NIST Logo and ITL Banner Link to the NIST Homepage Link to the ITL Homepage Link to the NIST Homepage

Archived NIST Special Publications

These computer security-related NIST Special Publications (SPs) have been archived. Some may have been revised or superceded by a newer SP (see current SP list).

NumberDateTitle
SP 800-171June 2015 (Updated 9/3/2015)Protecting Controlled Unclassified Information in Nonfederal Information Systems and Organizations
  Withdrawn: Jan 21, 2016
  Superseded By: SP 800-171
SP 800-171June 2015 Protecting Controlled Unclassified Information in Nonfederal Information Systems and Organizations
  Withdrawn: Oct 01, 2015
  Superseded By: SP 800-171
SP 800-135December 2010 Recommendation for Existing Application-Specific Key Derivation Functions
  Withdrawn: Dec 01, 2011
  Superseded By: SP 800-135 Rev. 1
  Archived File
SP 800-131AJanuary 2011 Transitions: Recommendation for Transitioning the Use of Cryptographic Algorithms and Key Lengths
  Withdrawn: Nov 06, 2015
  Superseded By: SP 800-131A Rev. 1
  Archived File
SP 800-126 Rev. 2September 2011 The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.2
  Withdrawn: Mar 19, 2012
  Superseded By: SP 800-126 Rev. 2
SP 800-124October 2008 Guidelines on Cell Phone and PDA Security
  Withdrawn: Jun 21, 2013
  Superseded By: SP 800-124 Rev. 1
  Archived File
SP 800-121September 2008 Guide to Bluetooth Security
  Withdrawn: Jun 01, 2012
  Superseded By: SP 800-121 Rev. 1
  Archived File
SP 800-114November 2007 User's Guide to Securing External Devices for Telework and Remote Access
  Withdrawn: Jul 29, 2016
  Superseded By: SP 800-114 Rev. 1
  Archived File
SP 800-107February 2009 Recommendation for Applications Using Approved Hash Algorithms
  Withdrawn: Aug 24, 2012
  Superseded By: SP 800-107 Rev. 1
  Archived File
SP 800-104June 2007 A Scheme for PIV Visual Card Topography
  Withdrawn: Sep 01, 2014
  Superseded By: FIPS 201-2
  Archived File
SP 800-101May 2007 Guidelines on Cell Phone Forensics
  Withdrawn: May 15, 2014
  Superseded By: SP 800-101 Rev. 1
  Archived File
SP 800-100October 2006 Information Security Handbook: A Guide for Managers
  Withdrawn: Mar 07, 2007
  Superseded By: SP 800-100
SP 800-90AJanuary 2012 Recommendation for Random Number Generation Using Deterministic Random Bit Generators
  Withdrawn: Jun 24, 2015
  Superseded By: SP 800-90A Rev. 1
  Archived File
SP 800-90 RevisedMarch 2007 Recommendation for Random Number Generation Using Deterministic Random Bit Generators (Revised)
  Withdrawn: Jan 01, 2012
  Superseded By: SP 800-90A
  Archived File
SP 800-90June 2006 Recommendation for Random Number Generation Using Deterministic Random Bit Generators
  Withdrawn: Mar 14, 2007
  Superseded By: SP 800-90 Revised
  Archived File
SP 800-90June 2006 Recommendation for Random Number Generation Using Deterministic Random Bit Generators
  Withdrawn: Mar 14, 2007
  Superseded By: SP 800-90
  Archived File
SP 800-88September 2006 Guidelines for Media Sanitization
  Withdrawn: Dec 22, 2014
  Superseded By: SP 800-88 Rev. 1
  Archived File
SP 800-88August 2006 Guidelines for Media Sanitization
  Withdrawn: Sep 11, 2006
  Superseded By: SP 800-88
SP 800-87 Version 1.0 (March 2007 edition)March 2007 Codes for the Identification of Federal and Federally Assisted Organizations
  Withdrawn: Apr 01, 2008
  Superseded By: SP 800-87 Rev. 1
  Archived File
