|
|
Computer Security Government Policy Latin America : Saavedra Pérez, Boris Omar,
|
|
|
Big data : too big to ignore for Latin America and the Caribbean / Dr. Boris Saavedra ; edited by Kat
Axe Federal Documents Online:Lib Use Only
|
|
2017
|
|
Computer Security Government Policy United States
|
|
|
Assessing cybersecurity activities at NIST and DHS : hearing before the Subcommittee on Technology an
Axe Federal Documents Online:Available
|
|
2009
|
Balancing privacy and innovation [electronic resource] : does the president's proposal tip the scale?
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2013
|
Big data : privacy risks and needed reform in the public and private sectors : hearing before the Com
Axe Federal Documents Online:Available
|
|
2022
|
The Comprehensive National Cybersecurity Initiative.
Axe Federal Documents Online:Available
|
|
2010
|
102 additional entries
|
|
|
|
Computer Security Government Policy United States Evaluation
|
|
|
Additional department oversight can improve DHS' intelligence systems security program [electronic re
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2011
|
DHS has made improvements on the security program for its intelligence systems [electronic resource].
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2011
|
Evaluation of DHS' information security program for fiscal year 2010 [electronic resource].
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2010
|
Homeland Security Information Network could support information sharing more effectively [electronic
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2006
|
10 additional entries
|
|
|
|
Computer Security Government Policy United States Periodicals : National Science and Technology Council (U.S.).
|
|
|
Federal cybersecurity research and development strategic plan / prepared by the Cyber Security and In
Axe Federal Documents Online:Available
|
|
2019
|
|
Computer Security Handbooks Manuals Etc
|
|
|
The disaster recovery handbook [electronic resource] : a step-by-step plan to ensure business continu
Axe ProQuest E-Book:Available
|
|
2004
|
Guide to intrusion detection and prevention systems (IDPS) [electronic resource] : recommendations of
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2007
|
Handbook on securing cyber-physical critical infrastructure / Sajal Das, Krishna Kant, Nan Zhang (edi
Axe Elsevier ScienceDirect Ebook:Available
|
|
2012
|
Handbook on securing cyber-physical critical infrastructure [electronic resource] / Sajal Das, Krishn
Axe ProQuest E-Book:Available
|
|
2012
|
9 additional entries
|
|
|
|
Computer Security History
|
|
|
The history of information security : a comprehensive handbook / edited by Karl De Leeuw and Jan Berg
Axe Elsevier ScienceDirect Ebook:Available
|
|
2007
|
|
Computer Security Industrial Applications United States
|
|
|
Guide to Industrial Control Systems (ICS) security : Supervisory Control and Data Acquisition (SCADA)
Axe Federal Documents Online:Available
|
|
2008
|
Guide to Industrial Control Systems (ICS) security : Supervisory Control and Data Acquisition (SCADA)
Axe Federal Documents Online:Available
|
|
2007
|
|
Computer Security Information Services
|
|
|
Roadmap to NIST information security documents [electronic resource].
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2006
|
|
Computer Security International Cooperation
|
|
|
Cyberterrorism and computer crimes : issues surrounding the establishment of an international regime
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2000
|
Information warfare arms control [electronic resource] : risks and costs / Maxie C. Thom.
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2006
|
Sharing the knowledge : government-private sector partnerships to enhance information security / Stev
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2000
|
United States-Israel Cybersecurity Cooperation Enhancement Act of 2016 : report (to accompany H.R. 58
Axe Federal Documents Online:Available
|
|
2016
|
|
Computer Security Juvenile Literature : Hudak, Heather C.,
|
|
|
Digital data security / Heather C. Hudak.
Pittsburg 1st Fl Young Adult Non-Fiction:Available
|
|
2019
|
|
Computer Security Kansas Auditing
|
|
|
State agency information systems : reviewing selected security controls in state agencies / [conducte
Axe Archives Kansas Documents:Available
|
|
2009
|
State agency information systems : reviewing the Kansas Health Policy Authority's management of those
Axe Archives Kansas Documents:Available
|
|
2008
|
Surplus computer equipment : determining whether state agencies effectively remove software and agenc
Axe Archives Kansas Documents:Available
|
|
2008
|
|
Computer Security Law And Legislation
|
|
|
Cybersecurity law, standards and regulations / Tari Schreider ; Kristen Noakes-Fry, editor.
