SP
800-51 |
Use
of the Common Vulnerabilities and Exposures (CVE) Vulnerability Naming
Scheme,
September 2002
Adobe
Acrobat Reader .pdf file (208,089 bytes)
Zipped
.pdf file (2,176,191 bytes)
|
SP
800-47 |
Security
Guide for Interconnecting Information Technology Systems,
September 2002
Adobe
Acrobat .pdf file (745,484 bytes)
Zipped
.pdf file (516,275 bytes)
|
SP
800-46 |
Security
for Telecommuting and Broadband Communications,
September 2002
Adobe
Acrobat Reader file pdf (3,869,074 bytes)
Zipped
.pdf file (2,207,382 bytes)
|
SP
800-45 |
Guidelines
on Electronic Mail Security,
September 2002
Adobe
Acrobat Reader .pdf file (1,123,602 bytes)
Zipped
.pdf file (1,043,103 bytes)
|
SP
800-44 |
Guidelines
on Securing Public Web Servers,
September 2002
Adobe
Acrobat Reader .pdf file (2,234,418 bytes)
Zipped
.pdf file (2,121,759 bytes)
|
SP
800-41 |
Guidelines
on Firewalls and Firewall Policy,
January 2002
Adobe
Acrobat Reader file (1,208,320 bytes)
|
SP
800-40 |
Procedures for
Handling Security Patches
September 2002
Adobe
Acrobat Reader .pdf file (3,862,598 bytes)
Zipped
.pdf file (1,995,764 bytes)
|
SP 800-38A |
Recommendation
for Block Cipher Modes of Operation - Methods and Techniques,
December 2001
Adobe
Acrobat Reader file (229,834 bytes)
|
SP 800-34 |
Contingency
Planning Guide for Information Technology Systems, June 2002
Adobe
Acrobat Reader file (1,983,283 bytes)
Zipped
Adobe Acrobat file (1,191,191 bytes)
|
SP 800-33 |
Underlying
Technical Models for Information Technology Security, December 2001
Adobe
Acrobat Reader file (463,844 bytes)
|
SP 800-32 |
Introduction to Public Key Technology
and the Federal PKI Infrastructure,
February 2001
Adobe
Acrobat Reader file (261,376 bytes)
|
SP 800-31 |
Intrusion Detection Systems (IDS),
November 2001
Adobe
Acrobat Reader file (871,060 bytes)
|
SP 800-30 |
Risk Management
Guide for Information Technology Systems, January 2002
Adobe
Acrobat Reader file (961,450 bytes)
|
SP 800-29 |
A Comparison of the Security
Requirements for Cryptographic Modules in FIPS 140-1 and FIPS 140-2,
June 2001
Adobe
Acrobat Reader file (256,671 bytes)
|
SP 800-28 |
Guidelines
on Active Content and Mobile Code,
October 2001
Adobe
Acrobat Reader file
(509,861 bytes)
|
SP 800-27 |
Engineering Principles for Information
Technology Security (A Baseline for Achieving Security),
June 2001
Adobe
Acrobat Reader file (183,214 bytes)
|
SP 800-26 |
Security
Self-Assessment Guide for Information Technology Systems, November
2001
Adobe
Acrobat Reader file (458,936 bytes)
Microsoft
Word file (943,616 bytes)
|
SP 800-25 |
Federal Agency Use of Public Key
Technology for Digital Signatures and Authentication,
October 2000
Choose 1 of 2 ways to download document
1. Adobe
Acrobat Reader file (92,514 bytes)
2. Microsoft
Word file (132,608 bytes)
|
SP 800-24 |
PBX Vulnerability Analysis: Finding
Holes in Your PBX Before Someone Else Does,
August 2000
Adobe
Reader file (229,479 bytes)
|
SP 800-23 |
Guideline to Federal Organizations on
Security Assurance and Acquisition/Use of Tested/Evaluated Products,
August 2000
Choose 1 of 3 ways to download document
1. Adobe
Reader - Complete document (856,473 bytes)
2. Part
1 of 3 .pdf file (428,774 bytes)
Part
2 of 3 .pdf file (163,621 bytes)
Part
3 of 3 .pdf file (266,471 bytes)
3. Complete
zipped .pdf files (821,612 bytes)
|
SP 800-22 |
A Statistical Test Suite for Random
and Pseudorandom Number Generators for Cryptographic Applications,
October 2000
Revised: May 15, 2001:
Adobe
Reader file (1,455,377 bytes)
Errata
sheet for originally published version (.pdf file)
|
SP 800-21 |
Guideline for Implementing
Cryptography in the Federal Government,
November 1999
Adobe
Reader file (625,914 bytes)
|
SP 800-20 |
Modes of Operation Validation System for the Triple
Data Encryption Algorithm (TMOVS): Requirements and Procedures,
Revised April 2000
Adobe
Reader file (1,026,682 bytes)
|
SP 800-19 |
Mobile Agent Security
October 1999
Adobe
Reader file (137,617 bytes)
|
SP 800-18 |
Guide for Developing Security Plans for Information
Technology Systems,
December 1998
2 different file formats:
Microsoft
Word file (552,448 bytes)
Adobe
Reader file (314,006 bytes)
Letter from CIO Council Security Committee
Adobe
Reader file (31,112 bytes)
|
SP 800-17 |
Modes of Operation Validation System (MOVS):
Requirements and Procedures,
February 1998
Adobe
Reader file (414,698 bytes)
|
SP 800-16 |
Information Technology Security Training
Requirements: A Role- and Performance-Based Model (supersedes NIST Spec.
