Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

NIST Authors in Bold

Displaying 1376 - 1400 of 1431

Threat Assessment of Malicious Code and External Attacks

October 1, 1992
Author(s)
Lawrence E. Bassham, William T. Polk
As a participant in the U. S. Army Computer Vulnerability/Survivability Study Team, the National Institute of Standards and Technology has been tasked with providing an assessment of the threats associated with commercial hardware and software. This

Security in ISDN

September 1, 1991
Author(s)
William E. Burr
The Integrated Services Digital Network (ISDN) standards will provide worldwide digital communications service and will play a key role in the transition to electronic documents and business transactions. ISDN has been developed with little thought to

Computer Security: Selected Articles

April 1, 1991
Author(s)
Marianne M. Swanson, Elizabeth B. Lennon
This National Institute of Standards and Technology Internal Report (NISTIR) presents nine articles which represent a wide spectrum of computer security information. The articles were selected by the staff of the Computer Security Division, Computer

Public-Key Cryptography

April 1, 1991
Author(s)
James R. Nechvatal
This publication presents a state-of-the-art survey of public-key cryptography, circa 1988-1990, and covers the following topics: 1) the theory of public-key cryptography; 2) comparisons to conventional (secret-key) cryptography; 3) a largely self

Computer Users' Guide to the Protection of Information Resources

October 1, 1989
Author(s)
Cheryl Helsing, Marianne M. Swanson, Mary A. Todd
While excellent progress has been made in computer technology, very little has been done to inform users of the vulnerability of data and information to such threats as unauthorized modification, disclosure, and destruction, either deliberate or accidental

Executive Guide to the Protection of Information Resources

October 1, 1989
Author(s)
Cheryl Helsing, Marianne M. Swanson, Mary A. Todd
This guide is designed to help the policy maker address a host of questions regarding the protection and safety of computer systems and data processed within your agency. It introduces information systems security concerns, outlines the management issues

Guide for Selecting Automated Risk Analysis Tools

October 1, 1989
Author(s)
Irene E. Gilbert
This document recommends a process for selecting automated risk analysis tools. It is primarily intended for managers and those responsible for managing risks in computer and telecommunications systems. The document describes important considerations for

Management Guide to the Protection of Information Resources

October 1, 1989
Author(s)
Cheryl Helsing, Marianne M. Swanson, Mary A. Todd
This guide introduces information systems security concerns and outlines the issues that must be addressed by all agency managers in meeting their responsibilities to protect information systems within their organizations. It describes essential components
Displaying 1376 - 1400 of 1431