Axe ProQuest E-Book:Available
|
|
2020
|
I dati personali nel diritto Europeo / a cura di Vincenzo Cuffaro, Roberto D'Orazio, Vincenzo Ricciut
Axe ProQuest E-Book:Available
|
|
2019
|
Lessons from the identity trail [electronic resource] : anonymity, privacy and identity in a networke
Axe ProQuest E-Book:Available
|
|
2009
|
The manager's guide to cybersecurity law : essentials for today's business / Tari Schreider, Kristen
Axe ProQuest E-Book:Available
|
|
2017
|
Perspectives on privacy : increasing regulation in the USA, Canada, Australia and European countries
Axe ProQuest E-Book:Available
|
|
2014
|
|
Computer Security Law And Legislation Australia : Sullivan, Clare.
|
|
|
Digital identity, an emergent legal concept [electronic resource] : the role and legal nature of digi
Axe JSTOR Open Ebooks:Available
|
|
2011
|
|
Computer Security Law And Legislation Canada : Canada.
|
|
|
Scientific cooperation [electronic resource] : agreement between the United States of America and Can
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2011
|
|
Computer Security Law And Legislation Europe : Leisterer, Hannfried.
|
|
|
Internetsicherheit in Europa : Zur Gewährleistung der Netz- und Informationssicherheit durch Informat
Axe JSTOR Open Ebooks:Available
|
|
2018-
|
|
Computer Security Law And Legislation European Union Countries
|
|
|
Aviation Cybersecurity : Regulatory Approach in the European Union / Benjamyn I. Scott.
Axe ProQuest E-Book:Available
|
|
2019
|
Sicherheit als Grundsatz : eine grundrechtsdogmatische Rekonstruktion im Unionsrecht am Beispiel der
Axe JSTOR Open Ebooks:Available
|
|
2017
|
|
Computer Security Law And Legislation Great Britain : Sullivan, Clare.
|
|
|
Digital identity, an emergent legal concept [electronic resource] : the role and legal nature of digi
Axe JSTOR Open Ebooks:Available
|
|
2011
|
|
Computer Security Law And Legislation Israel : United States.
|
|
|
United States-Israel Cybersecurity Cooperation Enhancement Act of 2016 : report (to accompany H.R. 58
Axe Federal Documents Online:Available
|
|
2016
|
|
Computer Security Law And Legislation Singapore : Singapore.
|
|
|
Defense [electronic resource] : cooperation : agreement between the United States of America and Sing
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2011
|
|
Computer Security Law And Legislation United States
|
|
|
9-8-8 Lifeline Cybersecurity Responsibility Act : report (to accompany H.R. 498).
Axe Federal Documents Online:Available
|
|
2023
|
Better On-line Ticket Sales Act of 2016 : report (to accompany H.R. 5104) (including cost estimate of
Axe Federal Documents Online:Available
|
|
2016
|
Better Online Ticket Sales Act of 2016 : report of the Committee on Commerce, Science, and Transporta
Axe Federal Documents Online:Available
|
|
2016
|
A bill to extend the Undertaking Spam, Spyware, and Fraud Enforcement with Enforcers Beyond Borders A
Axe Archives Fed Docs:Lib Use Only
|
|
2012
|
92 additional entries
|
|
|
|
Computer Security Law And Legislation United States Evaluation : United States.
|
|
|
Information security [electronic resource] : emerging cybersecurity issues threaten federal informati
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2005
|
|
Computer Security Law And Legislation United States States
|
|
|
State and Local Cyber Protection Act of 2015 : report together with additional views (to accompany H.
Axe Federal Documents Online:Available
|
|
2015
|
State and Local Cybersecurity Improvement Act : report (to accompany H.R. 5823) (including cost estim
Axe Federal Documents Online:Available
|
|
2020
|
|
Computer Security Management
|
|
|
Advanced penetration testing for highly-secured environments.
Axe ProQuest E-Book:Available
|
|
2016
|
AVIEN malware defense guide for the Enterprise / David Harley [and others] ; foreword by Robert S. Vi
Axe Elsevier ScienceDirect Ebook:Available
|
|
2007
|
The best damn IT security management book period / Bryan Cunningham [and others].
