forked from usnistgov/NIST-Tech-Pubs
-
Notifications
You must be signed in to change notification settings - Fork 0
/
SP1800.html
120 lines (120 loc) · 28.7 KB
/
SP1800.html
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
<!DOCTYPE HTML><html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>NIST Technical Publications List</title>
<meta name="viewport" content="width=device-width, initial-scale=1.0">
<link rel="stylesheet" type="text/css" href="./css/reset.css">
<link rel="stylesheet" type="text/css" href="./css/techpubs-html2.css">
<link rel="stylesheet" type="text/css" href="./css/accordian.css">
<link rel="stylesheet" type="text/css" href="./css/NISTPages.css">
</head>
<body>
<header class="nist-header">
<h1><a class="nist-logo" target="_blank" href="http:https://www.nist.gov/" title="Go to nist.gov">National Institute of Standards and Technology</a></h1>
<div class="nist-links"><a class="nist-links-button" target="_blank" href="http:https://www.nist.gov">NIST Website</a><a class="nist-links-button mobile-hide" target="_blank" href="http:https://www.nist.gov/public_affairs/nandyou.cfm">About NIST</a><a class="nist-links-button mobile-hide" target="_blank" href="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/usnistgov">usnistgov on GitHub</a></div>
</header>
<div id="container">
<header id="header">
<h1 id="title">NIST Technical Series Publication List</h1>
</header>
<nav id="menu" class="clearfix">
<ul>
<li><a href="./">Home</a></li>
<li><a href="./date.html">View All Reports</a></li>
<li><a href="./series.html">Filter by Series</a></li>
<li><a href="https://github.com/usnistgov/NIST-Tech-Pubs/tree/nist-pages/xml">Raw Data</a></li>
<li><a href="#top">Back to Top</a></li>
</ul>
</nav>
<section id="content">
<h3 class="type-head" id="SP1800">SP1800</h3>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Protecting Information and System Integrity in Industrial Control System Environments:
Cybersecurity for the Manufacturing Sector </span><br><span class="publication_date"><label class="label">Date Published: </label>March 2022</span><br><span class="authors"><label class="label">Authors: </label>Michael Powell, Joseph Brule, Michael Pease, Keith Stouffer, CheeYee Tang, Timothy Zimmerman, Chelsea Deane, John Hoyt, Mary Raguso, Aslam Sherule, Kangmin Zheng, Matthew Zopf</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 1800-10</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.1800-10</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1800-10.pdf">Download PDF</a> | <a href="./bib/NIST.SP.1800-10.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Securing the Industrial Internet of Things: Cybersecurity for Distributed Energy Resources </span><br><span class="publication_date"><label class="label">Date Published: </label>February 2022</span><br><span class="authors"><label class="label">Authors: </label></span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 1800-32</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.1800-32</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1800-32.pdf">Download PDF</a> | <a href="./bib/NIST.SP.1800-32.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Securing Telehealth Remote Patient Monitoring Ecosystem </span><br><span class="publication_date"><label class="label">Date Published: </label>February 2022</span><br><span class="authors"><label class="label">Authors: </label>Jennifer Cawthra, Nakia Grayson, Ronald Pulivarti, Bronwyn Hodges, Jason Kuruvilla, Kevin Littlefield, Julie Snyder, Sue Wang, Ryan Williams, Kangmin Zheng</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 1800-30</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.1800-30</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1800-30.pdf">Download PDF</a> | <a href="./bib/NIST.SP.1800-30.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Trusted Cloud: Security Practice Guide for VMware Hybrid Cloud Infrastructure as a Service (IaaS)
Environments</span><br><span class="publication_date"><label class="label">Date Published: </label>2022</span><br><span class="authors"><label class="label">Authors: </label>Michael Bartock</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 1800-19</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.1800-19</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1800-19.pdf">Download PDF</a> | <a href="./bib/NIST.SP.1800-19.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Improving Enterprise Patching for General IT Systems: Utilizing Existing Tools and Performing Processes in Better Ways</span><br><span class="publication_date"><label class="label">Date Published: </label>2022</span><br><span class="authors"><label class="label">Authors: </label>Murugiah Souppaya</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 1800-31</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.1800-31</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1800-31.pdf">Download PDF</a> | <a href="./bib/NIST.SP.1800-31.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Mobile Application Single Sign-On: Improving Authentication for Public Safety First
