- SP 800-3Establishing a Computer Security Incident Response Capability (CSIRC)
- SP 800-4Executive Summary: Computer Security Act of 1987
- SP 800-5Guide to the Selection of Anti-Virus Tools and Techniques |
Online
- SP 800-6Automated Tools for Testing Computer Systems Vulnerability
- SP 800-8Security Issues in the Database Language SQL
- SP 800-9Good Security Practices for Electronic Commerce, Including Electronic Data Interchange
- SP 800-10Keeping Your Site Comfortably Secure: An Introduction to Internet Firewalls
- SP 800-11The Impact of the FCC's Open Network Architecture on National Security / Emergency Preparedness (NS/EP) Telecommunications Security |
Online
- SP 800-12An Introduction to Computer Security: The NIST Handbook |
Online
- SP 800-13Telecommunications Security Guidelines for Telecommunications Management Network
- SP 800-14Generally Accepted Principles and Practices for Securing Information Technology Systems |
Online
- SP 800-15Minimum Interoperability Specifications for Public Key Infrastructure (PKI) Components
- SP 800-16Information Technology Security Training Requirements: a Role- and Performance-based Model
- SP 800-17Modes of Operation Validation System (MOVS): Requirements and Procedures
- SP 800-18Guide for Developing Security Plans for Information Technology Systems |
Online
- SP 800-64Security Concerns in the Information Systems Development Life Cycle |
Online
- SP 800-65Information Security: Integrating IT Security into the Capital Planning and Investment Control Process
- SP 800-66Information Security: An Introductory Resource Guide for Implementing the Health Insurance Portability and Accountability Act (HIPAA) Security Rule
- SP 800-68Guidance for Securing Microsoft Windows XP Systems for IT Professionals: a NIST Security Configuration Checklist
- SP 800-70Security Configuration Checklists for IT Products