 3048, Electronic Freedom of Information Act Amendments of 1996.

  1. Health Insurance Portability and Accountability Act (P.L. 104-191), August 1996.

  1. The Atomic Energy Act of 1954 (P.L. 83-703), August 1954.

  2. Executive Order 13556, Controlled Unclassified Information, November 2010.

  1. Executive Order 13587, Structural Reforms to Improve the Security of Classified Networks and the Responsible Sharing and Safeguarding of Classified Information, October 2011.

policies, directives, instructions, regulations, and memoranda

  1. Presidential Memorandum, National Insider Threat Policy and Minimum Standards for Executive Branch Insider Threat Programs, November 2012.

  1. Code of Federal Regulations, Title 5, Administrative Personnel, Section 731.106, Designation of Public Trust Positions and Investigative Requirements (5 C.F.R. 731.106).

  1. Code of Federal Regulations, Part 5 Administrative Personnel, Subpart C—Employees Responsible for the Management or Use of Federal Computer Systems, Section 930.301 through 930.305 (5 C.F.R. 930.301-305).

  1. Committee on National Security Systems Policy (CNSSP) No. 11, National Policy Governing the Acquisition of Information Assurance (IA) and IA-Enabled Information Technology (IT) Products, July 2003.

  1. Committee on National Security Systems Policy (CNSSP) No. 12, National Information Assurance Policy for Space Systems Used to Support National Security Missions, March 2007.

  1. Committee on National Security Systems (CNSS) Instruction 4009, National Information Assurance Glossary, April 2010.

  1. Committee on National Security Systems (CNSS) Instruction 1253, Version 2, Security Categorization and Control Selection for National Security Systems, March 2012.

  1. Committee on National Security Systems Directive (CNSSD) No. 504, Directive on Protecting National Security Systems from Insider Threat, January 2012.

  1. Department of Homeland Security, National Infrastructure Protection Plan (NIPP), 2009.

  1. Intelligence Community Directive (ICD) 705, Sensitive Compartmented Information Facilities, May 2010.

  1. Federal Continuity Directive 1 (FCD 1), Federal Executive Branch National Continuity Program and Requirements, February 2008.

  1. Executive Office of the President of the United States and Federal CIO Council, Federal Identity, Credential, and Access Management (FICAM) Roadmap and Implementation Guidance, December 2011.

  1. Homeland Security Presidential Directive 7, Critical Infrastructure Identification, Prioritization, and Protection, December 2003.

  1. Homeland Security Presidential Directive 12, Policy for a Common Identification Standard for Federal Employees and Contractors, August 2004.

  1. Homeland Security Presidential Directive 20 (National Security Presidential Directive 51), National Continuity Policy, May 2007.

  1. Intelligence Community Directive Number 704, Personnel Security Standards and Procedures Governing Eligibility For Access To Sensitive Compartmented Information And Other Controlled Access Program Information, October 2008.

  1. National Communications System (NCS) Directive 3-10, Minimum Requirements for Continuity Communications Capabilities, July 2007.

  1. National Security Telecommunications and Information Systems Security Instruction (NSTISSI) 7003, Protective Distribution Systems (PDS), December 1996.

  1. Office of Management and Budget Circular A-130, Appendix III, Transmittal Memorandum #4, Management of Federal Information Resources, November 2000.

  1. Office of Management and Budget, Federal Enterprise Architecture Program Management Office, FEA Consolidated Reference Model Document, Version 2.3, October 2007.

  1. Office of Management and Budget, Federal Segment Architecture Methodology (FSAM), January 2009.

  1. Office of Management and Budget Memorandum 01-05, Guidance on Inter-Agency Sharing of Personal Data - Protecting Personal Privacy, December 2000.

  1. Office of Management and Budget Memorandum 02-01, Guidance for Preparing and Submitting Security Plans of Action and Milestones, October 2001.

  1. Office of Management and Budget Memorandum 03-19, Reporting Instructions for the Federal Information Security Management Act and Updated Guidance on Quarterly IT Security Reporting, August 2003.

  1. Office of Management and Budget Memorandum 03-22, OMB Guidance for Implementing the Privacy Provisions of the E-Government Act of 2002, September 2003.

