An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Xiaoyu X. Li, Joshua A. Hadler, Christopher L. Cromer, John H. Lehman, Marla L. Dowell
This document describes the calibration service for the responsivity of laser power meters and detectors used with continuous wave high power lasers at laser...
Jolene Splett, Christopher N. McCowan, Chih-Ming Wang
The purpose of this document is to clarify some issues pertaining to uncertainty statements and the ASTM E 23 limits used in the Charpy machine verification...
This complement to the ANSI/NIST-ITL 1-2007 standard establishes an equivalent XML format. This format defines the content, format, and units of measurement for...
This document describes NIST's high pressure natural gas flow calibration service (NGFCS). Flow calibrations are conducted offsite at the Colorado Experimental...
Kevin M. Stine, Richard L. Kissel, William C. Barker, Annabelle Lee, J Fahlsing, Jessica Gulick
Title III of the E-Government Act, titled the Federal Information Security Management Act (FISMA) of 2002, tasked NIST to develop (1) standards to be used by...
Developing a cost-effective risk mitigation plan involves assessing the risks associated with natural and man-made hazards, formulating combinations of...
The purpose of this document is to assist organizations in understanding the fundamental activities performed as part of securing and maintaining the security...
Karen A. Scarfone, Derrick Dicoi, Matt Sexton, Cyrus Tibbs
The purpose of this document is to provide guidance to organizations in securing their legacy Institute of Electrical and Electronics Engineers (IEEE) 802.11...
Michael Gaitan, Jayna J. Shah, Darwin Reyes-Hernandez, Pierre-Alain Auroux, Jon Geist, Laurie E. Locascio, Wyatt N. Vreeland, David J. Ross, Peter Vallone, Paul Smith, Nicole Morgan, Tom Pohida, John Kakareka, Annelise Barron
This report summarizes the NIST effort on microfluidic DNA analysis systems for forensic applications sponsored by the National Institute of Justice. Currently...
Elizabeth Chew, Marianne M. Swanson, Kevin M. Stine, N Bartol, Anthony Brown, W Robinson
This document provides guidance on how an organization, through the use of metrics, identifies the adequacy of in-place security controls, policies, and...
Sheila E. Frankel, Paul Hoffman, Angela Orebaugh, Richard Park
Secure Sockets Layer (SSL) Virtual Private Networks (VPNs) provide users with secure remote access to an organization's resources. An SSL VPN consists of one or...
This handbook, which can be used as both a tutorial and a reference, describes practical techniques for frequency stability analysis. It covers the definitions...
Douglas C. Montgomery, J. S. Nightingale, Sheila E. Frankel, Mark E. Carson
This publication seeks to assist Federal agencies in formulating plans for the acquisition of IPv6 technologies. To achieve this, we define a standards profile...
The Optical Technology Division at the National Institute of Standards and Technology (NIST) has developed a new instrument designed to measure the surface...
The Homeland Security Presidential Directive HSPD-12 called for new standards to be adopted governing the interoperable use of identity credentials to allow...
The definitive international reference on the SI is a booklet published by the International Bureau of Weights and Measures (BIPM, Bureau International des...
This 2007 edition of SP811 updates International System of Units (SI) usage as implemented in the 8th edition of the SI Brochure, incorporates a significant...
The primary goal of the Terabyte Track is to develop an evaluation methodology for terabyte-scale document collections. In addition, we are interested in...
S Arepalli, Stephen W. Freiman, Stephanie A. Hooker, Kalman D. Migler
Recommended Practice Guide for Single Wall Carbon Nanotube Characterization consisting of five chapters: Introduction; Thermogravimetric Analysis (TGA) ; Near...
Wayne Jansen, Theodore Winograd, Karen A. Scarfone
Active content technologies allow code, in the form of a script, macro, or other kind of portable instruction representation, to execute when the document is...
The goal of the enterprise track is to conduct experiments with enterprise data --- intranet pages, email archives, document repositories --- that reflect the...
Paul E. Black, Elizabeth N. Fong, Vadim Okun, Romain Gaucher
Software assurance tools are a fundamental resource for providing an assurance argument for today's software applications throughout the software development...