Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search

Showing results 31 - 40 of 2081640 documents for credizor pujcka Navtivte web na WWWLOAN24HXYZ pujcka do vyplaty 5000 na splatky online pujcka amberk pujcky do 4999 kc pujcky online ihned na cet Krom pujcky na op ihned okres znojmo nebankovni pujcka ceske bud pro podnikatele sms pujcka online Rotava kalkultor pjek nebankovni pujcka do 20 000 bez pjm online pujcky Mnichovo Hradit pujcky do 50 000 vyhodne mobil pujcka 2000kc Pjky do 1500
Relevance
Date
  1. Slide 1

    https://www.nist.gov/system/files/documents/2017/01/27/wed_changing-behavior_allsop.pdf
    Leveraging a Benefits-Based Approach for the Online Consumer Security & Safety Messaging Convention (OCSSMC) Prepared for the NICE Conference Presented By: Dr. Dee Allsop September 21, 2011 H ea rt + M in d S T R A T E G IE S 2 CHANGE Positive change emanates from new self evident ideas that protect, promote and preserve shared core values. H ea rt + M in d S T R A T E G IE S 3 What are Values? • Values are the central guideposts for human decision making • Make clear which issues have the greatest impact • Values guide the formulation, selection, and analysis of future courses of action • Campaigns built on the public’s values focus, enga...
  2. Baldrige Cybersecurity Excellence Builder v1.1

    https://www.nist.gov/system/files/documents/2019/03/24/baldrige-cybersecurity-excellence-builder-v1.1.pdf
    www.nist.gov/baldrige #BaldrigeCyber v1.1 2019 BALDRIGE CYBERSECURITY EXCELLENCE BUILDER Key questions for improving your organization’s cybersecurity performance The Baldrige Program thanks the Baldrige Foundation for supporting the program’s mission and the following organizations for supporting the publication of this booklet. The Baldrige Cybersecurity Excellence Builder self-assessment helps you understand and improve what is critical to your organization’s cybersecurity risk management. It is a voluntary self-assessment based on the more detailed Framework for Improving Critical Infrastructure Cybersecurity, managed by NIST’s Information Technology Laboratory, Applied Cybersecurity Division, and the Baldrige Excellence Framewor...
  3. https://www.nist.gov/system/files/documents/2017/01/27/thurs_national-institute-cybersecurity-studies_part1_walkthrough.pdf

    https://www.nist.gov/system/files/documents/2017/01/27/thurs_national-institute-cybersecurity-studies_part1_walkthrough.pdf
    Former CIA Counter-Terror Chief: Al Qaeda will go cyber ABC News | August 11, 2011 Cybersecurity News Learn basic terminology and find out how you can become more cybersecurity aware. Find the right cybersecurity program for you in the NICS Cybersecurity Degree Programs Directory. Cybersecurity Terms A-Z Cybersecurity Degree Programs Upcoming Training Today Special Senior Advisor for Cyber Security (SL) Department Of Homeland Security – Washington DC Metro Area, DC Today Sr. Cyber Security Researcher - NEW Idaho National Laboratory - Idaho Falls, ID Yesterday Cyber Security Engineer SRA International - Arlington, VA Yesterday Cyber Security/Wireless Research Engineer Harris Corporation - Herndon, VA 2 days ago Cyber Security Operation...
  4. https://www.nist.gov/system/files/documents/mml/csd/inorganic/nbsgsc.zip

    https://www.nist.gov/system/files/documents/mml/csd/inorganic/nbsgsc.zip
    Calco.for PROGRAM CALCO C C THIS IS A REVISION OF VERSION 1 OF A FUNDAMENTAL PARAMETER C COMPUTER PROGRAM FOR CORRECTION OF INTERELEMENT EFFECTS FOR C QUANTITATIVE X-RAY SPECTROMETRY. THE ORIGINAL PROGRAM WAS C WRITTEN BY R.M.ROUSSEAU OF THE GEOLOGICAL SURVEY OF CANADA C (GSC) AND CONTAINS THE PROGRAMS ALPHA AND CARECAL WHICH WERE C EXTENSIVELY MODIFIED AT NBS. THE NBSGSC PROGRAM CONTAINS THE C COMPREHENSIVE LACHANCE ALGORITHM(COLA) FOR CORRECTION OF INTER- C ELEMENT EFFECTS. C CALCO IS A REVISION OF ALPHA FOR CALCULATING THEORETICAL ALPHA C COEFFICIENTS, AND CALCOMP IS A REVISION OF CARECAL FOR CALCULA- C TING CONCENTRATIONS IN ANALYTE SPECIMENS. C C OVERLAY STRUCTURE OF CALCO : C MAIN PROGRAM-----CALCO C SUBROUTINE-------ALPHA,AP...
  5. Breakout Group B

