High technology industries -- Security measuresSee also what's at your library, or elsewhere.
Broader terms:Narrower term: |
Filed under: High technology industries -- Security measures -- Costs
Items below (if any) are from related and broader terms.
Filed under: High technology industries
Filed under: High technology industries -- Archival resourcesFiled under: High technology industries -- California, Southern
Filed under: High technology industries -- Europe -- International cooperation
Filed under: High technology industries -- Government policy -- Developed countriesFiled under: High technology industries -- Government policy -- United States
Filed under: High technology industries -- History -- Sources
Filed under: Biotechnology industries -- Law and legislation -- United States- Biology, Medicine, and the Bill of Rights (1988), by United States Congress Office of Technology Assessment (PDF files at Princeton)
- New Developments in Biotechnology: Ownership of Human Tissues and Cells (OTA-BA-337; 1987), by United States Congress Office of Technology Assessment
Filed under: High technology industries -- LocationFiled under: High technology industries -- ManagementFiled under: High technology industries -- Records and correspondenceFiled under: High technology industries -- United States
Filed under: Biotechnology industries -- United States- New Developments in Biotechnology: U.S. Investment in Biotechnology (OTA-BA-360; 1988), by United States Congress Office of Technology Assessment
- Commercial Biotechnology: An International Analysis (1984), by United States Congress Office of Technology Assessment (PDF files at Princeton)
- Biotechnology in a Global Economy (1991), by United States Congress Office of Technology Assessment (PDF files at Princeton)
- New Developments in Biotechnology: Background Paper, Public Perceptions of Biotechnology (OTA-BP-BA-45; 1989), by United States Congress Office of Technology Assessment
Filed under: Biotechnology industries
Filed under: Aeronautics, Commercial -- Security measures- Impact of International Terrorism on Travel: Joint Hearings Before the Subcommittees on Arms Control, International Security, and Science, and on International Operations of the Committee on Foreign Affairs, and the Subcommittee on Aviation of the Committee on Public Works and Transportation, Ninety-ninth Congress, second session, February 19, April 17, 22, and May 15, 1986 (Washington: GPO, 1986), by United States House Committee on Foreign Affairs and United States House Committee on Public Works and Transportation (page images at HathiTrust)
- Report of the President's Commission on International Aviation Security and Terrorism: Hearing Before the Committee on Foreign Affairs, House of Representatives, One Hundred First Congress, Second Session, May 17, 1990 (Washington: GPO, 1990), by United States House Committee on Foreign Affairs (page images at HathiTrust)
Filed under: Air bases, American -- Security measures- Defending Air Bases in an Age of Insurgency (2 volumes; Maxwell AFB, AL: Air University Press, 2014-2019), ed. by Shannon W. Caudill
Filed under: Airports -- Security measures- Report of the President's Commission on International Aviation Security and Terrorism: Hearing Before the Committee on Foreign Affairs, House of Representatives, One Hundred First Congress, Second Session, May 17, 1990 (Washington: GPO, 1990), by United States House Committee on Foreign Affairs (page images at HathiTrust)
- Antiterrorism Measures: The Adequacy of Foreign Airport Security: Staff Report to the Committee on Foreign Affairs, U.S. House of Representatives (Washington: GPO, 1986), by United States House Committee on Foreign Affairs (page images at HathiTrust)
- Impact of International Terrorism on Travel: Joint Hearings Before the Subcommittees on Arms Control, International Security, and Science, and on International Operations of the Committee on Foreign Affairs, and the Subcommittee on Aviation of the Committee on Public Works and Transportation, Ninety-ninth Congress, second session, February 19, April 17, 22, and May 15, 1986 (Washington: GPO, 1986), by United States House Committee on Foreign Affairs and United States House Committee on Public Works and Transportation (page images at HathiTrust)
Filed under: Command and control systems -- United States -- Security measures
Filed under: Computer networks -- Security measures- Cyber Infrastructure Protection (3 volumes, 2011-2017), ed. by Tarek Nazir Saadawi, Louis Jordan, Vincent Boudreau, and John D. Colwell
- Digital Identity, an Emergent Legal Concept: The Role and Legal Nature of Digital Identity in Commercial Transactions (Adelaide: University of Adelaide Press, c2011), by Clare Sullivan (PDF with commentary at Adelaide)
- The Internet Under Crisis Conditions: Learning from September 11 (2003), by National Research Council Computer Science and Telecommunications Board (HTML with commentary at NAP)
- Intrusion Detection Systems With Snort: Advanced IDS Techniques Using Snort, Apache, MySQL, PHP, and ACID (c2003), by Rafeeq Ur Rehman (PDF at pearsoncmg.com)
- Stacks: Interoperability in Today's Computer Networks (c1992), by Carl Malamud (page images at HathiTrust)
- Introduction to the New Mainframe: Security (Poughkeepsie, NY: IBM International Technical Support Organization, 2007), by Rica Weller, Ross Clements, Ken Dugdale, Per Fremstad, Helmut Hellner, Olegario Hernandez, William C. Johnston, Patrick Kappeler, Linda Kochersberger, Abey Tedla, Jeff Thompson, and Ashwin Venkatraman (multiple formats at ibm.com)
- Trust in Cyberspace, ed. by Fred B. Schneider (HTML and page images at NAP)
- Open Source Security Tools: Practical Applications for Security, by Tony Howlett (PDF at pearsoncmg.com)
Filed under: Cyberinfrastructure -- Security measures- Cyber Infrastructure Protection (3 volumes, 2011-2017), ed. by Tarek Nazir Saadawi, Louis Jordan, Vincent Boudreau, and John D. Colwell
Filed under: Dwellings -- Security measuresFiled under: Electronic data processing -- United States -- Security measuresFiled under: Electronic data processing departments -- Security measures- Guidelines for Formal Verification Systems (1989), by Barbara Mayer and Monica Mcgill Lu (HTML at fas.org)
- Computer Security Subsystem Interpretation of the Trusted Computer System Evaluation Criteria (version 1, 1988), by National Computer Security Center (U.S.) (HTML at fas.org)
- A Guide to Understanding Configuration Management in Trusted Systems (version 1, 1988), by James N. Menendez (HTML at fas.org)
- A Guide to Understanding Discretionary Access Control in Trusted Systems (version 1, 1987), by Carole Jordan (HTML at fas.org)
- Trusted Network Interpretation of the Trusted Computer System Evaluation Criteria (version 1, 1987), by National Computer Security Center (U.S.) (text at nist.gov)
- Trusted Product Evaluation Questionnaire (version 2, 1992), by National Computer Security Center (U.S.) (HTML at usmc.mil)
- Defending Secrets, Sharing Data: New Locks and Keys for Electronic Information (1987), by United States Congress Office of Technology Assessment (PDF files at Princeton)
- A Guide to Understanding Trusted Facility Management, by Virgil D. Gligor (HTML at fas.org)
- Trusted Network Interpretation Environments Guideline, by National Computer Security Center (U.S.) (HTML at fas.org)
Filed under: Information services -- United States -- Security measuresFiled under: Information storage and retrieval systems -- Security measuresFiled under: Information technology -- Security measuresMore items available under broader and related terms at left. |