您好,欢迎光临本网站![请登录][注册会员]  

安全技术下载,其它下载列表 第1056页

« 1 2 ... .51 .52 .53 .54 .55 1056.57 .58 .59 .60 .61 ... 3240 »

[其它] NIST SP800-133.pdf

说明:Cryptography is often used in an information technology security environment to protect data that is sensitive, has a high value, or is vulnerable to unauthorized disclosure or undetected modification during transmission or while in storage. Crypto
<samsho2> 上传 | 大小:377kb

[其它] NIST SP800-133r1-draft.pdf

说明:Cryptography is often used in an information technology security environment to protect data that is sensitive, has a high value, or is vulnerable to unauthorized disclosure or undetected modification during transmission or while in storage. Crypto
<samsho2> 上传 | 大小:605kb

[其它] NIST SP800-135 rev1.pdf

说明:This document specifies security requirements for existing application-specific key derivation functions in:  American National Standard (ANS) X9.42-2001-Public Key Cryptography for the Financial Services Industry: Agreement of Symmetric Keys Usin
<samsho2> 上传 | 大小:374kb

[其它] NIST SP800-137 Final.pdf

说明:PAGE 1 CHAPTER ONE INTRODUCTION nformation security continuous monitoring (ISCM) is defined as maintaining ongoing awareness of information security, vulnerabilities, and threats to support organizational risk management decisions. 2 This publicat
<samsho2> 上传 | 大小:958kb

[其它] NIST SP800-142.pdf

说明:Software implementation errors are one of the most significant contributors to information system security vulnerabilities, making software testing an essential part of system assurance. Combinatorial methods can help reduce the cost and increase the
<samsho2> 上传 | 大小:983kb

[其它] NIST SP800-144.pdf

说明:Interest in cloud computing has grown rapidly in recent years due to the advantages of greater flexibility and availability in obtaining computing resources at lower cost. Security and privacy, however, are a concern for agencies and organizations co
<samsho2> 上传 | 大小:1mb

[其它] NIST SP800-145.pdf

说明:Interest in cloud computing has grown rapidly in recent years due to the advantages of greater flexibility and availability in obtaining computing resources at lower cost. Security and privacy, however, are a concern for agencies and organizations co
<samsho2> 上传 | 大小:78kb

[其它] NIST SP800-146.pdf

说明:The purpose of this document is to explain the cloud computing technology area in plain terms, and to provide recommendations for information technology decision makers. Cloud computing is a developing area and its ultimate strengths and weakness ar
<samsho2> 上传 | 大小:1mb

[其它] NIST SP800-147.pdf

说明:The purpose of this document is to explain the cloud computing technology area in plain terms, and to provide recommendations for information technology decision makers. Cloud computing is a developing area and its ultimate strengths and weakness ar
<samsho2> 上传 | 大小:924kb

[其它] NIST SP800-147B.pdf

说明:This document provides guidelines for preventing the unauthorized modification of Basic Input/Output System (BIOS) firmware on PC client systems. Unauthorized modification of BIOS firmware by malicious software constitutes a significant threat becaus
<samsho2> 上传 | 大小:938kb

[其它] NIST SP800-152.pdf

说明:This Profile for U.S. Federal Cryptographic Key Management Systems (FCKMSs1) is based on [SP 800-130], entitled “A Framework for Designing Cryptographic Key Management Systems (CKMS),” which provides a foundation for designing and implementing CKMSs.
<samsho2> 上传 | 大小:1mb

[其它] NIST SP800-153.pdf

说明:The purpose of this publication is to provide organizations with recommendations for improving the security configuration and monitoring of their IEEE 802.11 wireless local area networks (WLANs) and their devices connecting to those networks. The sco
<samsho2> 上传 | 大小:670kb
« 1 2 ... .51 .52 .53 .54 .55 1056.57 .58 .59 .60 .61 ... 3240 »