SP 800-87 Version 1.0 (January 2006 edition)January 2006 Codes for the Identification of Federal and Federally Assisted Organizations
  Withdrawn: Mar 15, 2007
  Superseded By: SP 800-87 Version 1.0 (March 2007 edition)
  Archived File
SP 800-87 Version 1.0October 2005 Codes for the Identification of Federal and Federally Assisted Organizations Version 1.0
  Withdrawn: Jan 15, 2006
  Superseded By: SP 800-87 Version 1.0 (January 2006 edition)
  Archived File
SP 800-85A-2July 2010 PIV Card Application and Middleware Interface Test Guidelines (SP800-73-3 Compliance)
  Withdrawn: Apr 13, 2016
  Superseded By: SP 800-85A -4
  Archived File
SP 800-85A-1March 2009 PIV Card Application and Middleware Interface Test Guidelines (SP800-73-2 Compliance)
  Withdrawn: Jul 28, 2010
  Superseded By: SP 800-85A -2
  Archived File
SP 800-85AApril 2006 PIV Card Application and Middleware Interface Test Guidelines (SP800-73 Compliance)
  Withdrawn: Apr 03, 2009
  Superseded By: SP 800-85A -1
  Archived File
SP 800-85October 2005 PIV Middleware and On-Card Application Conformance Test Guidance (SP 800-73 Compliance)
  Withdrawn: Apr 05, 2006
  Superseded By: SP 800-85A
  Archived File
SP 800-83November 2005 Guide to Malware Incident Prevention and Handling
  Withdrawn: Jul 22, 2013
  Superseded By: SP 800-83 Rev. 1
  Archived File
SP 800-82 Rev. 1May 2013 Guide to Industrial Control Systems (ICS) Security
  Withdrawn: May 29, 2015
  Superseded By: SP 800-82 Rev. 2
  Archived File
SP 800-82June 2011 Guide to Industrial Control Systems (ICS) Security
  Withdrawn: May 14, 2013
  Superseded By: SP 800-82 Rev. 1
  Archived File
SP 800-81 Rev. 1April 2010 Secure Domain Name System (DNS) Deployment Guide
  Withdrawn: Sep 13, 2013
  Superseded By: SP 800-81 -2
  Archived File
SP 800-81May 2006 Secure Domain Name System (DNS) Deployment Guide
  Withdrawn: Apr 30, 2010
  Superseded By: SP 800-81 Rev. 1
  Archived File
SP 800-79-1June 2008 Guidelines for the Accreditation of Personal Identity Verification Card Issuers
  Withdrawn: Jul 30, 2015
  Superseded By: SP 800-79 -2
  Archived File
SP 800-79July 2005 Guidelines for the Certification and Accreditation of PIV Card Issuing Organizations
  Withdrawn: Jun 18, 2008
  Superseded By: SP 800-79 -1
  Archived File
SP 800-78-3December 2010 Cryptographic Algorithms and Key Sizes for Personal Identity Verification
  Withdrawn: May 29, 2015
  Superseded By: SP 800-78 -4
  Archived File
SP 800-78-2February 2010 Cryptographic Algorithms and Key Sizes for Personal Identity Verification
  Withdrawn: Dec 01, 2010
  Superseded By: SP 800-78 -3
  Archived File
SP 800-78-1August 2007 Cryptographic Algorithms and Key Sizes for Personal Identity Verification
  Withdrawn: Feb 13, 2010
  Superseded By: SP 800-78 -2
  Archived File
SP 800-78April 2005 Cryptographic Algorithms and Key Sizes for Personal Identity Verification
  Withdrawn: Aug 01, 2007
  Superseded By: SP 800-78 -1
  Archived File
SP 800-76-1January 2007 Biometric Data Specification for Personal Identity Verification
  Withdrawn: Jul 11, 2013
  Superseded By: SP 800-76 -2
  Archived File
SP 800-76February 1, 2006 Biometric Data Specification for Personal Identity Verification
  Withdrawn: Jan 17, 2007
  Superseded By: SP 800-76 -1
  Archived File
SP 800-73-4May 2015 Interfaces for Personal Identity Verification
  Withdrawn: Feb 12, 2016
  Superseded By: SP 800-73 -4
SP 800-73-3February 2010 Interfaces for Personal Identity Verification
