Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search

Showing results 1 - 10 of 1128953 documents for creditos pyme del gobierno Visitar el sitio WWWLOAN24HXYZ prestamos de damnificados del issste requisitos para un prestamo personal banamex prestamos sin aval ni buro en durango prestamos rapidos en linea sin buro prestamos personales en san luis potosi prestamo feliz ensenada prestamos via nomina la paz prestamos en linea chiapas prestamos avance diego diaz prestamos libertad en saltillo intereses por prestamos banorte prestamos sin revisar el buro de credito prestamos bancarios sin buro ni anticipos
Relevance
Date
  1. E2E Voting Systems-A State Perspective-NC

    https://csrc.nist.gov/CSRC/media/Events/End-to-End-Voting-System-Workshop/documents/papers/BERGERWhite_Paper_E2E.pdf
    End-to-End Voting Systems A State Perspective Presented for State of North Carolina By Stephen Berger Introduction This presentation offers the perspective of a state election official on end-to-end (E2E) voting systems. To evaluate any proposed improvement to the election system it is important to properly frame the issue, identifying the criteria by which it is to be evaluated. Any proposal must be evaluated for both its positive attributes but also its own vulnerabilities and limitations. Nothing is perfect and with every improvement there are associated security risks and potential problems. It is important to have a balanced evaluation. Further, elections are resource limited, resources applied to one area are generally withdr...
  2. https://www.nist.gov/system/files/documents/2020/10/05/wmconnections-vol10-issue3-oct2020.pdf

    https://www.nist.gov/system/files/documents/2020/10/05/wmconnections-vol10-issue3-oct2020.pdf
    WEIGHTS & MEASURES CONNECTION October 2020 Office of Weights and Measures General Inquiries: Barbara D. Cohn barbara.cohn@nist.gov (301) 975-4004 Training and Website: Yvonne A. Branden yvonne.branden@nist.gov (301) 975-3272 Publication Inquiries: Lisa Warfield lisa.warfield@nist.gov (301) 975-3308 Newsletter Inquiries: Douglas A. Olson douglas...
  3. Weights and Measures Connection - October 2020

    https://www.nist.gov/system/files/documents/2020/10/07/owmconnections-vol10-issue3-2020oct.pdf
    WEIGHTS & MEASURES CONNECTION October 2020 Office of Weights and Measures General Inquiries: Barbara D. Cohn barbara.cohn@nist.gov (301) 975-4004 Training and Website: Yvonne A. Branden yvonne.branden@nist.gov (301) 975-3272 Publication Inquiries: Lisa Warfield lisa.warfield@nist.gov (301) 975-3308 Newsletter Inquiries: Douglas A. Olson douglas...
  4. Microsoft PowerPoint - computer_forensics_standards_for_albany.ppt [Compatibility Mode]

    https://www.nist.gov/system/files/documents/2017/05/08/computer_forensics_standards_for_albany.pdf
    Computer & Mobile ForensicsComputer & Mobile ForensicsComputer & Mobile Forensics Standards Computer & Mobile Forensics Standards Barbara Guttman bguttman@nist.gov October 1, 2009 What is a Standard? • Test and Measurement StandardTest and Measurement Standard • e.g., gram, meter and how you measure it • Product, Process, and Management standards (aka Documentary or Normative ( y standards) • establish the fitness of a product for a particular use • set specifications for the function and operation of a device or systemof a device or system • process or management standards, e.g., ISO 9000 Kinds of Standards • Formal standards (~400 US-based)Formal standards ( 400 US-based) • ANSI-accredited • ISO• ISO • Treaty ...
  5. Proceedings of the Seminar on the DoD Computer Security Initiative Program, July 17-18, 1979, Gaithersburg, Maryland

    https://csrc.nist.gov/CSRC/media/Publications/conference-paper/1979/07/17/proceedings-first-seminar-dod-computer-security-initiative/documents/1979-1st-seminar-proceedings.pdf
    PROCEEDINGS of the SEM''I-'NAR·o·N THE DOD COMPUTER SECURITY INITIATIVE PROGRAM NATIONAL BUREAU OF STANDARDS GAITHERSBURG, MARYLAND JULY 17-18, 1979 TABLE OF CONTENTS PAGE Table of Contents About the Seminar i i About the Do'D Computer Security Initiative i i i Program iv Keynote Address, "Computer Security Requirements in the DoD," Dr. Gerald P: Dinneen, ASD(C31) A-1 "Computer Security Requirements Beyond the DoD," Dr. Willis Waret Rand Corporation B-1 "DoD Computer Security Initiative Program Background and Perspect:ive," Mr. Stephen T. Walker, Chairman, DoD Computer.·security Technical Consortium C-1 "Protection of Operating Systems," Mr. Edmund Burke,...
  6. ISPAB Meeting Minutes for June 7-9, 2005 Meeting

