Air bases, American -- Security measuresSee also what's at your library, or elsewhere.
Broader terms: |
Filed under: Air bases, American -- Security measures- Defending Air Bases in an Age of Insurgency (2 volumes; Maxwell AFB, AL: Air University Press, 2014-2019), ed. by Shannon W. Caudill
Items below (if any) are from related and broader terms.
Filed under: Air bases, American
Filed under: Air bases, American -- Connecticut -- Windsor Locks -- Newspapers
Filed under: Air bases, American -- England -- Periodicals
Filed under: Aeronautics, Commercial -- Security measures- Impact of International Terrorism on Travel: Joint Hearings Before the Subcommittees on Arms Control, International Security, and Science, and on International Operations of the Committee on Foreign Affairs, and the Subcommittee on Aviation of the Committee on Public Works and Transportation, Ninety-ninth Congress, second session, February 19, April 17, 22, and May 15, 1986 (Washington: GPO, 1986), by United States House Committee on Foreign Affairs and United States House Committee on Public Works and Transportation (page images at HathiTrust)
- Report of the President's Commission on International Aviation Security and Terrorism: Hearing Before the Committee on Foreign Affairs, House of Representatives, One Hundred First Congress, Second Session, May 17, 1990 (Washington: GPO, 1990), by United States House Committee on Foreign Affairs (page images at HathiTrust)
Filed under: Airports -- Security measures- Report of the President's Commission on International Aviation Security and Terrorism: Hearing Before the Committee on Foreign Affairs, House of Representatives, One Hundred First Congress, Second Session, May 17, 1990 (Washington: GPO, 1990), by United States House Committee on Foreign Affairs (page images at HathiTrust)
- Antiterrorism Measures: The Adequacy of Foreign Airport Security: Staff Report to the Committee on Foreign Affairs, U.S. House of Representatives (Washington: GPO, 1986), by United States House Committee on Foreign Affairs (page images at HathiTrust)
- Impact of International Terrorism on Travel: Joint Hearings Before the Subcommittees on Arms Control, International Security, and Science, and on International Operations of the Committee on Foreign Affairs, and the Subcommittee on Aviation of the Committee on Public Works and Transportation, Ninety-ninth Congress, second session, February 19, April 17, 22, and May 15, 1986 (Washington: GPO, 1986), by United States House Committee on Foreign Affairs and United States House Committee on Public Works and Transportation (page images at HathiTrust)
Filed under: Airports -- Security measures -- United StatesFiled under: Canadian-American Border Region -- Security measuresFiled under: Command and control systems -- United States -- Security measuresFiled under: Computer networks -- Security measures- Cyber Infrastructure Protection (3 volumes, 2011-2017), ed. by Tarek Nazir Saadawi, Louis Jordan, Vincent Boudreau, and John D. Colwell
- Digital Identity, an Emergent Legal Concept: The Role and Legal Nature of Digital Identity in Commercial Transactions (Adelaide: University of Adelaide Press, c2011), by Clare Sullivan (PDF with commentary at Adelaide)
- The Internet Under Crisis Conditions: Learning from September 11 (2003), by National Research Council Computer Science and Telecommunications Board (HTML with commentary at NAP)
- Intrusion Detection Systems With Snort: Advanced IDS Techniques Using Snort, Apache, MySQL, PHP, and ACID (c2003), by Rafeeq Ur Rehman (PDF at pearsoncmg.com)
- Stacks: Interoperability in Today's Computer Networks (c1992), by Carl Malamud (page images at HathiTrust)
- Introduction to the New Mainframe: Security (Poughkeepsie, NY: IBM International Technical Support Organization, 2007), by Rica Weller, Ross Clements, Ken Dugdale, Per Fremstad, Helmut Hellner, Olegario Hernandez, William C. Johnston, Patrick Kappeler, Linda Kochersberger, Abey Tedla, Jeff Thompson, and Ashwin Venkatraman (multiple formats at ibm.com)
- Trust in Cyberspace, ed. by Fred B. Schneider (HTML and page images at NAP)
- Open Source Security Tools: Practical Applications for Security, by Tony Howlett (PDF at pearsoncmg.com)
Filed under: Cyberinfrastructure -- Security measures- Cyber Infrastructure Protection (3 volumes, 2011-2017), ed. by Tarek Nazir Saadawi, Louis Jordan, Vincent Boudreau, and John D. Colwell
Filed under: Dwellings -- Security measuresFiled under: Electronic data processing -- United States -- Security measuresFiled under: Electronic data processing departments -- Security measures- Guidelines for Formal Verification Systems (1989), by Barbara Mayer and Monica Mcgill Lu (HTML at fas.org)
- Computer Security Subsystem Interpretation of the Trusted Computer System Evaluation Criteria (version 1, 1988), by National Computer Security Center (U.S.) (HTML at fas.org)
- A Guide to Understanding Configuration Management in Trusted Systems (version 1, 1988), by James N. Menendez (HTML at fas.org)
- A Guide to Understanding Discretionary Access Control in Trusted Systems (version 1, 1987), by Carole Jordan (HTML at fas.org)
- Trusted Network Interpretation of the Trusted Computer System Evaluation Criteria (version 1, 1987), by National Computer Security Center (U.S.) (text at nist.gov)
- Trusted Product Evaluation Questionnaire (version 2, 1992), by National Computer Security Center (U.S.) (HTML at usmc.mil)
- Defending Secrets, Sharing Data: New Locks and Keys for Electronic Information (1987), by United States Congress Office of Technology Assessment (PDF files at Princeton)
- A Guide to Understanding Trusted Facility Management, by Virgil D. Gligor (HTML at fas.org)
- Trusted Network Interpretation Environments Guideline, by National Computer Security Center (U.S.) (HTML at fas.org)
Filed under: Information services -- United States -- Security measuresFiled under: Information storage and retrieval systems -- Security measuresFiled under: Information technology -- Security measuresFiled under: Internet -- Security measuresFiled under: Internet of things -- Security measuresFiled under: Nuclear industry -- Security measures- Nuclear Proliferation and Safeguards (2 volumes; 1977), by United States Congress Office of Technology Assessment
Filed under: Olympic Games (26th : 1996 : Atlanta, Ga.) -- Security measuresFiled under: United States. Air Force -- Security measures- Countering the New Terrorism (1999), by Ian O. Lesser, Bruce Hoffman, John Arquilla, David F. Ronfeldt, Michelle Zanini, and Brian Michael Jenkins (PDF files at rand.org)
- Defending Air Bases in an Age of Insurgency (2 volumes; Maxwell AFB, AL: Air University Press, 2014-2019), ed. by Shannon W. Caudill
Filed under: United States. Department of State -- Security measuresFiled under: United States. Special Mission (Banghāzī, Libya) -- Security measuresFiled under: Vietnam War, 1961-1975 -- Communications -- Security measuresFiled under: Wireless communication systems -- Security measuresMore items available under broader and related terms at left. |