您好,欢迎光临本网站![请登录][注册会员]  

安全技术下载,其它下载列表 第1041页

« 1 2 ... .36 .37 .38 .39 .40 1041.42 .43 .44 .45 .46 ... 3240 »

[其它] NIST SP800-16.pdf

说明:Federal agencies and organizations cannot protect the integrity, confidentiality, and availability of information in today’s highly networked systems environment without ensuring that each person involved understands their roles and responsibilities
<samsho2> 上传 | 大小:1mb

[其它] NIST SP800-17.pdf

说明:The National Institute of Standards and Technology (NIST) Modes of Operation Validation System (MOVS) specifies the procedures involved in validating implementations of the DES algorithm in FIPS PUB 46-2 The Data Encryption Standard (DES) and the Ski
<samsho2> 上传 | 大小:1mb

[其它] NIST SP800-18 Rev1.pdf

说明:Title III of the E-Government Act, entitled the Federal Information Security Management Act (FISMA), requires each federal agency to develop, document, and implement an agency-wide information security program to provide information security for the
<samsho2> 上传 | 大小:360kb

[其它] NIST SP800-19.pdf

说明:Over the years computer systems have evolved from centralized monolithic computing devices supporting static applications, into client-server environments that allow complex forms of distributed computing. Throughout this evolution limited forms of
<samsho2> 上传 | 大小:3mb

[其它] NIST SP800-20.pdf

说明:The National Institute of Standards and Technology (NIST) Triple Data Encryption Algorithm (TDEA) Modes of Operation Validation System (TMOVS) specifies the procedures involved in validating implementations of the Triple DES algorithm in FIPS PUB 46-
<samsho2> 上传 | 大小:2mb

[其它] NIST SP800-21.pdf

说明:Today’s information technology security environment consists of highly interactive and powerful computing devices and interconnected systems of systems across global networks where Federal agencies routinely interact with industry, private citizens,
<samsho2> 上传 | 大小:657kb

[其它] NIST SP800-22rev1a.pdf

说明:This paper discusses some aspects of selecting and testing random and pseudorandom number generators. The outputs of such generators may be used in many cryptographic applications, such as the generation of key material. Generators suitable for use i
<samsho2> 上传 | 大小:7mb

[其它] NIST SP800-23.pdf

说明:This document provides guidelines for Federal organizations' acquisition and use of security-related Information Technology (IT) products. NIST's advice is provided in the context of larger recommendations regarding security assurance.
<samsho2> 上传 | 大小:769kb

[其它] NIST SP800-24pbx.pdf

说明:The Private Branch Exchange (PBX) is an essential element that supports the critical infrastructure of both government agencies and U.S. industry. A PBX is a sophisticated computer-based switch that can be thought of as essentially a small, in-hous
<samsho2> 上传 | 大小:4mb

[其它] NIST SP800-25.pdf

说明:This guidance document was developed by the Federal Public Key Infrastructure Steering Committee to assist Federal agencies that are considering the use of public key technology for digital signatures or authentication over open networks such as the
<samsho2> 上传 | 大小:280kb

[其它] NIST sp800-27.pdf

说明:The purpose of the Engineering Principles for Information Technology (IT) Security (EP-ITS) is to present a list of system-level security principles to be considered in the design, development, and operation of an information system. Ideally, th
<samsho2> 上传 | 大小:143kb

[其它] NIST SP800-27-RevA.pdf

说明:The purpose of the Engineering Principles for Information Technology (IT) Security (EP-ITS) is to present a list of system-level security principles to be considered in the design, development, and operation of an information system. Ideally, th
<samsho2> 上传 | 大小:560kb
« 1 2 ... .36 .37 .38 .39 .40 1041.42 .43 .44 .45 .46 ... 3240 »