您好,欢迎光临本网站![请登录][注册会员]  

安全技术下载,其它下载列表 第1045页

« 1 2 ... .40 .41 .42 .43 .44 1045.46 .47 .48 .49 .50 ... 3240 »

[其它] NIST SP800-48r1.pdf

说明:1.1 Authority The National Institute of Standards and Technology (NIST) developed this document in furtherance of its statutory responsibilities under the Federal Information Security Management Act (FISMA) of 2002, Public Law 107-347. NIST is resp
<samsho2> 上传 | 大小:943kb

[其它] NIST SP800-49.pdf

说明:1 Introduction S/MIME (Secure / Multipurpose Internet Mail Extensions) is a set of specifications for securing electronic mail. S/MIME is based upon the widely used MIME standard [MIME] and describes a protocol for adding cryptographic security serv
<samsho2> 上传 | 大小:388kb

[其它] NIST SP800-50.pdf

说明:Introduction Federal agencies and organizations cannot protect the confidentiality, integrity, and availability of information in today’s highly networked systems environment without ensuring that all people involved in using and managing IT:
<samsho2> 上传 | 大小:3mb

[其它] NIST SP800-51.pdf

说明:This document provides guidelines for federal organizations’ acquisition and use of security-related information technology (IT) products and services. NIST’s advice is provided in the context of larger recommendations regarding security assurance (s
<samsho2> 上传 | 大小:203kb

[其它] NIST SP800-51rev1.pdf

说明:1.2 Purpose and Scope The purpose of this document is to provide recommendations for using vulnerability naming schemes. The document covers two schemes: CVE and CCE. The document gives an introduction to both schemes and makes recommendations for e
<samsho2> 上传 | 大小:243kb

[其它] NIST SP800-52.pdf

说明:TLS communications to protect sensitive data transmitted through the Internet. Many books such as [Rescorla01], [Comer00], and [Hall00] describe the Internet’s client-server model and communication protocol design principles. None guide Federal users
<samsho2> 上传 | 大小:322kb

[其它] NIST SP800-52r2-draft2.pdf

说明:1 Introduction 252 Transport Layer Security (TLS) protocols are used to secure communications in a wide variety of 253 online transactions such as financial transactions (e.g., banking, trading stocks, e-commerce), 254 healthcare transactions (e.g.,
<samsho2> 上传 | 大小:624kb

[其它] NIST SP800-53 AppendicesDEF.pdf

说明:MINIMUM SECURITY CONTROLS – SUMMARY LOW-IMPACT, MODERATE-IMPACT, AND HIGH-IMPACT INFORMATION SYSTEMS he following table lists the minimum security controls, or security control baselines, for low-impact, moderate-impact, and high-impact informatio
<samsho2> 上传 | 大小:528kb

[其它] NIST SP800-53A rev1.pdf

说明:INTRODUCTION THE NEED TO ASSESS SECURITY CONTROL EFFECTIVENESS IN INFORMATION SYSTEMS T T oday’s information systems9 are complex assemblages of technology (i.e., hardware, software, and firmware), processes, and people, working together to provid
<samsho2> 上传 | 大小:2mb

[其它] NIST SP800-54.pdf

说明:Although not well known among everyday users, the Border Gateway Protocol (BGP) is one of the critical infrastructure protocols for the Internet. BGP is a routing protocol, whose purpose is to keep systems on the Internet up to date with information
<samsho2> 上传 | 大小:731kb

[其它] NIST SP800-55.pdf

说明:The requirement to measure information technology (IT) security performance is driven by regulatory, financial, and organizational reasons. A number of existing laws, rules, and regulations cite IT performance measurement in general, and IT securit
<samsho2> 上传 | 大小:569kb

[其它] NIST SP800-53-rev2-final.pdf

说明:INTRODUCTION THE NEED FOR SECURITY CONTROLS TO PROTECT INFORMATION SYSTEMS he selection and employment of appropriate security controls for an information system3 are important tasks that can have major implications on the operations4 and assets of
<samsho2> 上传 | 大小:1mb
« 1 2 ... .40 .41 .42 .43 .44 1045.46 .47 .48 .49 .50 ... 3240 »