Computer security -- United StatesSee also what's at your library, or elsewhere.
Broader terms:Narrower terms: |
Filed under: Computer security -- United States- Defending Secrets, Sharing Data: New Locks and Keys for Electronic Information (1987), by United States Congress Office of Technology Assessment (PDF files at Princeton)
- Fourth Amendment and the Internet: Hearing Before the Subcommittee on the Constitution of the Committee on the Judiciary, House of Representatives, One Hundred Sixth Congress, Second Session, April 6, 2000 (Washington: GPO, 2000), by United States House Committee on the Judiciary
- Issue Update on Information Security and Privacy in Network Environments (Washington: GPO, 1995), by United States Congress Office of Technology Assessment
- A Guide to Understanding Identification and Authentication in Trusted Systems, by National Computer Security Center (U.S.) (HTML at fas.org)
- Defending secrets, sharing data : new locks and keys for electronic information. (Congress of the U.S., Office of Technology Assessment :, 1987), by United States Congress Office of Technology Assessment (page images at HathiTrust)
- Practical guidelines for electronic education information security (National Center for Education Statistics :, 1998), by Tom Szuba and National Center for Education Statistics (page images at HathiTrust)
- VA computer control weaknesses increase risk of fraud, misuse, and proper disclosure, report (The Office, 1998), by United States General Accounting Office (page images at HathiTrust)
- HR 2413, the Computer Security Enhancement Act of 1999 (U.S. G.P.O. :, 2000), by United States House Subcommittee on Technology (page images at HathiTrust)
- I LOVE YOU virus and its impact on the U.S. financial services industry (U.S. G.P.O. :, 2000), by Housing United States. Congress. Senate. Committee on Banking (page images at HathiTrust)
- Homeland security : the federal and New York response : hearing before the Committee on Science, House of Representatives, One Hundred Seventh Congress, second session, June 24, 2002. (U.S. G.P.O. :, 2003), by United States. Congress. House. Committee on Science (page images at HathiTrust)
- Internet security : hearing before the Subcommittee on Communications of the Committee on Commerce, Science, and Transportation, United States Senate, One Hundred Sixth Congress, second session, March 8, 2000. (U.S. G.P.O. :, 2003), by Science United States. Congress. Senate. Committee on Commerce (page images at HathiTrust)
- Threats to privacy and security on filesharing networks (U.S. G.P.O. :, 2003), by United State House Committee on Government Reform (page images at HathiTrust)
- Challenges facing our nation in critical infrastructure protection (U.S. G.P.O. :, 2003), by Information Policy United States. Congress. House. Committee on Government Reform. Subcommittee on Technology (page images at HathiTrust)
- Computer security in the Federal Government : how do the agencies rate? : hearing before the Subcommittee on Government Efficiency, Financial Management and Intergovernmental Relations of the Committee on Government Reform, House of Representatives, One Hundred Seventh Congress, second session, November 19, 2002. (U.S. G.P.O. :, 2003), by Financial Management United States. Congress. House. Committee on Government Reform. Subcommittee on Government Efficiency (page images at HathiTrust)
- Could personal and national security risks compromise the potential of peer-to-peer file-sharing networks (U.S. G.P.O. :, 2003), by United States Senate Committee on the Judiciary (page images at HathiTrust)
- Examination of Internet vulnerabilities affecting businesses, governments and homes (U.S. G.P.O. :, 2004), by United State House Committee on Government Reform (page images at HathiTrust)
- Telecommunications and SCADA : secure links or open portals to the security of our nation's critical infrastructure? : hearing before the Subcommittee on Technology, Information Policy, Intergovernmental Relations, and the Census of the Committee on Government Reform, House of Representatives, One Hundred Eighth Congress, second session, March 30, 2004. (U.S. G.P.O. :, 2004), by Information Policy United States. Congress. House. Committee on Government Reform. Subcommittee on Technology (page images at HathiTrust)
- Protecting our nation's cyber space : educational awareness for the cyber citizen : hearing before the Subcommittee on Technology, Information Policy, Intergovernmental Relations, and the Census of the Committee on Government Reform, House of Representatives, One Hundred Eighth Congress, second session, April 21, 2004. (U.S. G.P.O. :, 2004), by Information Policy United States. Congress. House. Committee on Government Reform. Subcommittee on Technology (page images at HathiTrust)
