Computer networks -- Security measures -- United StatesSee also what's at your library, or elsewhere.
Broader terms:Narrower term: |
Filed under: Computer networks -- Security measures -- United States Issue Update on Information Security and Privacy in Network Environments (Washington: GPO, 1995), by United States Congress Office of Technology Assessment Information Security and Privacy in Network Environments (Washington: GPO, 1994), by United States Congress Office of Technology Assessment
Filed under: Computer networks -- Security measures -- Government policy -- United States
Items below (if any) are from related and broader terms.
Filed under: Computer networks -- Security measures Cyber Infrastructure Protection (3 volumes, 2011-2017), ed. by Tarek Nazir Saadawi, Louis Jordan, Vincent Boudreau, and John D. Colwell Digital Identity, an Emergent Legal Concept: The Role and Legal Nature of Digital Identity in Commercial Transactions (Adelaide: University of Adelaide Press, c2011), by Clare Sullivan (PDF with commentary at Adelaide) The Internet Under Crisis Conditions: Learning from September 11 (2003), by National Research Council Computer Science and Telecommunications Board (HTML with commentary at NAP) Intrusion Detection Systems With Snort: Advanced IDS Techniques Using Snort, Apache, MySQL, PHP, and ACID (c2003), by Rafeeq Ur Rehman (PDF at pearsoncmg.com) Stacks: Interoperability in Today's Computer Networks (c1992), by Carl Malamud (page images at HathiTrust) Introduction to the New Mainframe: Security (Poughkeepsie, NY: IBM International Technical Support Organization, 2007), by Rica Weller, Ross Clements, Ken Dugdale, Per Fremstad, Helmut Hellner, Olegario Hernandez, William C. Johnston, Patrick Kappeler, Linda Kochersberger, Abey Tedla, Jeff Thompson, and Ashwin Venkatraman (multiple formats at ibm.com) Trust in Cyberspace, ed. by Fred B. Schneider (HTML and page images at NAP) Open Source Security Tools: Practical Applications for Security, by Tony Howlett (PDF at pearsoncmg.com)
Filed under: Internet of things -- Security measuresFiled under: Business enterprises -- Computer networks -- Security measures
Filed under: Computer networks -- United States
Filed under: Computer networks -- United States -- HistoryFiled under: Computer networks -- Access control -- United StatesFiled under: Computer networks -- Law and legislation -- United States |