  Withdrawn: May 29, 2015
  Superseded By: SP 800-73 -4
  Archived File
SP 800-73-2September 2008 Interfaces for Personal Identity Verification
  Withdrawn: Feb 01, 2010
  Superseded By: SP 800-73 -3
  Archived File
SP 800-73-1March 2006 Interfaces for Personal Identity Verification
  Withdrawn: Sep 18, 2008
  Superseded By: SP 800-73 -2
  Archived File
SP 800-73April 2005 Interfaces for Personal Identity Verification
  Withdrawn: Sep 29, 2005
  Superseded By: SP 800-73
SP 800-73April 2005 (Updated 9/29/2005)Interfaces for Personal Identity Verification
  Withdrawn: Mar 15, 2006
  Superseded By: SP 800-73 -1
  Archived File
SP 800-70 Rev. 2February 2011 National Checklist Program for IT Products: Guidelines for Checklist Users and Developers
  Withdrawn: Dec 10, 2015
  Superseded By: SP 800-70 Rev. 3
  Archived File
SP 800-70 Rev. 1September 2009 National Checklist Program for IT Products: Guidelines for Checklist Users and Developers
  Withdrawn: Feb 01, 2011
  Superseded By: SP 800-70 Rev. 2
  Archived File
SP 800-70May 2005 Security Configuration Checklists Program for IT Products: Guidance for Checklists Users and Developers
  Withdrawn: Sep 30, 2009
  Superseded By: SP 800-70 Rev. 1
  Archived File
SP 800-68October 2005 Guidance for Securing Microsoft Windows XP Systems for IT Professionals: A NIST Security Configuration Checklist
  Withdrawn: Oct 01, 2008
  Superseded By: SP 800-68 Rev. 1
  Archived File
SP 800-67 Ver. 1May 2004 Recommendation for the Triple Data Encryption Algorithm (TDEA) Block Cipher
  Withdrawn: Jan 01, 2012
  Superseded By: SP 800-67 Rev. 1
  Archived File
SP 800-66March 2005 An Introductory Resource Guide for Implementing the Health Insurance Portability and Accountability Act (HIPAA) Security Rule
  Withdrawn: Oct 01, 2008
  Superseded By: SP 800-66 Rev. 1
  Archived File
SP 800-64 Rev. 1June 2004 Security Considerations in the Information System Development Life Cycle
  Withdrawn: Oct 16, 2008
  Superseded By: SP 800-64 Rev. 2
  Archived File
SP 800-64October 2003 Security Considerations in the Information System Development Life Cycle
  Withdrawn: Jun 16, 2004
  Superseded By: SP 800-64 Rev. 1
  Archived File
SP 800-63-1December 2011 Electronic Authentication Guideline
  Withdrawn: Aug 29, 2013
  Superseded By: SP 800-63 -2
  Archived File
SP 800-63 Ver. 1.0.2April 2006 Electronic Authentication Guideline
  Withdrawn: Dec 12, 2011
  Superseded By: SP 800-63 -1
  Archived File
SP 800-63 Ver. 1.0.1September 2004 Electronic Authentication Guideline
  Withdrawn: Apr 30, 2006
  Superseded By: SP 800-63 Ver. 1.0.2
  Archived File
SP 800-63 Ver. 1.0June 2004 Electronic Authentication Guideline
  Withdrawn: Sep 27, 2004
  Superseded By: SP 800-63 Ver. 1.0.1
SP 800-61 Rev. 1March 2008 Computer Security Incident Handling Guide
  Withdrawn: Aug 01, 2012
  Superseded By: SP 800-61 Rev. 2
  Archived File
SP 800-61January 2004 Computer Security Incident Handling Guide
  Withdrawn: Mar 07, 2008
  Superseded By: SP 800-61 Rev. 1
  Archived File
SP 800-60 Ver. 2.0June 2004 Guide for Mapping Types of Information and Information Systems to Security Categories
  Withdrawn: Aug 01, 2008
  Superseded By: SP 800-60 Vol. 1 Rev. 1
  Archived File
SP 800-60 Ver. 2.0June 2004 Guide for Mapping Types of Information and Information Systems to Security Categories
  Withdrawn: Aug 01, 2008
  Superseded By: SP 800-60 Vol. 2 Rev. 1
