|
|
Computer Security Management Evaluation : United States.
|
|
|
Priority open recommendations: Securities and Exchange Commission.
Axe Federal Documents Online:Available
|
|
2023
|
|
Computer Security Management Examinations Study Guides
|
|
|
Official (ISC)² guide to the ISSMP CBK / edited by Harold F. Tipton.
Axe ProQuest E-Book:Available
|
|
2011
|
|
Computer Security Management Handbooks Manuals Etc
|
|
|
Information security management handbook / Vol. 2 Harold F. Tipton, Micki Krause, editors. Vol. 2.
Axe 2nd Floor Stacks:Missing
|
|
2004
|
Information security management handbook. Volume 5 [electronic resource] / edited by Harold F. Tipton
Axe ProQuest E-Book:Available
|
|
2012
|
Information security management handbook. Volume 6 [electronic resource] / edited by Harold F. Tipton
Axe ProQuest E-Book:Available
|
|
2012
|
Syngress IT security project management handbook / Susan Snedaker ; Russ Rogers, technical editor.
Axe Elsevier ScienceDirect Ebook:Available
|
|
2006
|
Syngress IT security project management handbook [electronic resource] / Susan Snedaker ; Russ Rogers
Axe ProQuest E-Book:Available
|
|
2006
|
|
Computer Security Management Standards
|
|
|
The case for ISO27001 : 2013 / Alan Calder.
Axe ProQuest E-Book:Available
|
|
2013
|
Information security breaches : avoidance and treatment based on ISO27001 / Michael Krausz.
Axe ProQuest E-Book:Available
|
|
2009
|
|
Computer Security Mathematical Models : Brand, John H,
|
|
|
A proposed modeling protocol for evaluating information attacks / John H. Brand II.
Axe Federal Documents Online:Available
|
|
1999-
|
|
Computer Security Mathematics
|
|
|
Cybersecurity and applied mathematics / Leigh Metcalf, William Casey.
Axe Elsevier ScienceDirect Ebook:Available
|
|
2016
|
Security of block ciphers : from algorithm design to hardware implementation / Kazuo Sakiyama, Yu Sas
Axe ProQuest E-Book:Available
|
|
2015
|
|
Computer Security Moral And Ethical Aspects : Digital Enlightenment Forum,
|
|
|
Security for the digital world within an ethical framework / by the Digital Enlightenment Forum.
Axe ProQuest E-Book:Available
|
|
2016
|
|
Computer Security Moral And Ethical Aspects United States Case Studies : Johnston, Jessica R.,
|
|
|
Technological turf wars [electronic resource] : a case study of the computer antivirus industry / Jes
Axe ProQuest E-Book:Available
|
|
2009
|
|
Computer Security New Mexico Los Alamos : United States.
|
|
|
Continuing security concerns at Los Alamos National Laboratory [electronic resource] : hearings befor
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2007
|
|
Computer Security Periodicals
|
|
|
ACM transactions on information and system security.
Axe Basement Bound Periodicals :Available, Axe Basement Current Periodicals :Available
|
|
1998
|
Journal of cyber security & information systems.
Axe Federal Documents Online:Available
|
|
2012
|
|
Computer Security Psychological Aspects : Zinatullin, Leron,
|
|
|
The psychology of information security : resolving conflicts between security compliance and human be
Axe ProQuest E-Book:Available
|
|
2016
|
|
Computer Security Research
|
|
|
Cybersecurity in humanities and social sciences : a research methods approach / edited by Hugo Loisea
Axe ProQuest E-Book:Available
|
|
2020
|
Perspectives on cybersecurity / Jakub Drmola.