  1. Office of Management and Budget Memorandum 04-04, E-Authentication Guidance for Federal Agencies, December 2003.

  1. Office of Management and Budget Memorandum 04-26, Personal Use Policies and File Sharing Technology, September 2004.

  1. Office of Management and Budget Memorandum 05-08, Designation of Senior Agency Officials for Privacy, February 2005.

  1. Office of Management and Budget Memorandum 05-24, Implementation of Homeland Security Presidential Directive (HSPD) 12—Policy for a Common Identification Standard for Federal Employees and Contractors, August 2005.

  1. Office of Management and Budget Memorandum 06-15, Safeguarding Personally Identifiable Information, May 2006.

  1. Office of Management and Budget Memorandum 06-16, Protection of Sensitive Information, June 2006.

  1. Office of Management and Budget Memorandum 06-19, Reporting Incidents Involving Personally Identifiable Information and Incorporating the Cost for Security in Agency Information Technology Investments, July 2006.

  1. Office of Management and Budget Memorandum, Recommendations for Identity Theft Related Data Breach Notification Guidance, September 2006.

  1. Office of Management and Budget Memorandum 07-11, Implementation of Commonly Accepted Security Configurations for Windows Operating Systems, March 2007.

  1. Office of Management and Budget Memorandum 07-16, Safeguarding Against and Responding to the Breach of Personally Identifiable Information, May 2007.

  1. Office of Management and Budget Memorandum 07-18, Ensuring New Acquisitions Include Common Security Configurations, June 2007.

  1. Office of Management and Budget Memorandum 08-22, Guidance on the Federal Desktop Core Configuration (FDCC), August 2008.

  1. Office of Management and Budget Memorandum 08-23, Securing the Federal Government’s Domain Name System Infrastructure, August 2008.

  1. The White House, Office of the Press Secretary, Designation and Sharing of Controlled Unclassified Information (CUI), May 2008.

  1. The White House, Office of the Press Secretary, Classified Information and Controlled Unclassified Information, May 2009.

  1. Office of Management and Budget Memorandum 11-11, Continued Implementation of Homeland Security Presidential Directive (HSPD) 12– Policy for a Common Identification Standard for Federal Employees and Contractors, February 2011.

  1. Office of Management and Budget Memorandum, Requirements for Accepting Externally-Issued Identity Credentials, October 2011.

  1. Office of Management and Budget Memorandum 11-33, FY 2011 Reporting Instructions for the Federal Information Security Management Act and Agency Privacy Management, September 2011.

standards

  1. International Organization for Standardization/International Electrotechnical Commission 27001:2005, Security techniques -- Information security management systems -- Requirements.

  1. International Organization for Standardization/International Electrotechnical Commission 15408-1:2009, Information technology -- Security techniques -- Evaluation criteria for IT security -- Part 1: Introduction and general model.

  1. International Organization for Standardization/International Electrotechnical Commission 15408-2:2008, Information technology -- Security techniques -- Evaluation criteria for IT security -- Part 2: Security functional requirements.

  1. International Organization for Standardization/International Electrotechnical Commission 15408-3:2008, Information technology -- Security techniques -- Evaluation criteria for IT security -- Part 3: Security assurance requirements.

  1. National Institute of Standards and Technology Federal Information Processing Standards Publication 140-2, Security Requirements for Cryptographic Modules, May 2001. National Institute of Standards and Technology Federal Information Processing Standards Publication 140-3 (Draft), Security Requirements for Cryptographic Modules, December 2009.

  1. National Institute of Standards and Technology Federal Information Processing Standards Publication 180-4, Secure Hash Standard (SHS), March 2012.

  1. National Institute of Standards and Technology Federal Information Processing Standards Publication 186-3, Digital Signature Standard (DSS), June 2009.

  1. National Institute of Standards and Technology Federal Information Processing Standards Publication 188, Standard Security Label for Information Transfer, September 1994.

  1. National Institute of Standards and Technology Federal Information Processing Standards Publication 190, Guideline for the Use of Advanced Authentication Technology Alternatives, September 1994.

  1. National Institute of Standards and Technology Federal Information Processing Standards Publication 197, Advanced Encryption Standard (AES), November 2001.

  1. National Institute of Standards and Technology Federal Information Processing Standards Publication 198-1, The Keyed-Hash Message Authentication Code (HMAC), July 2008.

  1. National Institute of Standards and Technology Federal Information Processing Standards Publication 199, Standards for Security Categorization of Federal Information and Information Systems, February 2004.

  1. National Institute of Standards and Technology Federal Information Processing Standards Publication 200, Minimum Security Requirements for Federal Information and Information Systems, March 2006.

