Guide to Information Technology Security Services

作者: T Grance , J Hash , M Stevens , K O'Neal , N Bartol

DOI: 10.6028/NIST.SP.800-35

关键词:

摘要:

参考文章(9)
Timothy Grance, Marissa Myers, Marc Stevens, SP 800-36. Guide to Selecting Information Technology Security Products National Institute of Standards & Technology. ,(2003)
Gary Stoneburner, SP 800-33. Underlying Technical Models for Information Technology Security National Institute of Standards & Technology. ,(2001)
Mark Wilson, Dorothea E de Zafra, Sadie I Pitcher, John D Tressler, John B Ippolito, Information Technology Security Training Requirements: A Role- and Performance-Based Model Special Publication (NIST SP) - 800-16. ,(1998) , 10.6028/NIST.SP.800-16
D. Richard Kuhn, Introduction to Public Key Technology and the Federal PKI Infrastructure National Institute of Standards and Technology (U.S.). ,(2001) , 10.6028/NIST.SP.800-32
Raymond Kammer, William M. Daley, Cheryl Shavers, Security Requirements for Cryptographic Modules ,(1999)
Marianne Swanson, Guide for Developing Security Plans for Information Technology Systems Special Publication (NIST SP) - 800-18. ,(1998) , 10.6028/NIST.SP.800-18
T Grance, J Hash, M Stevens, Security Considerations in the Information System Development Life Cycle Special Publication (NIST SP) - 800-64 Rev 1. ,(2003) , 10.6028/NIST.SP.800-64R1