  Archived File
SP 800-57 Part 1 Rev. 3July 2012 Recommendation for Key Management, Part 1: General (Revision 3)
  Withdrawn: Jan 28, 2016
  Superseded By: SP 800-57 Part 1 Rev. 4
  Archived File
SP 800-57 Part 1 RevisedMarch 2007 Recommendation for Key Management, Part 1: General (Revised)
  Withdrawn: Jul 01, 2012
  Superseded By: SP 800-57 Part 1 Rev. 3
  Archived File
SP 800-57 Part 1 RevisedMay 2006 Recommendation for Key Management, Part 1: General (Revised)
  Withdrawn: Mar 01, 2007
  Superseded By: SP 800-57 Part 1 Revised
  Archived File
SP 800-57 Part 1August 2005 Recommendation for Key Management, Part 1: General
  Withdrawn: May 01, 2006
  Superseded By: SP 800-57 Part 1 Revised
  Archived File
SP 800-57 Part 3December 2009 Recommendation for Key Management, Part 3: Application-Specific Key Management Guidance
  Withdrawn: Jan 01, 2015
  Superseded By: SP 800-57 Part 3 Rev. 1
  Archived File
SP 800-56A RevisedMarch 2007 Recommendation for Pair-Wise Key Establishment Schemes Using Discrete Logarithm Cryptography
  Withdrawn: May 15, 2013
  Superseded By: SP 800-56A Rev. 2
  Archived File
SP 800-56AMarch 2006 [May 2006]Recommendation for Pair-Wise Key Establishment Schemes Using Discrete Logarithm Cryptography
  Withdrawn: Mar 14, 2007
  Superseded By: SP 800-56A Revised
  Archived File
SP 800-56BAugust 2009 Recommendation for Pair-Wise Key Establishment Schemes Using Integer Factorization Cryptography
  Withdrawn: Sep 30, 2014
  Superseded By: SP 800-56B Rev. 1
  Archived File
SP 800-55August 2003 Security Metrics Guide for Information Technology Systems
  Withdrawn: Jul 01, 2008
  Superseded By: SP 800-55 Rev. 1
  Archived File
SP 800-53A Rev. 4December 2014 Assessing Security and Privacy Controls in Federal Information Systems and Organizations: Building Effective Assessment Plans
  Withdrawn: Dec 18, 2014
  Superseded By: SP 800-53A Rev. 4
SP 800-53A Rev. 1June 2010 Guide for Assessing the Security Controls in Federal Information Systems and Organizations: Building Effective Security Assessment Plans
  Withdrawn: Dec 10, 2015
  Archived File
SP 800-53AJuly 2008 Guide for Assessing the Security Controls in Federal Information Systems and Organizations: Building Effective Security Assessment Plans
  Withdrawn: Jun 29, 2011
  Superseded By: SP 800-53A Rev. 1
  Archived File
SP 800-53 Rev. 4April 2013 (Updated 1/15/2014)Security and Privacy Controls for Federal Information Systems and Organizations
  Withdrawn: Jan 22, 2015
  Superseded By: SP 800-53 Rev. 4
SP 800-53 Rev. 4April 2013 (Updated 5/7/2013)Security and Privacy Controls for Federal Information Systems and Organizations
  Withdrawn: Jan 15, 2014
  Superseded By: SP 800-53 Rev. 4
SP 800-53 Rev. 4April 2013 Security and Privacy Controls for Federal Information Systems and Organizations
  Withdrawn: May 07, 2013
  Superseded By: SP 800-53 Rev. 4
SP 800-53 Rev. 3August 2009 (Updated 5/1/2010)Recommended Security Controls for Federal Information Systems and Organizations
  Withdrawn: Apr 30, 2014
  Superseded By: SP 800-53 Rev. 4
  Archived File
SP 800-53 Rev. 3August 2009 (Updated 9/14/2009)Recommended Security Controls for Federal Information Systems and Organizations
  Withdrawn: May 01, 2010
  Superseded By: SP 800-53 Rev. 3
SP 800-53 Rev. 3August 2009 (Updated 8/12/2009)Recommended Security Controls for Federal Information Systems and Organizations
  Withdrawn: Sep 14, 2009
