Publications Portal

You searched on:
Topic Area: Computer Security

Displaying records 1 to 10 of 414 records.
Resort by: Date / Title


1. Guide for Conducting Risk Assessments
Series: Special Publication (NIST SP)
Report Number: 800-30rev1
Topic: Computer Security
Published: 9/17/2012
Author: Ronald S Ross
Abstract: The purpose of Special Publication 800-30 is to provide guidance for conducting risk assessments of federal information systems and organizations, amplifying the guidance provided in Special Publication 800-39. This document provides guidance for car ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=912091

2. Recommendation for Applications Using Approved Hash Algorithms
Series: Special Publication (NIST SP)
Report Number: 800-107 R 1
Topic: Computer Security
Published: 8/24/2012
Author: Quynh H Dang
Abstract: Hash functions that compute a fixed-length message digest from arbitrary length messages are widely used for many purposes in information security. This document provides security guidelines for achieving the required or desired security strengths wh ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=911479

3. Security of Bluetooth Systems and Devices: Updated Guide Issued by the National Institute of Standards and Technology (NIST)
Series: ITL Bulletin
Topic: Computer Security
Published: 8/13/2012
Author: Shirley Mae Radack
Abstract: This bulletin summarizes the information that is included in NIST Special Publication (SP) 121, Revision 1, Guide to Bluetooth Security: Recommendations of the National Institute of Standards and Technology. This guide was revised by John Padgette o ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=911947

4. Computer Security Incident Handling Guide
Series: Special Publication (NIST SP)
Report Number: 800-61rev2
Topic: Computer Security
Published: 8/6/2012
Authors: Paul R. (Paul) Cichonski, Thomas Millar, Karen Ann Scarfone, Timothy Grance
Abstract: Computer security incident response has become an important component of information technology (IT) programs. Because performing incident response effectively is a complex undertaking, establishing a successful incident response capability requi ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=911736

5. What Continuous Monitoring Really Means
Topic: Computer Security
Published: 7/24/2012
Author: Ronald S Ross
Abstract: Recently, NIST completed a fundamental transformation of the traditional certification and accreditation process into a comprehensive, near real-time, security life cycle process as part of a Risk Management Framework (RMF). The RMF, described in NIS ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=911474

6. Evolutionary Construction of de Bruijn Sequences
Topic: Computer Security
Published: 7/20/2012
Author: Meltem Sonmez Turan
Abstract: A binary de Bruijn sequence of order $n$ is a cyclic sequence of period $2^n$, in which each $n$-bit pattern appears exactly once. These sequences are commonly used in applications such as stream cipher design, pseudo-random number generation, 3-D pa ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=909087

7. Preparing for and Responding to CA Compromise and Fraudulent Certificate Issuance
Series: ITL Bulletin
Topic: Computer Security
Published: 7/10/2012
Authors: Paul Turner, William T Polk, Elaine B Barker
Abstract: As the use of Public Key Infrastructure (PKI) and digital certificates (e.g., the use of Transport Layer Security [TLS] and Secure Sockets Layer [SSL]) for the security of systems has increased, the certification authorities (CAs) that issue certific ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=911197

8. Recommendation for Key Management - Part 1: General (Revision 3)
Series: Special Publication (NIST SP)
Report Number: 800-57
Topic: Computer Security
Published: 7/10/2012
Authors: Elaine B Barker, William Curtis Barker, William Edward Burr, William T Polk, Miles E. Smid
Abstract: This Recommendation provides cryptographic key management guidance in three parts. Part 1 of the Recommendation 1) defines the security services that may be provided and key types that may be employed in using cryptographic mechanisms; 2) provides ba ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=910342

9. Cloud Computing: A Review of Features, Benefits, and Risks, and Recommendations for Secure, Efficient Implementations
Series: ITL Bulletin
Topic: Computer Security
Published: 6/27/2012
Author: Shirley Mae Radack
Abstract: This bulletin summarizes the information presented in NIST Special Publication (SP) 800-146, Cloud Computing Synopsis and Recommendations: Recommendations of the National Institute of Standards and Technology. The publication explains the different ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=911668

10. Guide to Bluetooth Security
Series: Special Publication (NIST SP)
Report Number: 800-121rev1
Topic: Computer Security
Published: 6/11/2012
Authors: Karen Ann Scarfone, John Padgette, Lidong Chen
Abstract: Bluetooth is an open standard for short-range radio frequency communication. Bluetooth technology is used primarily to establish wireless personal area networks. It has been integrated into many types of business and consumer devices, including cellu ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=911133



Search NIST-wide:


(Search abstract and keywords)


Last Name:
First Name:







Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series