Publications Knowledge Management Program How NIST applies standards to its research papers for its virtual library: a case study M Coraggio 被引量: 0发表: 2010年 Procedures for Analyses of Online Communities He also has an interest is in the sociology of knowledge, especially as it applies to ...
How NIST applies standards to its research papers for its virtual library: a case study: Publications Knowledge Management ProgramCoraggio, MaryDeirdre
Though not obliged to comply, many private organizations use the NIST 800 series as a maturity model for achieving a minimal baseline of cybersecurity, especially in the area of supply chain risk management (SCRM). NIST has produced three special publications focused on mitigating supply chain ...
The term “ethics board” has not been properly defined in the literature. As a first approximation, it can be defined as a collective body intended to promote an organization’s ethical behavior. To make this definition more concrete, we need to specify the role that ethics boards might play...
Learn best practices for performing an Information Security Risk Assessment. Get started with these tips and resources.
Cite this paper Wang, X., Yu, H. (2005). How to Break MD5 and Other Hash Functions. In: Cramer, R. (eds) Advances in Cryptology – EUROCRYPT 2005. EUROCRYPT 2005. Lecture Notes in Computer Science, vol 3494. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11426639_2 ...
If you weren't glued to your computer screen right now, you might be reading this article on paper from a book; for about 2000 years until the appearance of the World Wide Web, virtually all written information was distributed in printed form. The idea of getting information from inked-up...
While you are at techniques for storage encryption, I recommend you the following document:http://csrc.nist.gov/publications/nistpubs/800-111/SP800-111.pdf(Guide to Storage Encryption Technologies for End User Devices). Alan•December 17, 2007 12:33 PM ...
Encryption of volatile FPGA bitstreams provides confidentiality to the design but does not ensure its authenticity. This paper motivates the need for adding authentication to the configuration process by providing application examples where this function
Building Information Modeling is based on the idea of the continuous use of digital building models throughout the entire lifecycle of a built facility, starting from the early conceptual design and detailed design phases, to the construction phase, and