  Superseded By: SP 800-53 Rev. 3
SP 800-53 Rev. 3August 2009 Recommended Security Controls for Federal Information Systems and Organizations
  Withdrawn: Aug 12, 2009
  Superseded By: SP 800-53 Rev. 3
SP 800-53 Rev. 2December 2007 Recommended Security Controls for Federal Information Systems
  Withdrawn: Aug 03, 2010
  Superseded By: SP 800-53 Rev. 3
  Archived File
SP 800-53 Rev. 1December 2006 Recommended Security Controls for Federal Information Systems
  Withdrawn: Dec 19, 2008
  Superseded By: SP 800-53 Rev. 2
  Archived File
SP 800-53February 2005 (Updated 6/17/2005)Recommended Security Controls for Federal Information Systems
  Withdrawn: Dec 19, 2007
  Superseded By: SP 800-53 Rev. 1
  Archived File
SP 800-53February 2005 (Updated 4/22/2005)Recommended Security Controls for Federal Information Systems
  Withdrawn: Jun 17, 2005
  Superseded By: SP 800-53
SP 800-53February 2005 Recommended Security Controls for Federal Information Systems
  Withdrawn: Apr 22, 2005
  Superseded By: SP 800-53
SP 800-52June 2005 Guidelines for the Selection, Configuration, and Use of Transport Layer Security (TLS) Implementations
  Withdrawn: Mar 13, 2013
  Superseded By: SP 800-52 Rev. 1
  Archived File
SP 800-51September 2002 Use of the Common Vulnerabilities and Exposures (CVE) Vulnerability Naming Scheme
  Withdrawn: Feb 25, 2011
  Superseded By: SP 800-51 Rev. 1
  Archived File
SP 800-48November 2002 Wireless Network Security: 802.11, Bluetooth and Handheld Devices
  Withdrawn: Jul 01, 2008
  Superseded By: SP 800-48 Rev. 1
  Archived File
SP 800-46 Rev. 1June 2009 Guide to Enterprise Telework and Remote Access Security
  Withdrawn: Jul 29, 2016
  Superseded By: SP 800-46 Rev. 2
  Archived File
SP 800-46August 2002 Security for Telecommuting and Broadband Communications
  Withdrawn: Jun 01, 2009
  Superseded By: SP 800-46 Rev. 1
  Archived File
SP 800-45September 2002 Guidelines on Electronic Mail Security
  Withdrawn: Feb 01, 2007
  Superseded By: SP 800-45 Version 2
  Archived File
SP 800-44September 2002 Guidelines on Securing Public Web Servers
  Withdrawn: Sep 01, 2007
  Superseded By: SP 800-44 Version 2
  Archived File
SP 800-42October 2003 Guideline on Network Security Testing
  Withdrawn: Sep 01, 2008
  Superseded By: SP 800-115
  Archived File
SP 800-41January 2002 Guidelines on Firewalls and Firewall Policy
  Withdrawn: Sep 28, 2009
  Superseded By: SP 800-41 Rev. 1
  Archived File
SP 800-40 Version 2.0November 2005 Creating a Patch and Vulnerability Management Program
  Withdrawn: Jul 22, 2013
  Superseded By: SP 800-40 Rev. 3
  Archived File
SP 800-40August 2002 Procedures for Handling Security Patches
  Withdrawn: Nov 16, 2005
  Superseded By: SP 800-40 Version 2.0
  Archived File
SP 800-38BMay 2005 Recommendation for Block Cipher Modes of Operation: the CMAC Mode for Authentication
  Withdrawn: Oct 06, 2016
  Archived File
SP 800-38CMay 2004 Recommendation for Block Cipher Modes of Operation: the CCM Mode for Authentication and Confidentiality
  Withdrawn: Jul 20, 2007
  Superseded By: SP 800-38C
SP 800-37 Rev. 1February 2010 Guide for Applying the Risk Management Framework to Federal Information Systems: a Security Life Cycle Approach
  Withdrawn: Jun 05, 2014
  Superseded By: SP 800-37 Rev. 1
SP 800-37May 2004 Guide for the Security Certification and Accreditation of Federal Information Systems
  Withdrawn: Feb 22, 2010
  Superseded By: SP 800-37 Rev. 1