Axe ProQuest E-Book:Available
|
|
2015
|
|
Computer Security Research United States
|
|
|
Cyber security R&D : hearing before the Subcommittee on Research and Science Education, Committee on
Axe Federal Documents Online:Available
|
|
2009
|
Cybersecurity research and development : challenges and solutions : hearing before the Subcommittee o
Axe Federal Documents Online:Available
|
|
2013
|
Information security [electronic resource] : coordination of federal cyber security research and deve
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2006
|
|
Computer Security Research United States Finance : United States.
|
|
|
S. 2037, S. 2182, homeland security and the technology sector : hearing before the Subcommittee on Sc
Axe Federal Documents Online:Available
|
|
2004
|
|
Computer Security Risk Management : United States.
|
|
|
Cybersecurity: State needs to expeditiously implement risk management and other key practices : repor
Axe Federal Documents Online:Available
|
|
2023
|
|
Computer Security Russia Federation : Petrenko, Sergei,
|
|
|
Cyber security innovation for the digital economy : a case study of the Russian Federation / Sergei P
Axe ProQuest E-Book:Available
|
|
2018
|
|
Computer Security Security Measures : El-Bawab, Abd El-Monem A.,
|
|
|
Untangle network security : secure your network against threats and vulnerabilities using the unparal
Axe ProQuest E-Book:Available
|
|
2014
|
|
Computer Security Security Measures United States : United States.
|
|
|
American Cybersecurity Literacy Act : report (to accompany H.R. 4055).
Axe Federal Documents Online:Available
|
|
2021
|
|
Computer Security Social Aspects United States Case Studies : Johnston, Jessica R.,
|
|
|
Technological turf wars [electronic resource] : a case study of the computer antivirus industry / Jes
Axe ProQuest E-Book:Available
|
|
2009
|
|
Computer Security Software : Naraei, Parisa,
|
|
|
Optimizing IEEE 802.11i resource and security essentials : for mobile and stationary devices / Parisa
Axe Elsevier ScienceDirect Ebook:Available
|
|
2014
|
|
Computer Security Standards
|
|
|
Announcing the Advanced Encryption Standard (AES) [electronic resource].
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2001
|
Cryptographic algorithms and key sizes for personal identity verification [electronic resource] / W.
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2005
|
Digital Signature Standard (DSS) [electronic resource]
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2000
|
Guidance for securing Microsoft Windows XP Home Edition [electronic resource] : a NIST security confi
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2006
|
3 additional entries
|
|
|
|
Computer Security Standards Government Policy United States
|
|
|
Guide for security-focused configuration management of information systems [electronic resource] / Ar
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2011
|
Guide to enterprise telework and remote access security [electronic resource] : recommendations of th
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2009
|
Guide to Industrial Control Systems (ICS) security : Supervisory Control and Data Acquisition (SCADA)
Axe Federal Documents Online:Available
|
|
2008
|
Guide to Industrial Control Systems (ICS) security : Supervisory Control and Data Acquisition (SCADA)
Axe Federal Documents Online:Available
|
|
2007
|
2 additional entries
|
|
|
|
Computer Security Standards United States
|
|
|
Best practices for keeping your home network secure [electronic resource].
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2011
|
Building an information technology security awareness and training program [electronic resource] / Ma
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2003
|
A comparison of the security requirements for cryptographic modules in FIPS 140-1 and FIPS 140-2 [ele
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2001
|
Contingency planning guide for information technology systems [electronic resource] : recommendations
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2002
|
50 additional entries
|
|
|
|
Computer Security Standards United States Congresses
|
|
|
A report on the Privilege (Access) Management Workshop [electronic resource] / NIST/NSA Privilege (Ac
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2010
|
|
Computer Security Standards United States Evaluation : United States.
|
|
|
Financial Management Service : significant weaknesses in computer controls : report to the Secretary
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2000
|
|
Computer Security Standards United States Handbooks Manuals Etc : Bowen, Pauline.
|
|
|
Information security handbook [electronic resource] : a guide for managers / Pauline Bowen, Joan Hash
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2006
|
|
Computer Security Study And Teaching
|
|
|
The cybersecurity body of knowledge : the ACM/IEEE/AIS/IFIP recommendations for a complete curriculum
Axe ProQuest E-Book:Available
|
|
2020
|
Research methods for cyber security / Thomas W. Edgar, David O. Manz.