Axe Elsevier ScienceDirect Ebook:Available
|
|
2007
|
The complete Metasploit guide : explore effective penetration testing techniques with Metasploit / Sa
Axe ProQuest E-Book:Available
|
|
2019
|
26 additional entries
|
|
|
|
Computer Security Management Evaluation : United States.
|
|
|
Priority open recommendations: Securities and Exchange Commission.
Axe Federal Documents Online:Available
|
|
2023
|
|
Computer Security Management Examinations Study Guides
|
|
|
Official (ISC)² guide to the ISSMP CBK / edited by Harold F. Tipton.
Axe ProQuest E-Book:Available
|
|
2011
|
|
Computer Security Management Handbooks Manuals Etc
|
|
|
Information security management handbook / Vol. 2 Harold F. Tipton, Micki Krause, editors. Vol. 2.
Axe 2nd Floor Stacks:Missing
|
|
2004
|
Information security management handbook. Volume 5 [electronic resource] / edited by Harold F. Tipton
Axe ProQuest E-Book:Available
|
|
2012
|
Information security management handbook. Volume 6 [electronic resource] / edited by Harold F. Tipton
Axe ProQuest E-Book:Available
|
|
2012
|
Syngress IT security project management handbook / Susan Snedaker ; Russ Rogers, technical editor.
Axe Elsevier ScienceDirect Ebook:Available
|
|
2006
|
Syngress IT security project management handbook [electronic resource] / Susan Snedaker ; Russ Rogers
Axe ProQuest E-Book:Available
|
|
2006
|
|
Computer Security Management Standards
|
|
|
The case for ISO27001 : 2013 / Alan Calder.
Axe ProQuest E-Book:Available
|
|
2013
|
Information security breaches : avoidance and treatment based on ISO27001 / Michael Krausz.
Axe ProQuest E-Book:Available
|
|
2009
|
|
Computer Security Mathematical Models : Brand, John H,
|
|
|
A proposed modeling protocol for evaluating information attacks / John H. Brand II.
Axe Federal Documents Online:Available
|
|
1999-
|
|
Computer Security Mathematics
|
|
|
Cybersecurity and applied mathematics / Leigh Metcalf, William Casey.
Axe Elsevier ScienceDirect Ebook:Available
|
|
2016
|
Security of block ciphers : from algorithm design to hardware implementation / Kazuo Sakiyama, Yu Sas
Axe ProQuest E-Book:Available
|
|
2015
|
|
Computer Security Moral And Ethical Aspects : Digital Enlightenment Forum,
|
|
|
Security for the digital world within an ethical framework / by the Digital Enlightenment Forum.
Axe ProQuest E-Book:Available
|
|
2016
|
|
Computer Security Moral And Ethical Aspects United States Case Studies : Johnston, Jessica R.,
|
|
|
Technological turf wars [electronic resource] : a case study of the computer antivirus industry / Jes
Axe ProQuest E-Book:Available
|
|
2009
|
|
Computer Security New Mexico Los Alamos : United States.
|
|
|
Continuing security concerns at Los Alamos National Laboratory [electronic resource] : hearings befor
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2007
|
|
Computer Security Periodicals
|
|
|
ACM transactions on information and system security.
Axe Basement Bound Periodicals :Available, Axe Basement Current Periodicals :Available
|
|
1998
|
Journal of cyber security & information systems.
Axe Federal Documents Online:Available
|
|
2012
|
|
Computer Security Psychological Aspects : Zinatullin, Leron,
|
|
|
The psychology of information security : resolving conflicts between security compliance and human be
Axe ProQuest E-Book:Available
|
|
2016
|
|
Computer Security Research
|
|
|
Cybersecurity in humanities and social sciences : a research methods approach / edited by Hugo Loisea
Axe ProQuest E-Book:Available
|
|
2020
|
Perspectives on cybersecurity / Jakub Drmola.