    https://csrc.nist.gov/CSRC/media/Events/ISPAB-JUNE-2005-MEETING/documents/ISPAB-Minutes-June2005.pdf
    INFORMATION SECURITY AND PRIVACY ADVISORY BOARD SUMMARY OF MEETING DoubleTree Hotel and Executive Meeting Center 1750 Rockville Pike Rockville, MD June 7-9, 2005 Tuesday, June 7, 2005 Board Chairman, Franklin Reeder convened the Information Security and Privacy Advisory Board Meeting (ISPAB) for its second meeting of the year at 8:40 a.m. Other members present during the meeting were: Bruce Brody [6/8 only] Daniel Chenok Morris Hymes Susan Landau Rebecca Leng Steve Lipner [via telecon 6/8 only] Sallie McDonald Lynn McNulty Alexander Popowycz Leslie Reis John Sabo Howard Schmidt The meeting was held in open public session. There were ten members of the public in attendance during the meeting. Role of the Chief Pri...
  7. Draft NISTIR 8138, Vulnerability Description Ontology (VDO)

    https://csrc.nist.gov/CSRC/media/Publications/nistir/8138/draft/documents/nistir_8138_draft.pdf
    Draft NISTIR 8138 1 Vulnerability Description Ontology 2 (VDO) 3 A Framework for Characterizing Vulnerabilities 4 5 Harold Booth 6 Christopher Turner 7 8 9 10 11 12 13 14 Draft NISTIR 8138 15 16 Vulnerability Description Ontology 17 (VDO) 18 A Framework for Characterizing Vulnerabilities 19 20 Harold Booth 21 Computer Security Division 22 Information Technology Laboratory 23 24 Christopher Turner 25 Booz Allen Hamilton 26 McLean, VA 27 28 29 30 31 32 33 34 35 September 2016 36 37 38 39 40 41 U.S. Department of Commerce 42 Penny Pritzker, Secretary 43 44 National Institute of Standards and Technology 45 Willie May, Under Secretary of Commerce for Standards and Technology and Director 46 National ...
  8. information systems security program management

    https://csrc.nist.gov/CSRC/media/Presentations/FISSEA-2010-Contest-Website-Winner/images-media/fissea2010_website-winner-presentation_Jim-Henderson_ISSPM.pdf
    Contact: Jim Henderson Information Assurance Officer U.S. Government (USG) Insider Threat Defense Center Office: 703-699-7967 / Cell: 561-809-6800 CyberCops911@Comcast.net INFORMATION SYSTEMS SECURITY PROGRAM MANAGEMENT (ISSPM) SECURITY AWARENESS, TRAINING AND EDUCATTION WEBSITE PORTAL ISSPM WEBSITE OVERVIEW The Information Systems Security Program Management (ISSPM) website was developed in support of a U.S. Government Insider Threat Defense Center Information Assurance (IA), IT Security and Insider Threat Security Awareness, Training and Education Program. This website is updated frequently. It includes a wealth of Security Awareness, Training and Education materials, with links to web based training. It is hosted on the Internet and is a pass...
  9. https://www.nist.gov/system/files/documents/2016/09/28/dse_pilot_evaluation_plan_v1_8.pdf

    https://www.nist.gov/system/files/documents/2016/09/28/dse_pilot_evaluation_plan_v1_8.pdf
    NIST IAD DSE Pilot Evaluation Plan Version 1.8, Updated on September 21, 2016 1 Introduction This document describes the plan for the National Institute of Standards and Technology (NIST) In- formation Access Division (IAD) Data Science Evaluation (DSE) Series Pilot Evaluation to be held in fall 2016. This pilot evaluation is a continuation and extension of the Data Science Pre-Pilot Evalua- tion that was run in 2015, and precedes the first full evaluation of the DSE series. The primary goals of the pilot are to: I further develop and exercise the evaluation process at NIST in the context of Data Science, I provide participants the opportunity to exercise the evaluation process prior to participating in larger-scale evaluation, I serve as an archetype for the developme...
  10. Discussion Draft: Privacy Act White Paper

    https://csrc.nist.gov/CSRC/media/Events/ISPAB-SEPTEMBER-2005-MEETING/documents/Privacy-White-Paper-rev091205.pdf
    DISCUSSION DRAFT Privacy Act White Paper Summary: This paper raises the question of whether the current legal and policy framework governing the information practices of Federal agencies are adequate to protect the privacy of individuals about whom the Federal government maintains or uses personal information. It postulates that laws and policies have not kept pace with changes in technology and information and handling processes and suggests the need for an open dialogue on what changes in law and policy are needed and how best to make those changes. The paper was prepared as a basis for a discussion by the Information Security and Privacy Advisory Board The issues: 1. Is there a need to reopen the current legal and policy framework for managing...
Showing results 1 - 10 of 1128953 documents for creditos pyme del gobierno Visitar el sitio WWWLOAN24HXYZ prestamos de damnificados del issste requisitos para un prestamo personal banamex prestamos sin aval ni buro en durango prestamos rapidos en linea sin buro prestamos personales en san luis potosi prestamo feliz ensenada prestamos via nomina la paz prestamos en linea chiapas prestamos avance diego diaz prestamos libertad en saltillo intereses por prestamos banorte prestamos sin revisar el buro de credito prestamos bancarios sin buro ni anticipos