- Who might be lurking at your cyber front door? Is your system really secure? : strategies and technologies to prevent, detect, and respond to the growing threat of network vulnerabilities : hearing before the Subcommittee on Technology, Information Policy, Intergovernmental Relations, and the Census of the Committee on Government Reform, House of Representatives, One Hundred Eighth Congress, second session, June 2, 2004. (U.S. G.P.O. :, 2004), by Information Policy United States. Congress. House. Committee on Government Reform. Subcommittee on Technology (page images at HathiTrust)
- Locking your cyber front door : the challenges facing home users and small businesses : hearing before the Subcommittee on Technology, Information Policy, Intergovernmental Relations, and the Census of the Committee on Government Reform, House of Representatives, One Hundred Eighth Congress, second session, June 16, 2004. (U.S. G.P.O. :, 2005), by Information Policy United States. Congress. House. Committee on Government Reform. Subcommittee on Technology (page images at HathiTrust)
- Identity theft : the causes, costs, consequences, and potential solutions : hearing before the Subcommittee on Technology, Information Policy, Intergovernmental Relations, and the Census of the Committee on Government Reform, House of Representatives, One Hundred Eighth Congress, second session, September 22, 2004. (U.S. G.P.O. :, 2005), by Information Policy United States. Congress. House. Committee on Government Reform. Subcommittee on Technology (page images at HathiTrust)
- Implementation of the USA Patriot Act : crime, terrorism and the age of technology : hearing before the Subcommittee on Crime, Terrorism, and Homeland Security of the Committee on the Judiciary, House of Representatives, One Hundred Ninth Congress, first session, April 21, 2005. (U.S. G.P.O. :, 2005), by Terrorism United States. Congress. House. Committee on the Judiciary. Subcommittee on Crime (page images at HathiTrust)
- Assessing data security : preventing breaches and protecting sensitive information : hearing before the Committee on Financial Services, U.S. House of Representatives, One Hundred Ninth Congress, first session, May 4, 2005. (U.S. G.P.O. :, 2005), by United States. Congress. House. Committee on Financial Services (page images at HathiTrust)
- U.S. vulnerability and preparedness (U.S. G.P.O. :, 2006), by United States. Congress. House. Committee on Science (page images at HathiTrust)
- Enhancing data security : the regulators' perspective : hearing before the Subcommittee on Financial Institutions and Consumer Credit of the Committee on Financial Services, U.S. House of Representatives, One Hundred Ninth Congress, first session, May 18, 2005. (U.S. G.P.O. :, 2006), by United States. Congress. House. Committee on Financial Services. Subcommittee on Financial Institutions and Consumer Credit (page images at HathiTrust)
- Identity theft : recent developments involving the security of sensitive consumer information : hearing before the Committee on Banking, Housing, and Urban Affairs, United States Senate, One Hundred Ninth Congress, first session, on recent developments involving the security of sensitive consumer information relating to identity theft, focusing on laws currently applicable to resellers of consumer information, March 10 and 15, 2005. (U.S. G.P.O. :, 2006), by Housing United States. Congress. Senate. Committee on Banking (page images at HathiTrust)
- The state of small business security in a cyber economy : hearing before the Subcommittee on Regulatory Reform and Oversight of the Committee on Small Business, House of Representatives, One Hundred Ninth Congress, second session, Washington, DC, March 16, 2006. (U.S. G.P.O. :, 2006), by United States. Congress. House. Committee on Small Business. Subcommittee on Regulatory Reform and Oversight (page images at HathiTrust)
- Cyber security challenges at the Department of Energy : hearing before the Subcommittee on Oversight and Investigations of the Committee on Energy and Commerce, House of Representatives, One Hundred Ninth Congress, second session, June 9, 2006. (U.S. G.P.O. :, 2006), by United States. Congress. House. Committee on Energy and Commerce. Subcommittee on Oversight and Investigations (page images at HathiTrust)
- Who loses when your data takes a hike? (U.S. G.P.O. :, 2006), by United States. Congress. House. Committee on Small Business. Subcommittee on Regulatory Reform and Oversight (page images at HathiTrust)