Pub. 500-172),
April 1998
broken down into 3 parts:
Part 1 - document: Adobe
Reader file (911,907 bytes)
Part 2 - Appendix A-D: Adobe
Reader file (127,322 bytes)
Part 3 - Appendix E: Adobe
Reader file (386,746 bytes)
|
SP 800-15 |
Minimum Interoperability Specification for PKI
Components (MISPC), Version 1,
January 1998
3 different file formats:
Adobe
Reader file (283,970 bytes)
Microsoft
Word file
Postscript
file
|
SP 800-14 |
Generally Accepted Principles and Practices for
Securing Information Technology Systems,
September 1996
3 different file formats:
Postscript
file (491086 bytes)
WordPerfect
file (185677 bytes)
Adobe
Reader file (192326 bytes)
|
SP 800-13 |
Telecommunications Security Guidelines for
Telecommunications Management Network,
October 1995
WordPerfect
file (221968 bytes)
|
SP 800-12 |
An Introduction to Computer Security: The NIST
Handbook,
October 1995
HTML
pages - goes to first page of document
|
SP 800-11 |
The Impact of the FCC's Open Network Architecture
on NS/EP Telecommunications Security,
February 1995
2 different file formats:
.html
files
Adobe
Reader file
|
SP 800-10 |
Keeping Your Site Comfortably Secure: An
Introduction to Internet Firewalls,
December 1994
4 different file formats:
HTML
pages
Adobe
Reader file (1,109,869 bytes)
Postscript
file (1,829,642 bytes)
.gz
zipped Postscript file (599,048 bytes)
|
SP 800-9 |
Good Security Practices for Electronic Commerce,
Including Electronic Data Interchange,
December 1993
All 800-9 files are in Adobe Reader format:
complete document - all 58 pages: 800-9.pdf
(7,398,843 bytes)
complete document zipped up - all 58 pages: 800-9.zip
(7,325,297 bytes)
document broken down into 4 smaller files:
cover page to page 15: part1.pdf
(2,596,477 bytes)
page 16 to page 30: part2.pdf
(1,720,015 bytes)
page 31 to page 44: part3.pdf
(1,581,418 bytes)
page 45 to page 58: part4.pdf
(1,492,389 bytes)
|
SP 800-8 |
Security Issues in the Database Language SQL,
August 1993
2 different file formats:
Postscript
file (309,497 bytes)
Text
file (102,444 bytes)
|
SP 800-7 |
Security in Open Systems,
July 1994
HTML
pages
Postscript
file (1,447,678 bytes)
|
SP 800-6 |
Automated Tools for Testing Computer System
Vulnerability,
December 1992
3 different file formats:
Postscript
file (309,577 bytes)
Text
file (67,755 bytes)
Zipped
Postscript file (93,302 bytes)
|
SP 800-5 |
A Guide to the Selection of Anti-Virus Tools and
Techniques,
December 1992
5 different file formats:
HTML
pages
Postscript
file (403,464 bytes)
Text
file (82,314 bytes)
Zipped
Postscript file (117,761 bytes)
|
SP 800-4 |
Computer Security Considerations in Federal
Procurements: A Guide for Procurement Initiatiors, Contracting Officers,
and Computer Security Officials,
March 1992
Zipped
file (71,086 bytes)
800-4, Executive Summary
Text
file (213,344 bytes)
|
SP 800-3 |
Establishing a Computer Security Incident Response
Capability (CSIRC),
November 1991
2 different file formats:
Postscript
file (292,992 bytes)
Adobe
Reader file (135,084 bytes)
|
SP 800-2 |
Public-Key Cryptography,
April 1991
Text
file (346,035 bytes)
|