  Archived File
SP 800-34 Rev. 1May 2010 Contingency Planning Guide for Federal Information Systems
  Withdrawn: Nov 11, 2010
  Superseded By: SP 800-34 Rev. 1
SP 800-34June 2002 Contingency Planning Guide for Information Technology Systems
  Withdrawn: May 31, 2010
  Superseded By: SP 800-34 Rev. 1
  Archived File
SP 800-31November 2001 Intrusion Detection Systems (IDS)
  Withdrawn: Feb 01, 2007
  Superseded By: SP 800-94
  Archived File
SP 800-30July 2002 Risk Management Guide for Information Technology Systems
  Withdrawn: Sep 01, 2012
  Superseded By: SP 800-30 Rev. 1
  Archived File
SP 800-28October 2001 Guidelines on Active Content and Mobile Code
  Withdrawn: Mar 01, 2008
  Superseded By: SP 800-28 Version 2
  Archived File
SP 800-27June 2001 Engineering Principles for Information Technology Security (A Baseline for Achieving Security)
  Withdrawn: Jun 01, 2004
  Superseded By: SP 800-27 Rev. A
  Archived File
SP 800-26November 2001 Security Self-Assessment Guide for Information Technology Systems
  Withdrawn: Dec 19, 2007
  Superseded By: FIPS 200
  Archived File
SP 800-26November 2001 Security Self-Assessment Guide for Information Technology Systems
  Withdrawn: Dec 19, 2007
  Superseded By: SP 800-53A
  Archived File
SP 800-26November 2001 Security Self-Assessment Guide for Information Technology Systems
  Withdrawn: Dec 19, 2007
  Superseded By: SP 800-53 Rev. 1
  Archived File
SP 800-22May 15, 2001 A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications
  Withdrawn: Aug 01, 2008
  Superseded By: SP 800-22 Rev. 1a
SP 800-21 Second editionDecember 2005 Guideline for Implementing Cryptography in the Federal Government
  Withdrawn: Aug 22, 2016
  Superseded By: SP 800-175A
  Archived File
SP 800-21 Second editionDecember 2005 Guideline for Implementing Cryptography in the Federal Government
  Withdrawn: Aug 22, 2016
  Superseded By: SP 800-175B
  Archived File
SP 800-21November 1999 Guideline for Implementing Cryptography in the Federal Government
  Withdrawn: Dec 01, 2005
  Superseded By: SP 800-21 Second edition
  Archived File
SP 800-20October 1999 (Updated 4/1/2000)Modes of Operation Validation System for the Triple Data Encryption Algorithm (TMOVS): Requirements and Procedures
  Withdrawn: Mar 01, 2012
  Superseded By: SP 800-20
SP 800-20October 1999 Modes of Operation Validation System for the Triple Data Encryption Algorithm (TMOVS): Requirements and Procedures
  Withdrawn: Apr 01, 2000
  Superseded By: SP 800-20
SP 800-18December 1998 Guide for Developing Security Plans for Information Technology Systems
  Withdrawn: Feb 01, 2006
  Superseded By: SP 800-18 Rev. 1
  Archived File
SP 800-11February 1995 The Impact of the FCC's Open Network Architecture on NS/EP Telecommunications Security
  Archived File
SP 800-10December 1994 Keeping Your Site Comfortably Secure: An Introduction to Internet Firewalls
  Archived File
SP 800-9December 1993 Good Security Practices for Electronic Commerce, Including Electronic Data Interchange
  Archived File
SP 800-8July 30, 1993 Security Issues in the Database Language SQL
  Archived File
SP 800-7July 1994 Security in Open Systems
  Archived File
SP 800-6December 1992 Automated Tools for Testing Computer System Vulnerability
  Archived File
SP 800-5December 1992 A Guide to the Selection of Anti-Virus Tools and Techniques
  Archived File