  1. National Institute of Standards and Technology Federal Information Processing Standards Publication 201-1, Personal Identity Verification (PIV) of Federal Employees and Contractors, March 2006.

guidelines and interagency reports

  1. National Institute of Standards and Technology Special Publication 800-12, An Introduction to Computer Security: The NIST Handbook, October 1995.

  1. National Institute of Standards and Technology Special Publication 800-13, Telecommunications Security Guidelines for Telecommunications Management Network, October 1995.

  1. National Institute of Standards and Technology Special Publication 800-14, Generally Accepted Principles and Practices for Securing Information Technology Systems, September 1996.

  1. National Institute of Standards and Technology Special Publication 800-15, Minimum Interoperability Specification for PKI Components (MISPC), Version 1, January 1998.

  1. National Institute of Standards and Technology Special Publication 800-16, Information Security Training Requirements: A Role- and Performance-Based Model, April 1998.

  1. National Institute of Standards and Technology Special Publication 800-17, Modes of Operation Validation System (MOVS): Requirements and Procedures, February 1998.

  1. National Institute of Standards and Technology Special Publication 800-18, Revision 1, Guide for Developing Security Plans for Federal Information Systems, February 2006.

  1. National Institute of Standards and Technology Special Publication 800-19, Mobile Agent Security, October 1999.

  1. National Institute of Standards and Technology Special Publication 800-20, Modes of Operation Validation System for the Triple Data Encryption Algorithm (TMOVS): Requirements and Procedures, October 1999.

  1. National Institute of Standards and Technology Special Publication 800-21-1, Second Edition, Guideline for Implementing Cryptography in the Federal Government, December 2005.

  1. National Institute of Standards and Technology Special Publication 800-22, Revision 1a, A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications, April 2010.

  1. National Institute of Standards and Technology Special Publication 800-23, Guidelines to Federal Organizations on Security Assurance and Acquisition/Use of Tested/Evaluated Products, August 2000.

  1. National Institute of Standards and Technology Special Publication 800-24, PBX Vulnerability Analysis: Finding Holes in Your PBX Before Someone Else Does, August 2000.

  1. National Institute of Standards and Technology Special Publication 800-25, Federal Agency Use of Public Key Technology for Digital Signatures and Authentication, October 2000.

  1. National Institute of Standards and Technology Special Publication 800-27, Revision A, Engineering Principles for Information Technology Security (A Baseline for Achieving Security), June 2004.

  1. National Institute of Standards and Technology Special Publication 800-28, Version 2, Guidelines on Active Content and Mobile Code, March 2008.

  1. National Institute of Standards and Technology Special Publication 800-29, A Comparison of the Security Requirements for Cryptographic Modules in FIPS 140-1 and FIPS 140-2, June 2001.

  1. National Institute of Standards and Technology Special Publication 800-30, Revision 1, Guide for Conducting Risk Assessments, September 2012.

  1. National Institute of Standards and Technology Special Publication 800-32, Introduction to Public Key Technology and the Federal PKI Infrastructure, February 2001.

  1. National Institute of Standards and Technology Special Publication 800-33, Underlying Technical Models for Information Technology Security, December 2001.

  1. National Institute of Standards and Technology Special Publication 800-34, Revision 1, Contingency Planning Guide for Federal Information Systems, May 2010.

  1. National Institute of Standards and Technology Special Publication 800-35, Guide to Information Technology Security Services, October 2003.

  1. National Institute of Standards and Technology Special Publication 800-36, Guide to Selecting Information Security Products, October 2003.

  1. National Institute of Standards and Technology Special Publication 800-37, Revision 1, Guide for Applying the Risk Management Framework to Federal Information Systems: A Security Life Cycle Approach, February 2010.

  1. National Institute of Standards and Technology Special Publication 800-38A—Addendum, Recommendation for Block Cipher Modes of Operation: Three Variants of Ciphertext Stealing for CBC Mode, October 2010.

  1. National Institute of Standards and Technology Special Publication 800-38B, Recommendation for Block Cipher Modes of Operation: The CMAC Mode for Authentication, May 2005.

  1. National Institute of Standards and Technology Special Publication 800-38C, Recommendation for Block Cipher Modes of Operation: the CCM Mode for Authentication and Confidentiality, May 2004.

  1. National Institute of Standards and Technology Special Publication 800-38D, Recommendation for Block Cipher Modes of Operation: Galois/Counter Mode (GCM) and GMAC, November 2007.