- Cybersecurity : protecting America's critical infrastructure, economy, and consumers : hearing before the Subcommittee on Telecommunications and the Internet of the Committee on Energy and Commerce, House of Representatives, One Hundred Ninth Congress, second session, September 13, 2006. (U.S. G.P.O. :, 2006), by United States. Congress. House. Committee on Energy and Commerce. Subcommittee on Telecommunications and the Internet (page images at HathiTrust)
- Oversight hearing on Veterans Benefits Administration data security : joint hearing before the Committee on Veterans' Affairs, House of Representatives, Subcommittee on Economic Opportunity and the Subcommittee on Disability Assistance and Memorial Affairs, One Hundred Ninth Congress, second session, June 20, 2006. (U.S. G.P.O. :, 2007), by United States. Congress. House. Committee on Veterans' Affairs. Subcommittee on Economic Opportunity and United States. Congress. House. Committee on Veterans' Affairs. Subcommittee on Disability Assistance and Memorial Affairs (page images at HathiTrust)
- Protecting the nation's critical control systems (U.S. G.P.O. :, 2007), by Infrastructure Protection United States. Congress. House. Committee on Homeland Security. Subcommittee on Economic Security and Science United States. Congress. House. Committee on Homeland Security. Subcommittee on Emergency Preparedness (page images at HathiTrust)
- Academic and legal implications of VA's data loss : hearing before the Committee on Veterans' Affairs, House of Representatives, One Hundred Ninth Congress, second session, June 22, 2006. (U.S. G.P.O. :, 2007), by United States House Committee on Veterans' Affairs (page images at HathiTrust)
- Update on the breach of data security at the Department of Veterans Affairs : hearing before the Committee on Veterans' Affairs, House of Representatives, One Hundred Ninth Congress, second session, June 29, 2006. (U.S. G.P.O. :, 2007), by United States House Committee on Veterans' Affairs (page images at HathiTrust)
- Hearing on the repeated failures of VA's information technology management : hearing before the Committee on Veterans' Affairs, House of Representatives, One Hundred Ninth Congress, second session, June 14, 2006. (U.S. G.P.O. :, 2007), by United States House Committee on Veterans' Affairs (page images at HathiTrust)
- Which VA IT organizational structure would have best prevented VA's "meltdown" in information management : hearing before the Committee on Veterans' Affairs, House of Representatives, One Hundred Ninth Congress, second session, June 28, 2006. (U.S. G.P.O. :, 2007), by United States House Committee on Veterans' Affairs (page images at HathiTrust)
- Failure of VA's information management : hearing before the Committee on Veterans' Affairs, House of Representatives, One Hundred Ninth Congress, second session, May 25, 2006. (U.S. G.P.O. :, 2007), by United States House Committee on Veterans' Affairs (page images at HathiTrust)
- Identity theft : innovative solutions for an evolving problem : hearing before the Subcommittee on Terrorism, Technology, and Homeland Security of the Committee on the Judiciary, United States Senate, One Hundred Tenth Congress, first session, March 21, 2007. (U.S. G.P.O. :, 2007), by Technology United States. Congress. Senate. Committee on the Judiciary. Subcommittee on Terrorism (page images at HathiTrust)
- Meeting the need for interoperability and information security in health IT (U.S. G.P.O. :, 2008), by United States House Committee on Science and Technology (page images at HathiTrust)
- Inadvertent file sharing over peer-to-peer networks : hearing before the Committee on Oversight and Government Reform, House of Representatives, One Hundred Tenth Congress, first session, July 24, 2007. (U.S. G.P.O. :, 2008), by United States House Committee on Oversight and Government Reform (page images at HathiTrust)
- A data base management approach to Privacy Act compliance (U.S. Dept. of Commerce, National Bureau of Standards :, 1977), by Elizabeth Fong, United States. National Bureau of Standards, and Institute for Computer Sciences and Technology (page images at HathiTrust)
- Cybersecurity : assessing our vulnerabilities and developing an effective response : hearing before the Committee on Commerce, Science, and Transportation, United States Senate, One Hundred Eleventh Congress, first session, March 19, 2009. (U.S. G.P.O. :, 2009), by United States Senate Committee on Commerce, Science, and Transportation (page images at HathiTrust)
- Cybersecurity recommendations for the next administration : hearing before the Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology of the Committee on Homeland Security, House of Representatives, One Hundred Tenth Congress, second session, September 16, 2008. (U.S. G.P.O. :, 2009), by Cybersecurity United States. Congress. House. Committee on Homeland Security. Subcommittee on Emerging Threats (page images at HathiTrust)
