Skip to main content

NOTICE: Due to a lapse in annual appropriations, most of this website is not being updated. Learn more.

Form submissions will still be accepted but will not receive responses at this time. Sections of this site for programs using non-appropriated funds (such as NVLAP) or those that are excepted from the shutdown (such as CHIPS and NVD) will continue to be updated.

U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 1451 - 1475 of 1504

Security in ISDN

September 1, 1991
Author(s)
William E. Burr
The Integrated Services Digital Network (ISDN) standards will provide worldwide digital communications service and will play a key role in the transition to electronic documents and business transactions. ISDN has been developed with little thought to

Computer Security: Selected Articles

April 1, 1991
Author(s)
Marianne M. Swanson, Elizabeth B. Lennon
This National Institute of Standards and Technology Internal Report (NISTIR) presents nine articles which represent a wide spectrum of computer security information. The articles were selected by the staff of the Computer Security Division, Computer

Public-Key Cryptography

April 1, 1991
Author(s)
James R. Nechvatal
This publication presents a state-of-the-art survey of public-key cryptography, circa 1988-1990, and covers the following topics: 1) the theory of public-key cryptography; 2) comparisons to conventional (secret-key) cryptography; 3) a largely self

Computer Users' Guide to the Protection of Information Resources

October 1, 1989
Author(s)
Cheryl Helsing, Marianne M. Swanson, Mary A. Todd
While excellent progress has been made in computer technology, very little has been done to inform users of the vulnerability of data and information to such threats as unauthorized modification, disclosure, and destruction, either deliberate or accidental

Executive Guide to the Protection of Information Resources

October 1, 1989
Author(s)
Cheryl Helsing, Marianne M. Swanson, Mary A. Todd
This guide is designed to help the policy maker address a host of questions regarding the protection and safety of computer systems and data processed within your agency. It introduces information systems security concerns, outlines the management issues

Guide for Selecting Automated Risk Analysis Tools

October 1, 1989
Author(s)
Irene E. Gilbert
This document recommends a process for selecting automated risk analysis tools. It is primarily intended for managers and those responsible for managing risks in computer and telecommunications systems. The document describes important considerations for

Management Guide to the Protection of Information Resources

October 1, 1989
Author(s)
Cheryl Helsing, Marianne M. Swanson, Mary A. Todd
This guide introduces information systems security concerns and outlines the issues that must be addressed by all agency managers in meeting their responsibilities to protect information systems within their organizations. It describes essential components

Computer Viruses and Related Threats: A Management Guide

August 1, 1989
Author(s)
John P. Wack, Lisa J. Carnahan
This document provides guidance for technical managers for the reduction of risk to their computer systems and networks from attack by computer viruses, unauthorized users, and related threats. The guidance discusses the combined use of policies
Displaying 1451 - 1475 of 1504
Was this page helpful?