Information Technology Reference
In-Depth Information
Control 
Reference
Description of 
Applicability a
Category/Document
RA
SP 800-31: Intrusion Detection Systems 
(IDSs)
RA
SP 800-30: Risk Management Guide for 
Information Technology Systems
RA
SP 800-28: Guidelines on Active Content 
and Mobile Code
RA
SP 800-26: Security Self-Assessment 
Guide for Information Technology 
Systems
RA
SP 800-25: Federal Agency Use of Public 
Key Technology for Digital Signatures 
and Authentication
RA
SP 800-24: PBX Vulnerability Analysis: 
Finding Holes in Your PBX before 
Someone Else Does
RA
SP 800-23: Guideline to Federal 
Organizations on Security Assurance 
and Acquisition/Use of Tested/Evaluated 
Products
RA
SP 800-19: Mobile Agent Security
RA
SP 800-14: Generally Accepted Principles 
and Practices for Securing Information 
Technology Systems
RA
SP 800-13: Telecommunications Security 
Guidelines for Telecommunications 
Management Network
RA
SP 800-12: An Introduction to Computer 
Security: The NIST Handbook
SA
System and Serices Acquisition
SA
FIPS 200: Security Controls for Federal 
Information Systems
SA
SP 800-100: Information Security 
Handbook for Managers
 
Search WWH ::




Custom Search