NIST logo

Publications Portal

You searched on:
Topic Area: Information Technology
Sorted by: title

Displaying records 911 to 920 of 979 records.
Resort by: Date / Title


911. User's Guide for RDA/SQL Validation Tests
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 5725
Topic: Information Technology
Published: 12/1/1996
Authors: J M Sullivan, Kevin G Brady
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=900769

912. User's Guide for the PHIGS Validation Tests (Version 1.0)
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 4349
Topic: Information Technology
Published: 8/1/1990
Authors: John V Cugini, M T Gunn, Lynne S. Rosenthal
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=900569

913. User's Guide for the PHIGS Validation Tests (Version 2)
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 4953
Topic: Information Technology
Published: 10/1/1992
Authors: John V Cugini, M T Gunn, Lynne S. Rosenthal
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=900662

914. User's Guide for the PHIGS Validation Tests (Version 2.1)
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 434
Topic: Information Technology
Published: 4/1/1994
Authors: Kevin G Brady, John V Cugini, Qiming Wang
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=900712

915. User's Guide for the SQL Test Suite, Version 6.0
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 5998
Topic: Information Technology
Published: 12/1/1996
Authors: David W Flater, Leonard J Gallagher, S Hurwitz, J M Sullivan
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=900809

916. User's Guide to Securing External Devices for Telework and Remote Access
Series: Special Publication (NIST SP)
Report Number: 800-114
Topic: Information Technology
Published: 11/1/2007
Authors: Karen Ann Scarfone, Murugiah P Souppaya
Abstract: This publication helps teleworkers secure the external devices they use for telework, such as personally owned and privately owned desktop and laptop computers and consumer devices (e.g., cell phones, personal digital assistants [PDA]). The document ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=151340

917. User-Centered Processes for Studying Human Interaction with Virtual Environments and Human-Human Interaction in Virtual Environments
Topic: Information Technology
Published: Date unknown
Authors: Theresa O'Connell, Kevin Workman, Wyatt Wong
Abstract: This paper sets out a usability engineering framework of processes that were applied to user-centered studies of digital natives interacting with virtual environments (VE) and with each other while playing cooperative and competitive serious games in ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=905645

918. Users Manual for Version 2.1.5 of the NIST DMIS Test Suite (for DMIS 5.1)
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7603
Topic: Information Technology
Published: 8/19/2009
Authors: Thomas Rollin Kramer, John A Horst
Abstract: The NIST DMIS Test Suite, version 2.1.5, is described. The test suite is intended to serve two purposes, 1) to help users and vendors use version 5.1 of DMIS (the Dimensional Measuring Interface Standard) and 2) to provide utilities and test files fo ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=903026

919. Users Manual for Version 2.2.1 of the NIST DMIS Test Suite
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 7735
Topic: Information Technology
Published: 10/25/2010
Authors: Thomas Rollin Kramer, John A Horst
Abstract: This manual is a users manual for the NIST DMIS Test Suite, version 2.2.1. DMIS (Dimensional Measuring Interface Standard) is a language for writing programs for coordinate measuring machines and other dimensional measurement equipment. The manual d ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=905756

920. Using Attack Graphs in Forensic Examinations
Topic: Information Technology
Published: 1/16/2013
Authors: Changwei Liu, Anoop Singhal, Duminda Wijesekera
Abstract: Attack graphs are used to compute potential attack paths from a system configuration and known vulnerabilities of a system. Attack graphs can be used to eliminate known vulnerability sequences that can be eliminated to make attacks difficult and help ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=911518



Search NIST-wide:


(Search abstract and keywords)


Last Name:
First Name:







Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series