  1. National Institute of Standards and Technology Special Publication 800-38E, Recommendation for Block Cipher Modes of Operation: The XTS-AES Mode for Confidentiality on Storage Devices, January 2010.

  1. National Institute of Standards and Technology Special Publication 800-38F, Recommendation for Block Cipher Modes of Operation: Methods for Key Wrapping, December 2012.

  1. National Institute of Standards and Technology Special Publication 800-39, Managing Information Security Risk: Organization, Mission, and Information System View, March 2011.

  1. National Institute of Standards and Technology Special Publication 800-40, Version 2, Creating a Patch and Vulnerability Management Program, November 2005.

  1. National Institute of Standards and Technology Special Publication 800-41, Revision 1, Guidelines on Firewalls and Firewall Policy, September 2009.

  1. National Institute of Standards and Technology Special Publication 800-43, Systems Administration Guidance for Windows 2000 Professional System, November 2002.

  1. National Institute of Standards and Technology Special Publication 800-44, Version 2, Guidelines on Securing Public Web Servers, September 2007.

  1. National Institute of Standards and Technology Special Publication 800-45, Version 2, Guidelines on Electronic Mail Security, February 2007.

  1. National Institute of Standards and Technology Special Publication 800-46, Revision 1, Guide to Enterprise Telework and Remote Access Security, June 2009.

  1. National Institute of Standards and Technology Special Publication 800-47, Security Guide for Interconnecting Information Technology Systems, August 2002.

  1. National Institute of Standards and Technology Special Publication 800-48, Revision 1, Guide to Securing Legacy IEEE 802.11 Wireless Networks, July 2008.

  1. National Institute of Standards and Technology Special Publication 800-49, Federal S/MIME V3 Client Profile, November 2002.

  1. National Institute of Standards and Technology Special Publication 800-50, Building an Information Technology Security Awareness and Training Program, October 2003.

  1. National Institute of Standards and Technology Special Publication 800-51, Revision 1, Guide to Using Vulnerability Naming Schemes, February 2011.

  1. National Institute of Standards and Technology Special Publication 800-52, Revision 1 (Draft), Guidelines for the Selection, Configuration, and Use of Transport Layer Security (TLS) Implementations, September 2013.

  1. National Institute of Standards and Technology Special Publication 800-53A, Revision 1, Guide for Assessing the Security Controls in Federal Information Systems and Organizations: Building Effective Security Assessment Plans, June 2010.

  1. National Institute of Standards and Technology Special Publication 800-54, Border Gateway Protocol Security, July 2007.

  1. National Institute of Standards and Technology Special Publication 800-55, Revision 1, Performance Measurement Guide for Information Security, July 2008.

  1. National Institute of Standards and Technology Special Publication 800-56A (Revised), Recommendation for Pair-Wise Key Establishment Schemes Using Discrete Logarithm Cryptography, March 2007.

  1. National Institute of Standards and Technology Special Publication 800-57 Revision 3, Recommendation for Key Management, July 2012.

  1. National Institute of Standards and Technology Special Publication 800-58, Security Considerations for Voice Over IP Systems, January 2005.

  1. National Institute of Standards and Technology Special Publication 800-59, Guideline for Identifying an Information System as a National Security System, August 2003.

  1. National Institute of Standards and Technology Special Publication 800-60, Revision 1, Guide for Mapping Types of Information and Information Systems to Security Categories, August 2008.

  1. National Institute of Standards and Technology Special Publication 800-61, Revision 2, Computer Security Incident Handling Guide, August 2012.

  1. National Institute of Standards and Technology Special Publication 800-63-1, Electronic Authentication Guideline, December 2011.

  1. National Institute of Standards and Technology Special Publication 800-64, Revision 2, Security Considerations in the System Development Life Cycle, October 2008.

  1. National Institute of Standards and Technology Special Publication 800-65, Integrating IT Security into the Capital Planning and Investment Control Process, January 2005.

  1. National Institute of Standards and Technology Special Publication 800-66, Revision 1, An Introductory Resource Guide for Implementing the Health Insurance Portability and Accountability Act (HIPAA) Security Rule, October 2008.

  1. National Institute of Standards and Technology Special Publication 800-67, Revision 1, Recommendation for the Triple Data Encryption Algorithm (TDEA) Block Cipher, January 2012.

  1. National Institute of Standards and Technology Special Publication 800-68, Revision 1, Guide to Securing Microsoft Windows XP Systems for IT Professionals: A NIST Security Configuration Checklist, October 2008.

