Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Special Publication (NIST SP)

Infrared Optical Properties of Materials

Author(s)
Simon G. Kaplan, Leonard Hanssen, Raju V. Datla
This document describes the Fourier Transform Infrared Spectrophotometry (FTIS) Facility at the Sensor Science Division (SSD) of the National Institute of...

Vetting the Security of Mobile Applications

Author(s)
Stephen Quirolgico, Jeffrey M. Voas, Tom T. Karygiannis, Christoph Michael, Karen Scarfone
The purpose of this document is to help organizations (1) understand the process for vetting the security of mobile applications, (2) plan for the...

Guidelines for Derived Personal Identity Verification (PIV) Credentials

Author(s)
Hildegard Ferraiolo, David Cooper, Salvatore Francomacaro, Andrew Regenscheid, Jason Mohler, Sarbari Gupta, William E. Burr
This recommendation provides technical guidelines for the implementation of standards-based, secure, reliable, interoperable PKI-based identity credentials that...

Guidelines for Media Sanitization

Author(s)
Richard L. Kissel, Andrew Regenscheid, Matthew Scholl, Kevin Stine
Media sanitization refers to a process that renders access to target data on the media infeasible for a given level of effort. This guide will assist...

Costs and Cost Effectiveness of Additive Manufacturing

Author(s)
Douglas Thomas, Stanley Gilbert
The use of additive manufacturing has increased significantly in previous years. Additive manufacturing is used by multiple industry subsectors, including motor...

NIST Framework and Roadmap for Smart Grid Interoperability Standards, Release 3.0

Author(s)
Chris Greer, David A. Wollman, Dean Prochaska, Paul A. Boynton, Jeffrey A. Mazer, Cuong Nguyen, Gerald FitzPatrick, Thomas L. Nelson, Galen H. Koepke, Allen R. Hefner Jr., Victoria Yan Pillitteri, Tanya L. Brewer, Nada T. Golmie, David H. Su, Allan C. Eustis, David Holmberg, Steven T. Bushby
Section 1305 of the Energy Independence and Security Act (EISA) of 2007 (Pub. L. 110-140) directs NIST ‘‘to coordinate the development of a framework that...

Computer Security Division 2013 Annual Report

Author(s)
Patrick O'Reilly, Greg Witte, Chris Johnson, Doug Rike
Title III of the E-Government Act of 2002, entitled the Federal Information Security Management Act (FISMA) of 2002, requires NIST to prepare an annual public...

BIOS Protection Guidelines for Servers

Author(s)
Andrew Regenscheid
Modern computers rely on fundamental system firmware, commonly known as the Basic Input/Output System (BIOS), to facilitate the hardware initialization process...

Smart Firefighting Workshop Summary Report

Author(s)
Anthony P. Hamins, Nelson P. Bryner, Albert W. Jones, Galen H. Koepke, casey grant, Anand Raghunathan
This report summarizes the results of the Smart Firefighting Workshop held March 24 and 25, 2014, in Arlington, Virginia and sponsored by the National Institute...

Approximate Matching: Definition and Terminology

Author(s)
Frank Breitinger, Barbara Guttman, Michael McCarrin, Vassil Roussev, Douglas R. White
This document provides a definition of and terminology for approximate matching. Approximate matching is a promising technology designed to identify...

Guidelines on Mobile Device Forensics

Author(s)
Richard Ayers, Sam Brothers, Wayne Jansen
Mobile device forensics is the science of recovering digital evidence from a mobile device under forensically sound conditions using accepted methods. Mobile...
Was this page helpful?