Responders </span><br><span class="publication_date"><label class="label">Date Published: </label>August 2021</span><br><span class="authors"><label class="label">Authors: </label>William Fisher, Paul Grassi, William C. Barker, Spike E. Dog, Santos Jha, William Kim, Taylor McCorkill, Joseph Portner, Mark Russell, Sudhi Umarji</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 1800-13</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.1800-13</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1800-13.pdf">Download PDF</a> | <a href="./bib/NIST.SP.1800-13.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Securing Small-Business and Home Internet of Things (IoT) Devices: Mitigating Network-Based
Attacks Using Manufacturer Usage Description (MUD) </span><br><span class="publication_date"><label class="label">Date Published: </label>May 2021</span><br><span class="authors"><label class="label">Authors: </label>Donna Dodson, Douglas Montgomery, Tim Polk, Mudumbai Ranganathan, Murugiah Souppaya, Steve Johnson, Ashwini Kadam, Craig Pratt, Darshak Thakore, Mark Walker, Eliot Lear, Brian Weis, William C. Barker, Dean Coclin, Avesta Hojjati, Clint Wilson, Tim Jones, Adnan Baykal, Drew Cohen, Kevin Yeich, Yemi Fashina, Parisa Grayeli, Joshua Harrington, Joshua Klosterman, Blaine Mulugeta, Susan Symington, Jaideep Singh</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 1800-15</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.1800-15</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1800-15.pdf">Download PDF</a> | <a href="./bib/NIST.SP.1800-15.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Securing Property Management Systems </span><br><span class="publication_date"><label class="label">Date Published: </label>March 2021</span><br><span class="authors"><label class="label">Authors: </label>William Newhouse, Michael Ekstrom, Jeff Finke, Marisa Harriston</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 1800-27</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.1800-27</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1800-27.pdf">Download PDF</a> | <a href="./bib/NIST.SP.1800-27.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Data Integrity: Detecting and Responding to Ransomware and Other Destructive Events </span><br><span class="publication_date"><label class="label">Date Published: </label>December 2020</span><br><span class="authors"><label class="label">Authors: </label>Jennifer Cawthra, Michael Ekstrom, Lauren Lusty, Julian Sexton, John Sweetnam</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 1800-26</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.1800-26</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1800-26.pdf">Download PDF</a> | <a href="./bib/NIST.SP.1800-26.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Data Integrity: Identifying and Protecting Assets Against Ransomware and Other Destructive
Events </span><br><span class="publication_date"><label class="label">Date Published: </label>December 2020</span><br><span class="authors"><label class="label">Authors: </label>Jennifer Cawthra, Michael Ekstrom, Lauren Lusty, Julian Sexton, John Sweetnam</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 1800-25</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.1800-25</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1800-25.pdf">Download PDF</a> | <a href="./bib/NIST.SP.1800-25.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Securing Picture Archiving and Communication System (PACS) Cybersecurity for the Healthcare
Sector </span><br><span class="publication_date"><label class="label">Date Published: </label>December 2020</span><br><span class="authors"><label class="label">Authors: </label>Jennifer Cawthra, Bronwyn Hodges, Jason Kuruvilla, Kevin Littlefield, Bob Niemeyer, Chris Peloquin, Sue Wang, Ryan Williams, Kangmin Zheng</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 1800-24</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.1800-24</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1800-24.pdf">Download PDF</a> | <a href="./bib/NIST.SP.1800-24.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Data Integrity: Recovering from Ransomware and Other Destructive Events </span><br><span class="publication_date"><label class="label">Date Published: </label>September 2020</span><br><span class="authors"><label class="label">Authors: </label>Timothy McBride, Michael Ekstrom, Lauren Lusty, Julian Sexton, Anne Townsend</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 1800-11</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.1800-11</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1800-11.pdf">Download PDF</a> | <a href="./bib/NIST.SP.1800-11.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Mobile Device Security: Corporate-Owned Personally-Enabled (COPE) </span><br><span class="publication_date"><label class="label">Date Published: </label>September 2020</span><br><span class="authors"><label class="label">Authors: </label>Joshua M. Franklin, Gema Howell, Kaitlin Boeckl, Naomi Lefkovitz, Ellen Nadeau, Behnam Shariati, Jason G. Ajmo, Christopher J. Brown, Spike E. Dog, Frank Javar, Michael Peck, Kenneth F. Sandlin</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 1800-21</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.1800-21</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1800-21.pdf">Download PDF</a> | <a href="./bib/NIST.SP.1800-21.