  1. National Institute of Standards and Technology Special Publication 800-69, Guidance for Securing Microsoft Windows XP Home Edition: A NIST Security Configuration Checklist, September 2006.

  1. National Institute of Standards and Technology Special Publication 800-70, Revision 2, National Checklist Program for IT Products--Guidelines for Checklist Users and Developers, February 2011.

  1. National Institute of Standards and Technology Special Publication 800-72, Guidelines on PDA Forensics, November 2004.

  1. National Institute of Standards and Technology Special Publication 800-73-3, Interfaces for Personal Identity Verification, February 2010.

  1. National Institute of Standards and Technology Special Publication 800-76-1, Biometric Data Specification for Personal Identity Verification, January 2007.

  1. National Institute of Standards and Technology Special Publication 800-77, Guide to IPsec VPNs, December 2005.

  1. National Institute of Standards and Technology Special Publication 800-78-3, Cryptographic Algorithms and Key Sizes for Personal Identity Verification (PIV), December 2010.

  1. National Institute of Standards and Technology Special Publication 800-79-1, Guidelines for the Accreditation of Personal Identity Verification Card Issuers, June 2008.

  1. National Institute of Standards and Technology Special Publication 800-81, Secure Domain Name System (DNS) Deployment Guide, Revision 1, April 2010.

  1. National Institute of Standards and Technology Special Publication 800-82, Revision 1, Guide to Industrial Control Systems (ICS) Security, April 2013.

  1. National Institute of Standards and Technology Special Publication 800-83, Guide to Malware Incident Prevention and Handling, November 2005.

  1. National Institute of Standards and Technology Special Publication 800-84, Guide to Test, Training, and Exercise Programs for IT Plans and Capabilities, September 2006.

  1. National Institute of Standards and Technology Special Publication 800-85A-2, PIV Card Application and Middleware Interface Test Guidelines (SP 800-73-3 Compliance), July 2010.

  1. National Institute of Standards and Technology Special Publication 800-85B-1, (Draft) PIV Data Model Test Guidelines, September 2009.

  1. National Institute of Standards and Technology Special Publication 800-86, Guide to Integrating Forensic Techniques into Incident Response, August 2006.

  1. National Institute of Standards and Technology Special Publication 800-87, Revision 1, Codes for the Identification of Federal and Federally-Assisted Organizations, April 2008.

  1. National Institute of Standards and Technology Special Publication 800-88, Guidelines for Media Sanitization, September 2006.

  1. National Institute of Standards and Technology Special Publication 800-89, Recommendation for Obtaining Assurances for Digital Signature Applications, November 2006.

  1. National Institute of Standards and Technology Special Publication 800-90A, Recommendation for Random Number Generation Using Deterministic Random Bit Generators, January 2012.

  1. National Institute of Standards and Technology Special Publication 800-92, Guide to Computer Security Log Management, September 2006.

  1. National Institute of Standards and Technology Special Publication 800-94, Guide to Intrusion Detection and Prevention Systems (IDPS), February 2007.

  1. National Institute of Standards and Technology Special Publication 800-95, Guide to Secure Web Services, August 2007.

  1. National Institute of Standards and Technology Special Publication 800-96, PIV Card / Reader Interoperability Guidelines, September 2006.

  1. National Institute of Standards and Technology Special Publication 800-97, Establishing Robust Security Networks: A Guide to IEEE 802.11i, February 2007.

  1. National Institute of Standards and Technology Special Publication 800-98, Guidelines for Securing Radio Frequency Identification (RFID) Systems, April 2007.

  1. National Institute of Standards and Technology Special Publication 800-100, Information Security Handbook: A Guide for Managers, October 2006.

  1. National Institute of Standards and Technology Special Publication 800-101, Guidelines on Cell Phone Forensics, May 2007.

  1. National Institute of Standards and Technology Special Publication 800-103 (Draft), An Ontology of Identity Credentials, Part I: Background and Formulation, October 2006.

  1. National Institute of Standards and Technology Special Publication 800-104, A Scheme for PIV Visual Card Topography, June 2007.

  1. National Institute of Standards and Technology Special Publication 800-106, Randomized Hashing Digital Signatures, February 2009.

  1. National Institute of Standards and Technology Special Publication 800-107, Recommendation for Applications Using Approved Hash Algorithms, August 2012.

