Another Cache of Excellent Network Security Documents

Posted on: November 16th, 2011 by Cascadeo Corporation

Today’s cache of excellent documents is thanks to the National Institute of Standards and Technology, Computer Security Division. Your tax dollars at work…in a good way.

Enjoy!

Guide to IPsec VPNs
sp800-77.pdf

Border Gateway Protocol Security
SP800-54.pdf

Establishing Wireless Robust Security Networks: A Guide to IEEE 802.11i
SP800-97.pdf

Guidelines on Firewalls and Firewall Policy
sp800-41-rev1.pdf

Guide to Securing Legacy IEEE 802.11 Wireless Networks
SP800-48r1.pdf

Guide to General Server Security
SP800-123.pdf

DRAFT A NIST Definition of Cloud Computing
Draft-SP-800-145_cloud-definition.pdf

DRAFT Guidelines on Security and Privacy in Public Cloud Computing
Draft-SP-800-144_cloud-computing.pdf

Guide to Security for Full Virtualization Technologies
SP800-125-final.pdf

DRAFT Information Security Continuous Monitoring for Federal Information Systems and Organizations
draft-SP-800-137-IPD.pdf

DRAFT Guide for Security Configuration Management of Information Systems
draft_sp800-128-ipd.pdf

Guide to Securing WiMAX Wireless Communications
sp800-127.pdf

Guidelines on Cell Phone and PDA Security
SP800-124.pdf

Guidelines for the Secure Deployment of IPv6
sp800-119.pdf

DRAFT Guide to Enterprise Password Management
draft-sp800-118.pdf

Technical Guide to Information Security Testing and Assessment
SP800-115.pdf

User’s Guide to Securing External Devices for Telework and Remote Access
SP800-114.pdf

Guide to SSL VPNs
SP800-113.pdf

Guide to Storage Encryption Technologies for End User Devices
SP800-111.pdf

Information Security Handbook: A Guide for Managers
SP800-100-Mar07-2007.pdf

Guide to Secure Web Services
SP800-95.pdf

Guide to Intrusion Detection and Prevention Systems (IDPS)
SP800-94.pdf

Guide to Computer Security Log Management
SP800-92.pdf

Guidelines for Media Sanitization
NISTSP800-88_rev1.pdf

Guide to Integrating Forensic Techniques into Incident Response
SP800-86.pdf

Guide to Test, Training, and Exercise Programs for IT Plans and Capabilities
SP800-84.pdf

Guide to Malware Incident Prevention and Handling
SP800-83.pdf

Secure Domain Name System (DNS) Deployment Guide
sp-800-81r1.pdf

Guidance for Securing Microsoft Windows XP Home Edition: A NIST Security Configuration Checklist
guidance_WinXP_Home.html

Guide to Securing Microsoft Windows XP Systems for IT Professionals
download_WinXP.html

Security Considerations for Voice Over IP Systems
SP800-58-final.pdf

Recommendation for Key Management
sp800-57-Part1-revised2_Mar08-2007.pdf

Building an Information Technology Security Awareness and Training Program
NIST-SP800-50.pdf

Security Guide for Interconnecting Information Technology Systems
sp800-47.pdf

Guide to Enterprise Telework and Remote Access Security
sp800-46r1.pdf

Guidelines on Electronic Mail Security
SP800-45v2.pdf

Guidelines on Securing Public Web Servers
SP800-44v2.pdf

Nov 2002Systems Administration Guidance for Windows 2000 Professional System
guidance_W2Kpro.html

Creating a Patch and Vulnerability Management Program
SP800-40v2.pdf

Guide to Selecting Information Technology Security Products
NIST-SP800-36.pdf

Guide to Information Technology Security Services
NIST-SP800-35.pdf

Aug 2000PBX Vulnerability Analysis: Finding Holes in Your PBX Before Someone Else Does
sp800-24pbx.pdf

Generally Accepted Principles and Practices for Securing Information Technology Systems
800-14.pdf

Telecommunications Security Guidelines for Telecommunications Management Network
sp800-13.pdf

An Introduction to Computer Security: The NIST Handbook
handbook.pdf

Guide to Protecting the Confidentiality of Personally Identifiable Information (PII)
sp800-122.pdf

Leave a Reply

You must be logged in to post a comment.

Navigation