Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Special Publication (NIST SP)

NIST-SP 500-291, NIST Cloud Computing Standards Roadmap

Author(s)
Michael D. Hogan, Fang Liu, Annie W. Sokol, Tong Jin
The NIST Cloud Computing Standards Roadmap Working Group has surveyed the existing standards landscape for security, portability, and interoperability standards

SP250 Spectral Irradiance Calibrations

Author(s)
Howard W. Yoon, Charles E. Gibson
This document describes the process of the realization, the maintenance and the dissemination of the spectral irradiance scale and its accompanying

Report of the 95th National Conference on Weights and Measures

Author(s)
Linda D. Crown, Tina G. Butcher, Steven E. Cook, Lisa Warfield, David A. Sefcik
The 95th Annual Meeting of the National Conference on Weights and Measures (NCWM) was held July 11 to 15, 2010, at the Crowne Plaza St. Paul Riverfront, St

BIOS Protection Guidelines

Author(s)
David Cooper, William Polk, Andrew Regenscheid, Murugiah Souppaya
This document provides guidelines for preventing the unauthorized modification of Basic Input/Output System (BIOS) firmware on PC client systems. Unauthorized

NIST Measurement Services: Regular Spectral Transmittance

Author(s)
David W. Allen, Edward A. Early, Benjamin K. Tsai, Catherine C. Cooksey
This document describes measurement services, instrumentation, and measurement techniques for regular spectral transmittance over the spectral range from 250 nm

Guide to Using Vulnerability Naming Schemes

Author(s)
David A. Waltermire, Karen Scarfone
This publication provides recommendations for using two vulnerability naming schemes: Common Vulnerabilities and Exposures (CVE) and Common Configuration

Guide to Security for Full Virtualization Technologies

Author(s)
Murugiah P. Souppaya, Karen Scarfone, Paul Hoffman
The purpose of SP 800-125 is to discuss the security concerns associated with full virtualization technologies for server and desktop virtualization, and to

Guidelines for the Secure Deployment of IPv6

Author(s)
Sheila E. Frankel, Richard Graveman, John Pearce, Mark Rooks
Due to the exhaustion of IPv4 address space, and the Office of Management and Budget (OMB) mandate that U.S. federal agencies begin to use the IPv6 protocol

Disaster Resilience: A Guide to the Literature

Author(s)
Stanley W. Gilbert
Although there is a great deal of high-quality information available on resilience-related topics hazard assessment, vulnerability assessment, risk assessment

Practical Combinatorial Testing

Author(s)
David R. Kuhn, Raghu N. Kacker, Yu Lei
Combinatorial testing can help detect problems like this early in the testing life cycle. The key insight underlying t-way combinatorial testing is that not
Was this page helpful?