  1. National Institute of Standards and Technology Special Publication 800-108, Recommendation for Key Derivation Using Pseudorandom Functions, October 2009.

  1. National Institute of Standards and Technology Special Publication 800-111, Guide to Storage Encryption Technologies for End User Devices, November 2007.

  1. National Institute of Standards and Technology Special Publication 800-113, Guide to SSL VPNs, July 2008.

  1. National Institute of Standards and Technology Special Publication 800-114, User's Guide to Securing External Devices for Telework and Remote Access, November 2007.

  1. National Institute of Standards and Technology Special Publication 800-115, Technical Guide to Information Security Testing and Assessment, September 2008.

  1. National Institute of Standards and Technology Special Publication 800-116, A Recommendation for the Use of PIV Credentials in Physical Access Control Systems (PACS), November 2008.

  1. National Institute of Standards and Technology Special Publication 800-117, Version 1.0, Guide to Adopting and Using the Security Content Automation Protocol (SCAP), July 2010.

  1. National Institute of Standards and Technology Special Publication 800-118 (Draft), Guide to Enterprise Password Management, April 2009.

  1. National Institute of Standards and Technology Special Publication 800-121, Revision 1, Guide to Bluetooth Security, June 2012.

  1. National Institute of Standards and Technology Special Publication 800-122, Guide to Protecting the Confidentiality of Personally Identifiable Information (PII), April 2010.

  1. National Institute of Standards and Technology Special Publication 800-123, Guide to General Server Security, July 2008.

  1. National Institute of Standards and Technology Special Publication 800-124, Guidelines on Cell Phone and PDA Security, October 2008.

  1. National Institute of Standards and Technology Special Publication 800-125, Guide to Security for Full Virtualization Technologies, January 2011.

  1. National Institute of Standards and Technology Special Publication 800-126, Revision 2, The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.2, September 2011.

  1. National Institute of Standards and Technology Special Publication 800-127, Guide to Securing WiMAX Wireless Communications, September 2010.

  1. National Institute of Standards and Technology Special Publication 800-128, Guide for Security-Focused Configuration Management of Information Systems, August 2011.

  1. National Institute of Standards and Technology Special Publication 800-133, Recommendation for Cryptographic Key Generation, December 2012.

  1. National Institute of Standards and Technology Special Publication 800-137, Information Security Continuous Monitoring for Federal Information Systems and Organizations, September 2011.

  1. National Institute of Standards and Technology Special Publication 800-142, Practical Combinatorial Testing, October 2010.

  1. National Institute of Standards and Technology Special Publication 800-144, Guidelines for Security and Privacy in Public Cloud Computing, December 2011.

  1. National Institute of Standards and Technology Special Publication 800-145, The NIST Definition of Cloud Computing, September 2011.

  1. National Institute of Standards and Technology Special Publication 800-146, Cloud Computing Synopsis and Recommendations, May 2012.

  1. National Institute of Standards and Technology Special Publication 800-147, Basic Input/Output System (BIOS) Protection Guidelines, April 2011.

  1. National Institute of Standards and Technology Special Publication 800-153, Guidelines for Securing Wireless Local Area Networks (WLANs), September 2011.

  1. National Institute of Standards and Technology Interagency Report 7622, Notional Supply Chain Risk Management Practices for Federal Information Systems, October 2012.


appendix b

Directory: publications
publications -> Acm word Template for sig site
publications ->  Preparation of Papers for ieee transactions on medical imaging
publications -> Adjih, C., Georgiadis, L., Jacquet, P., & Szpankowski, W. (2006). Multicast tree structure and the power law
publications -> Swiss Federal Institute of Technology (eth) Zurich Computer Engineering and Networks Laboratory
publications -> Quantitative skills
publications -> Multi-core cpu and gpu implementation of Discrete Periodic Radon Transform and Its Inverse
publications -> List of Publications Department of Mechanical Engineering ucek, jntu kakinada
publications -> 1. 2 Authority 1 3 Planning Area 1
publications -> Sa michelson, 2011: Impact of Sea-Spray on the Atmospheric Surface Layer. Bound. Layer Meteor., 140 ( 3 ), 361-381, doi: 10. 1007/s10546-011-9617-1, issn: Jun-14, ids: 807TW, sep 2011 Bao, jw, cw fairall, sa michelson

Download 5.8 Mb.

Share with your friends:
1   ...   12   13   14   15   16   17   18   19   ...   186




The database is protected by copyright ©ininet.org 2024
send message

    Main page