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Securing web transactions TLS server certificate management </span><br><span class="publication_date"><label class="label">Date Published: </label>June 2020</span><br><span class="authors"><label class="label">Authors: </label>Mehwish Akram, William C Barker, Rob Clatterbuck, Donna Dodson, Brandon Everhart, Jane Gilbert, William Haag, Brian Johnson, Alexandros Kapasouris, Dung Lam, Brett Pleasant, Mary Raguso, Murugiah Souppaya, Susan Symington, Paul Turner, Clint Wilson</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 1800-16</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.1800-16</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1800-16.pdf">Download PDF</a> | <a href="./bib/NIST.SP.1800-16.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Energy Sector Asset Management For Electric Utilities, Oil & Gas Industry </span><br><span class="publication_date"><label class="label">Date Published: </label>May 2020</span><br><span class="authors"><label class="label">Authors: </label>James McCarthy, Lauren Acierto, Glen Joy, Jason Kuruvilla, Titilayo Ogunyale, Nikolas Urlaub, John Wiltberger, Devin Wynne</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 1800-23</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.1800-23</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1800-23.pdf">Download PDF</a> | <a href="./bib/NIST.SP.1800-23.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Derived Personal Identity Verification (PIV) credentials: includes executive summary (A); approach, architecture, and security characteristics
(B); and how-to guides (C)</span><br><span class="publication_date"><label class="label">Date Published: </label>August 2019</span><br><span class="authors"><label class="label">Authors: </label>William Newhouse, Michael Bartock, Jeffrey Cichonski, Hildegard Ferraiolo, Murugiah Souppaya, Christopher Brown, Spike E Dog, Susan Prince, Julian Sexton</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 1800-12</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.1800-12</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1800-12.pdf">Download PDF</a> | <a href="./bib/NIST.SP.1800-12.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Situational awareness for electric utilities </span><br><span class="publication_date"><label class="label">Date Published: </label>August 2019</span><br><span class="authors"><label class="label">Authors: </label>Jim McCarthy, Otis Alexander, Sallie Edwards, Don Faatz, Chris Peloquin, Susan Symington, Andre Thibault, John Wiltberger, Karen Viani</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 1800-7</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.1800-7</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1800-7.pdf">Download PDF</a> | <a href="./bib/NIST.SP.1800-7.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Multifactor authentication for e-commerce </span><br><span class="publication_date"><label class="label">Date Published: </label>July 2019</span><br><span class="authors"><label class="label">Authors: </label>William Newhouse</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 1800-17</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.1800-17</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1800-17.pdf">Download PDF</a> | <a href="./bib/NIST.SP.1800-17.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Protecting the integrity of internet routing: border gateway protocol (BGP) route origin validation</span><br><span class="publication_date"><label class="label">Date Published: </label>June 2019</span><br><span class="authors"><label class="label">Authors: </label>William Haag, Doug Montgomery, William C Barker, Allen Tan</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 1800-14</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.1800-14</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1800-14.pdf">Download PDF</a> | <a href="./bib/NIST.SP.1800-14.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Mobile device security: cloud and hybrid builds</span><br><span class="publication_date"><label class="label">Date Published: </label>February 2019</span><br><span class="authors"><label class="label">Authors: </label>Joshua Franklin, Kevin Bowler, Christopher Brown, Spike E Dog, Sallie Edwards, Neil McNab, Matthew Steele</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 1800-4</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.1800-4</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1800-4.pdf">Download PDF</a> | <a href="./bib/NIST.SP.1800-4.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>IT asset management: financial services </span><br><span class="publication_date"><label class="label">Date Published: </label>September 2018</span><br><span class="authors"><label class="label">Authors: </label>Michael Stone, Chinedum Irrechukwu, Harry Perper, Devin Wynne, Leah Kauffman</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 1800-5</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.1800-5</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1800-5.pdf">Download PDF</a> | <a href="./bib/NIST.SP.1800-5.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Securing Wireless Infusion Pumps In Healthcare Delivery Organizations </span><br><span class="publication_date"><label class="label">Date Published: </label>August 2018</span><br><span class="authors"><label class="label">Authors: </label>Gavin O'Brien, Sallie Edwards, Kevin Littlefield, Neil McNab, Sue Wang, Kangmin Zheng</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 1800-8</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.1800-8</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1800-8.pdf">Download PDF</a> | <a href="./bib/NIST.SP.1800-8.