Axe ProQuest E-Book:Available
|
|
2015
|
|
Computer Security Research United States
|
|
|
Cyber security R&D : hearing before the Subcommittee on Research and Science Education, Committee on
Axe Federal Documents Online:Available
|
|
2009
|
Cybersecurity research and development : challenges and solutions : hearing before the Subcommittee o
Axe Federal Documents Online:Available
|
|
2013
|
Information security [electronic resource] : coordination of federal cyber security research and deve
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2006
|
|
Computer Security Research United States Finance : United States.
|
|
|
S. 2037, S. 2182, homeland security and the technology sector : hearing before the Subcommittee on Sc
Axe Federal Documents Online:Available
|
|
2004
|
|
Computer Security Risk Management : United States.
|
|
|
Cybersecurity: State needs to expeditiously implement risk management and other key practices : repor
Axe Federal Documents Online:Available
|
|
2023
|
|
Computer Security Russia Federation : Petrenko, Sergei,
|
|
|
Cyber security innovation for the digital economy : a case study of the Russian Federation / Sergei P
Axe ProQuest E-Book:Available
|
|
2018
|
|
Computer Security Security Measures : El-Bawab, Abd El-Monem A.,
|
|
|
Untangle network security : secure your network against threats and vulnerabilities using the unparal
Axe ProQuest E-Book:Available
|
|
2014
|
|
Computer Security Security Measures United States : United States.
|
|
|
American Cybersecurity Literacy Act : report (to accompany H.R. 4055).
Axe Federal Documents Online:Available
|
|
2021
|
|
Computer Security Social Aspects United States Case Studies : Johnston, Jessica R.,
|
|
|
Technological turf wars [electronic resource] : a case study of the computer antivirus industry / Jes
Axe ProQuest E-Book:Available
|
|
2009
|
|
Computer Security Software : Naraei, Parisa,
|
|
|
Optimizing IEEE 802.11i resource and security essentials : for mobile and stationary devices / Parisa
Axe Elsevier ScienceDirect Ebook:Available
|
|
2014
|
|
Computer Security Standards
|
|
|
Announcing the Advanced Encryption Standard (AES) [electronic resource].
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2001
|
Cryptographic algorithms and key sizes for personal identity verification [electronic resource] / W.
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2005
|
Digital Signature Standard (DSS) [electronic resource]
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2000
|
Guidance for securing Microsoft Windows XP Home Edition [electronic resource] : a NIST security confi
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2006
|
3 additional entries
|
|
|
|
Computer Security Standards Government Policy United States
|
|
|
Guide for security-focused configuration management of information systems [electronic resource] / Ar
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2011
|
Guide to enterprise telework and remote access security [electronic resource] : recommendations of th
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2009
|
Guide to Industrial Control Systems (ICS) security : Supervisory Control and Data Acquisition (SCADA)
Axe Federal Documents Online:Available
|
|
2008
|
Guide to Industrial Control Systems (ICS) security : Supervisory Control and Data Acquisition (SCADA)
Axe Federal Documents Online:Available
|
|
2007
|
2 additional entries
|
|
|
|
Computer Security Standards United States
|
|
|
Best practices for keeping your home network secure [electronic resource].
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2011
|
Building an information technology security awareness and training program [electronic resource] / Ma
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2003
|
A comparison of the security requirements for cryptographic modules in FIPS 140-1 and FIPS 140-2 [ele
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2001
|
Contingency planning guide for information technology systems [electronic resource] : recommendations
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2002
|
50 additional entries
|
|
|
|
Computer Security Standards United States Congresses
|
|
|
A report on the Privilege (Access) Management Workshop [electronic resource] / NIST/NSA Privilege (Ac
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2010
|
|
Computer Security Standards United States Evaluation : United States.
|
|
|
Financial Management Service : significant weaknesses in computer controls : report to the Secretary
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2000
|
|
Computer Security Standards United States Handbooks Manuals Etc : Bowen, Pauline.
|
|
|
Information security handbook [electronic resource] : a guide for managers / Pauline Bowen, Joan Hash
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2006
|
|
Computer Security Study And Teaching
|
|
|
The cybersecurity body of knowledge : the ACM/IEEE/AIS/IFIP recommendations for a complete curriculum
Axe ProQuest E-Book:Available
|
|
2020
|
Research methods for cyber security / Thomas W. Edgar, David O. Manz.
Axe Elsevier ScienceDirect Ebook:Available
|
|
2017
|
Add Marked to Bag
Add All On Page
|