Axe Elsevier ScienceDirect Ebook:Available
|
|
2017
|
|
Computer Security Study And Teaching United States
|
|
|
Cyber security education : meeting the needs of technology workers and employers : hearing before the
Axe Federal Documents Online:Available
|
|
2004
|
Cybersecurity Opportunity Act : report of the Committee on Homeland Security and Governmental Affairs
Axe Federal Documents Online:Available
|
|
2022
|
Energy Cybersecurity University Leadership Act of 2022 : report (to accompany H.R. 7569).
Axe Federal Documents Online:Available
|
|
2022
|
Industrial Control Systems Cybersecurity Training Act : report of the Committee on Homeland Security
Axe Federal Documents Online:Available
|
|
2023
|
|
Computer Security Technological Innovations United States : United States.
|
|
|
State of federal privacy and data security law : lagging behind the times? : hearing before the Overs
Axe Federal Documents Online:Available
|
|
2012
|
|
Computer Security Testing
|
|
|
Building virtual pentesting labs for advanced penetration testing : build intricate virtual architect
Axe ProQuest E-Book:Available
|
|
2014
|
Building virtual pentesting labs for advanced penetration testing : learn how to build complex virtua
Axe ProQuest E-Book:Available
|
|
2016
|
|
Computer Security Testing Examinations Study Guides : Krutz, Ronald L.,
|
|
|
The CEH prep guide [electronic resource] : the comprehensive guide to certified ethical hacking / Ron
Axe ProQuest E-Book:Available
|
|
2007
|
|
Computer Security Testing Government Policy United States : United States.
|
|
|
Information assurance [electronic resource] : national partnership offers benefits, but faces conside
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2006
|
|
Computer Security Testing Handbooks Manuals Etc : Allen, Lee.
|
|
|
Advanced penetration testing for highly-secured environments [electronic resource] : the ultimate sec
Axe ProQuest E-Book:Available
|
|
2012
|
|
Computer Security United States
|
|
|
21 steps to improve cyber security of SCADA networks [electronic resource] / [President's Critical In
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2002
|
2023-2024 CISA roadmap for Artificial Intelligence.
Axe Federal Documents Online:Available
|
|
2023
|
Academic and legal implications of VA's data loss : hearing before the Committee on Veterans' Affairs
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2007
|
Additional controls can enhance the security of the automated commercial environment system [electron
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2008
|
187 additional entries
|
|
|
|
Computer Security United States Auditing : United States.
|
|
|
Self-reported data unreliable for assessing EPA's computer security program [electronic resource].
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2010
|
|
Computer Security United States Automation : Chew, Elizabeth.
|
|
|
Information System Security Reference Data Model [electronic resource] / Elizabeth Chew, Keven Stine,
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2007
|
|
Computer Security United States Bibliography
|
|
|
Confidentiality of electronic health data : methods for protecting personally identifiable informatio
Axe Archives Fed Docs:Available
|
|
1996
|
|
Computer Security United States Case Studies : United States.
|
|
|
Start with security : a guide for business : lessons learned from FTC cases.
Axe Federal Documents Online:Available
|
|
2015
|
|
Computer Security United States Employees
|
|
|
DOD cyber workforce strategy implementation plan, 2023-2027.
Axe Federal Documents Online:Available
|
|
2023
|
Federal Rotational Cyber Workforce Program Act of 2021: report of the Committee on Homeland Security
Axe Federal Documents Online:Available
|
|
2021
|
|
Computer Security United States Encyclopedias
|
|
|
Encyclopedia of cybercrime / edited by Samuel C. McQuade, III.