    https://www.nist.gov/system/files/documents/2019/07/12/day2_part2_maddox-straub_breakout_group_b_feedback.pdf
    Breakout Group B Notes/Feedback Key Ideas: • A consensus effort is required • Help establish a safety methodology that the standards bodies can translate into standards and other stakeholders can use to advantage: • We can help move things along in the short term. It is not reasonable to expect us to develop the gold standard in methodologies up front - it will be a long iterative process. We need to enable this process • What is the lowest common denominator that we all agree on and begin from this • Need to define roles and responsibilities for the process we will embark upon • How far do we have to drive things over the next 6 months to a year • We can use what exists today and drive towards an agile framework for testing ...
  6. Combinatorial Testing Presentation, CMU January 2010

    https://csrc.nist.gov/CSRC/media/Presentations/Combinatorial-Testing-Presentation-CMU-January-20/kuhn-cmu.pdf
    Combinatorial Testing Rick Kuhn National Institute of Standards and Technology Gaithersburg, MD Carnegie-Mellon University, 26 January 2010 Tutorial Overview 1. Why are we doing this? 2. What is combinatorial testing? 3. How is it used and how long does it take? 4. What tools are available? 5. What's next? What is NIST and why are we doing this? • A US Government agency • The nation’s measurement and testing laboratory – 3,000 scientists, engineers, and support staff including 3 Nobel laureates Analysis of engineering failures, including buildings, materials, and ... Research in physics, chemistry, materials, manufacturing, computer science Software Failure Analysis • We s...
  7. PowerPoint Presentation

    https://www.nist.gov/system/files/documents/2017/03/17/alan_zheng_ballistics.pdf
    Xiaoyu Alan Zheng, Johannes Soons, Robert Thompson National Institute of Standards and Technology alan.zheng@nist.gov (301) 975-4095 2 Disclaimer Certain commercial equipment, instruments, or materials are identified in this presentation to specify the experimental procedure adequately. Such identification is not intended to imply recommendation or endorsement by the National Institute of Standards and Technology or the National Institute of Justice, nor is it intended to imply that the materials or equipment identified are necessarily the best available for the purpose. www.nist.gov/forensics/ballisticsdb 3 Criticism on Subjectivity • Pattern evidence have come under scrutiny in recent years due to the subjective nature of the...
  8. The effect of repetitive surges on overcurrent and overvoltage protective devices

    https://www.nist.gov/system/files/documents/pml/div684/Repetitive_surges.pdf
    The effect of repetitive surges on transient overcurrent and overvoltage protective devices François D. Martzloff General Electric Company Schenectady NY Reprinted, with permission, from Proceedings, EMC Zurich Symposium, 1985 Significance Part 7 – Mitigation Techniques This paper is a condensed version, presented to an international audience, of the IEEE IAS Transactions, “Matching surge-protective devices to their environment” which is reproduced in Part 7 of the Anthology under the hyperllink “Matching environment”. THE EFFECT OF REPETITIVE SURGES ON TRANSIENT OVERCURRENT AND OVERVOLTAGE PROTECTIVE DEVICES Franqois D. Martzloff Corporate Research and Development General Electric Company Schenectady, NY 123...
  9. Community College of the Northwest Case Study 2021

    https://www.nist.gov/system/files/documents/2021/03/23/2021-community-college-of-the-northwest-case-study.pdf
    Community College of the Northwest Case Study NI ST Tr ain ing D raf teducation www.nist.gov/baldrige 2021 NI ST Tr ain ing D raf t CONTENTS 2021 Eligibility Certification Form . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . E1 Organization Chart . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . O1 2021 Award Application Form, page A-1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A1 Glossary of Terms and Abbreviations . . . . . . . . . ...
  10. TRIFLE

    https://csrc.nist.gov/CSRC/media/Projects/Lightweight-Cryptography/documents/round-1/spec-doc/trifle-spec.pdf
    TRIFLE Designers/Submitters: Nilanjan Datta - Indian Institute of Technology Kharagpur, India Ashrujit Ghoshal - University of Washington, USA Debdeep Mukhopadhyay - Indian Institute of Technology Kharagpur, India Sikhar Patranabis - Indian Institute of Technology Kharagpur, India Stjepan Picek - Delft University of Technology, The Netherlands Rajat Sadhukhan - Indian Institute of Technology Kharagpur, India nilanjan.datta@iitkgp.ac.in, ashrujit@cs.washington.edu, debdeep@cse.iitkgp.ac.in, sikhar.patranabis@iitkgp.ac.in, s.picek@tudelft.nl, rajat.sadhukhan@iitkgp.ac.in March 29, 2019 Chapter 1 Introduction In this document, we propose a new ThReshold Induced Fault resistant Lightweight authenticated Encryption mode, and dub it TRIFLE. TRIFLE i...
Showing results 31 - 40 of 2081640 documents for credizor pujcka Navtivte web na WWWLOAN24HXYZ pujcka do vyplaty 5000 na splatky online pujcka amberk pujcky do 4999 kc pujcky online ihned na cet Krom pujcky na op ihned okres znojmo nebankovni pujcka ceske bud pro podnikatele sms pujcka online Rotava kalkultor pjek nebankovni pujcka do 20 000 bez pjm online pujcky Mnichovo Hradit pujcky do 50 000 vyhodne mobil pujcka 2000kc Pjky do 1500