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Identity and access management for electric utilities </span><br><span class="publication_date"><label class="label">Date Published: </label>July 2018</span><br><span class="authors"><label class="label">Authors: </label>Jim McCarthy, Don Faatz, Harry Perper, Chris Peloquin, John Wiltberger, Leah Kauffman</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 1800-2</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.1800-2</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1800-2.pdf">Download PDF</a> | <a href="./bib/NIST.SP.1800-2.ris" download="">Download Citation</a><br></div>
<div class="report-paper"><span class="titles"><label class="label">Title: </label>Domain name system-based electronic mail security </span><br><span class="publication_date"><label class="label">Date Published: </label>January 2017</span><br><span class="authors"><label class="label">Authors: </label>Scott Rose, William Barker, Santos Jha, Chinedum Irrechukwu, Karen Waltermire</span><br><span class="report-number"><label class="label">Report Number: </label>NIST SP 1800-6</span><br><span class="doi_data"><label class="label">doi:</label>10.6028/NIST.SP.1800-6</span><br><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1800-6.pdf">Download PDF</a> | <a href="./bib/NIST.SP.1800-6.ris" download="">Download Citation</a><br></div>
</section><a name="filter"></a><aside id="sidebar"><br><h2 class="filter"> Filter by Series </h2>
<p><a href="./AMS.html">Advanced Manufacturing Series</a></p>
<p><a href="./BRPD-CRPL-D.html">Basic Radio Propagation Predictions Series</a></p>
<p><a href="./BH.html">Building and Housing Reports</a></p>
<p><a href="./BMS.html">Building Materials and Structures Reports</a></p>
<p><a href="./BSS.html">Building Science Series</a></p>
<p><a href="./CRPL.html">Central Radio Propagation Laboratory Reports</a></p>
<p><a href="./CRPL-F-A.html">CRPL Ionospheric Data</a></p>
<p><a href="./IP.html">CRPL Ionospheric Predictions</a></p>
<p><a href="./CRPL-F-B.html">CRPL Solar-Geophysical Data</a></p>
<p><a href="./CIRC.html">Circulars</a></p>
<p><a href="./CIS.html">Consumer Information Series</a></p>
<p><a href="./CS.html">Commercial Standards</a></p>
<p><a href="./CSM.html">Commercial Standards Monthly</a></p>
<p><a href="./CSWP.html">Cybersecurity White Papers</a></p>
<p><a href="./DCI.html">Data Collection Instruments and Best Practices</a></p>
<p><a href="./EAB.html">Economic Analysis Briefs</a></p>
<p><a href="./FIPS.html">Federal Information Processing Standards
Publications</a></p>
<p><a href="./GCR.html">Grant/Contractor Reports</a></p>
<p><a href="./HB.html">Handbooks</a></p>
<p><a href="./HR.html">Hydraulic Research in the United States</a></p>
<p><a href="./IRPL.html">Interservice Radio Propagation Laboratory</a></p>
<p><a href="./LCIRC.html">Letter Circular</a></p>
<p><a href="./MONO.html">Monographs</a></p>
<p><a href="./MP.html">Miscellaneous Publications</a></p>
<p><a href="./NCSTAR.html">National Construction Safety Team Act
Reports</a></p>
<p><a href="./NSRDS.html">National Standard Reference Data Series</a></p>
<p><a href="./IR.html">NISTIRs (Interagency/Internal Reports)</a></p>
<p><a href="./OWMWP.html">Office of Weights and Measures White Papers</a></p>
<p><a href="./PC.html">Photographic Circulars</a></p>
<p><a href="./RPT.html">NBS Reports</a></p>
<p><a href="./SIBS.html">Special Interior Ballistics Studies</a></p>
<p><a href="./SP.html">Special Publications (General)</a></p>
<p><a href="./SP250.html">SP 250: Calibration Services</a></p>
<p><a href="./SP260.html">SP 260: Standard Reference Materials</a></p>
<p><a href="./SP300.html">SP 300: Precision Measurement and Calibration</a></p>
<p><a href="./SP400.html">SP 400: Semiconductor Measurement Technology</a></p>
<p><a href="./SP480.html">SP 480: Law Enforcement Technology</a></p>
<p><a href="./SP500.html">SP 500: Computer Systems Technology</a></p>
<p><a href="./SP700.html">SP 700: Industrial Measurement Series</a></p>
<p><a href="./SP800.html">SP 800: Computer Security Series</a></p>
<p><a href="./SP823.html">SP 823: Integrated Services Digital Network Series</a></p>
<p><a href="./SP960.html">SP 960: NIST Recommended Practice Guides</a></p>
<p><a href="./SP1200.html">SP 1200: Protocols</a></p>
<p><a href="./SP1500.html">SP 1500: Working Group Papers</a></p>
<p><a href="./SP1800.html">SP 1800: NIST Cybersecurity Practice Guides</a></p>
<p><a href="./SP1900.html">SP 1900: Cyber-Physical Systems</a></p>
<p><a href="./SP2000.html">SP 2000: Standards Coordination</a></p>
<p><a href="./SP2100.html">SP 2100: Conference Proceedings</a></p>
<p><a href="./TIBM.html">Technical Information on Building Materials</a></p>
<p><a href="./TN.html">Technical Notes</a></p>
<p><a href="./TTB.html">Technology Transfer Brief</a></p>
</aside>
<footer id="footer" class="clearfix"><a target="_blank" href="https://www.nist.gov/privacy-policy">Privacy Policy</a> | <a target="_blank" href="https://www.nist.gov/privacy-policy#secnot">Security Notice</a> | <a href="https://www.nist.gov/oism/accessibility">Accessibility Statement</a></footer>
</div>
</body>
</html>