Axe 3rd Floor Stacks:Available
|
|
2009
|
Privacy rights in the Digital Age / editor, Christopher T. Anglim, JD ; advisory editor, Jane E. Kirt
Axe ProQuest E-Book:Available
|
|
2015
|
|
Computer Security United States Evaluation
|
|
|
Addressing the nation's cybersecurity challenges [electronic resource] : reducing vulnerabilities req
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2009
|
Critical infrastructure protection [electronic resource] : challenges and efforts to secure control s
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2004
|
Cyber insecurity [electronic resource] : hackers are penetrating federal systems and critical infrast
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2009
|
Cybercrime : digital cops in a networked environment / edited by Jack M. Balkin [and five others].
Axe ProQuest E-Book:Available
|
|
2007
|
19 additional entries
|
|
|
|
Computer Security United States Finance : United States.
|
|
|
Protecting Resources on the Electric Grid with Cybersecurity Technology Act of 2019 : report (to acco
Axe Federal Documents Online:Available
|
|
2020
|
|
Computer Security United States Handbooks Manuals Etc
|
|
|
Degunking your email, snam, and viruses [electronic resource] / Jeff Duntemann.
Axe ProQuest E-Book:Available
|
|
2004
|
Fighting fraud with the red flags rule [electronic resource] : a how-to guide for business / Federal
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2009
|
An introduction to computer security [electronic resource] : the NIST handbook / Barbara Guttman and
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
1995
|
Mitigating attacks on houses of worship : security guide.
Axe Federal Documents Online:Available
|
|
2020
|
|
Computer Security United States Management
|
|
|
Critical information infrastructure protection : the threat is real : hearing before the Subcommittee
Axe Federal Documents Online:Available
|
|
2001
|
Critical infrastructures : background, policy, and implementation / John D. Moteff.
Axe Federal Documents Online:Available
|
|
2018
|
Cybersecurity: DOT defined roles and responsibilities, but additional oversight needed : report to co
Axe Federal Documents Online:Available
|
|
2023
|
Executive guide [electronic resource] : information security management, learning from leading organi
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
1998
|
8 additional entries
|
|
|
|
Computer Security United States Management Evaluation
|
|
|
Federal information security, agencies need to correct weaknesses and fully implement security progra
Axe Federal Documents Online:Available
|
|
2015
|
Financial Management Service : significant weaknesses in computer controls : report to the Secretary
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2000
|
Priority open recommendations: Federal Deposit Insurance Corporation.
Axe Federal Documents Online:Available
|
|
2023
|
Priority open recommendations: Internal Revenue Service.
Axe Federal Documents Online:Available
|
|
2023
|
Priority open recommendations: Office of the Comptroller of the Currency.
Axe Federal Documents Online:Available
|
|
2023
|
|
Computer Security United States Measurement : Chew, Elizabeth.
|
|
|
Performance measurement guide for information security [electronic resource] / Elizabeth Chew ... [et
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2008
|
|
Computer Security United States Miscellanea
|
|
|
Frequently asked questions: quantum computing and post-quantum cryptography.
Axe Federal Documents Online:Available
|
|
2021
|
|
Computer Security United States Periodicals
|
|
|
Cyber security bulletin [electronic resource].
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2004
|
Cybernotes [electronic resource].
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2004
|
Highlights [electronic resource].
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2002
|
|
Computer Security United States Planning
|
|
|
Critical infrastructure protection [electronic resource] : multiple efforts to secure control systems
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2007
|
Critical infrastructure protection [electronic resource] : OMB leadership needed to strengthen agency
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2009
|
Critical infrastructure protection [electronic resource] : progress coordinating government and priva
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2006
|
Critical infrastructure protection in homeland security : defending a networked nation / Ted G. Lewis
Axe ProQuest E-Book:Available
|
|
2015
|
Final report on the review of Treasury computer security plans [electronic resource].
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2000
|
|
Computer Security United States Planning Evaluation : United States.
|
|
|
Critical infrastructure protection [electronic resource] : more comprehensive planning would enhance
Axe Federal Documents Online:Available
|
ElectronicResource GovDoc
|
2014
|
Add Marked to Bag
Add All On Page
|