SP 800-4March 1992 Computer Security Considerations in Federal Procurements: A Guide for Procurement Initiatiors, Contracting Officers, and Computer Security
  Withdrawn: Oct 10, 2003
  Superseded By: SP 800-64
  Archived File
SP 800-3November 1991 Establishing a Computer Security Incident Response Capability (CSIRC)
  Withdrawn: Jan 16, 2004
  Superseded By: SP 800-61
  Archived File
SP 800-2April 1991 Public Key Cryptography
  Archived File
SP 500-189September 1991 Security in ISDN
  Archived File
SP 500-174October 1989 Guide for Selecting Automated Risk Analysis Tools
  Archived File
SP 500-172November 1989 Computer Security Training Guidelines
  Withdrawn: Apr 01, 1998
  Superseded By: SP 800-16
  Archived File
SP 500-171October 1989 Computer Users' Guide to the Protection of Information Resources
  Archived File
SP 500-170October 1989 Management Guide to the Protection of Information Resources
  Archived File
SP 500-169October 1989 Executive Guide to the Protection of Information Resources
  Archived File
SP 500-166August 1989 Computer Viruses and Related Threats: a Management Guide
  Archived File
SP 500-160January 1989 Report of the Invitational Workshop on Integrity Policy in Computer Information Systems (WIPCIS)
  Archived File
SP 500-158August 1988 Accuracy, Integrity, and Security in Computerized Vote-Tallying
  Archived File
SP 500-157September 1988 Smart Card Technology: New Methods for Computer Access Control
  Archived File
SP 500-156May 1988 Message Authentication Code (MAC) Validation System: Requirements and Procedures
  Archived File
SP 500-153April 1988 Guide to Auditing for Controls and Security: A System Development Life Cycle Approach
  Archived File
SP 500-134November 1985 Guide on Selecting ADP Backup Process Alternatives
  Archived File
SP 500-133October 1985 Technology Assessment: Methods for Measuring the Level of Computer Security
  Archived File
SP 500-120January 1985 Security of Personal Computer Systems: A Management Guide
  Archived File
SP 500-85January 1982 Executive Guide to ADP Contingency Planning
  Archived File
SP 500-61August 1980 Maintenance Testing for the Data Encryption Standard
  Archived File
SP 500-57April 1980 Audit and Evaluation of Computer Security II: System Vulnerabilities and Controls
  Archived File
SP 500-42January 1979 A Survey of Remote Monitoring
  Archived File
SP 500-30April 1978 Effective Use of Computing Technology in Vote-Tallying
  Archived File
SP 500-27February 1978 Computer Security and the Data Encryption Standard: Proceedings of the Conference on Computer Security and the Data Encryption Standard
  Archived File
SP 500-25January 1978 An Analysis of Computer Security Safeguards for Detecting and Preventing Intentional Computer Misuse
  Archived File
SP 500-24January 1978 Performance Assurance and Data Integrity Practices
  Archived File
SP 500-21 Vol. 2January 1978 The Network Security Center: a System Level Approach to Computer Network Security
  Archived File
SP 500-21 Vol. 1January 1978 Design Alternatives for Computer Network Security
  Archived File
SP 500-20September 1980 Validating the Correctness of Hardware Implementations of the NBS Data Encryption Standard
  Archived File
SP 500-20November 1977 Validating the Correctness of Hardware Implementations of the NBS Data Encryption Standard
  Withdrawn: Sep 01, 1980
  Superseded By: SP 500-20
  Archived File
SP 500-19October 1977 Audit and Evaluation of Computer Security
  Archived File
Back to Top