- Security in the information age : new challenges, new strategies : compendium of papers submitted to the Joint Economic Committee, Congress of the United States. ([U.S. G.P.O.] :, 2002), by United States. Congress. Joint Economic Committee (page images at HathiTrust)
- Inadvertent file sharing over peer-to-peer networks : how it endangers citizens and jeopardizes national security : hearing before the Committee on Oversight and Government Reform, House of Representatives, One Hundred Eleventh Congress, first session, July 29, 2009. (U.S. G.P.O. :, 2009), by United States House Committee on Oversight and Government Reform (page images at HathiTrust)
- Cybersecurity : assessing our vulnerabilities and developing an effective response : hearing before the Committee on Commerce, Science, and Transportation, United States Senate, One Hundred Eleventh Congress, first session, March 19, 2009. (Washington : U.S. G.P.O., 2009., 2009), by United States Senate Committee on Commerce, Science, and Transportation (page images at HathiTrust)
- Computer insecurities at DOE headquarters : DOE's failure to get its own cyber house in order : hearing before the Subcommittee on Oversight and Investigations of the Committee on Commerce, House of Representatives, One Hundred Sixth Congress, second session, June 13, 2000. (U.S. G.P.O. :, 2000), by United States House Committee on Commerce, Subcommittee on Oversight and Investigations (page images at HathiTrust)
- A lesson of the Gulf War : national security requires computer security : hearing before the Subcommittee on Government Information and Regulation of the Committee on Governmental Affairs, United States Senate, One Hundred Second Congress, first session, June 19, 1991. (Washington : U.S. G.P.O., 1992., 1992), by United States. Congress. Senate. Committee on Governmental Affairs. Subcommittee on Government Information and Regulation (page images at HathiTrust)
- Computer Matching and Privacy Protection Amendments of 1990 : hearing before the Government Information, Justice, and Agriculture Subcommittee of the Committee on Government Operations, House of Representatives, One Hundred First Congress, second session, on H.R. 5450 ... September 11, 1990. (U.S. G.P.O. :, 1991), by Justice United States. Congress. House. Committee on Government Operations. Government Information (page images at HathiTrust)
- Computer security in the federal government : how do the agencies rate? : hearing before the Subcommittee on Government Efficiency, Financial Management and Intergovernmental Relations of the Committee on Government Reform, House of Representatives, One Hundred Seventh Congress, first session, November 9, 2001. (U.S. G.P.O. :, 2002), by Financial Management United States. Congress. House. Committee on Government Reform. Subcommittee on Government Efficiency (page images at HathiTrust)
- Cybersecurity : emerging threats, vulnerabilities, and challenges in securing federal information systems : hearing before the Subcommittee on Government Management, Organization, and Procurement of the Committee on Oversight and Government Reform, House of Representatives, One Hundred Eleventh Congress, first session, May 5, 2009. (U.S. G.P.O. :, 2010), by Organization United States. Congress. House. Committee on Oversight and Government Reform. Subcommittee on Government Management (page images at HathiTrust)
- Computer security : hearing before the Subcommittee on Technology and Competitiveness of the Committee on Science, Space, and Technology, U.S. House of Representatives, One Hundred Second Congress, first session, June 27, 1991. (U.S. G.P.O. :, 1991), by Space United States. Congress. House. Committee on Science (page images at HathiTrust)
- Department of Justice security problems (U.S. G.P.O. :, 1991), by Justice United States. Congress. House. Committee on Government Operations. Government Information (page images at HathiTrust)
- The Computer Abuse Amendments Act of 1990 : hearing before the Subcommittee on Technology and the Law of the Committee on the Judiciary, United States Senate, One Hundred First Congress, second session, on S. 2476 ... July 31, 1990. (U.S. G.P.O. :, 1991), by United States. Congress. Senate. Committee on the Judiciary. Subcommittee on Technology and the Law (page images at HathiTrust)
- Department of Justice computer security, Bureau of Prison's SENTRY system : hearing before the Government Information, Justice, and Agriculture Subcommittee of the Committee on Government Operations, House of Representatives, One Hundred Second Congress, first session, September 11, 1991. (U.S. G.P.O. :, 1992), by Justice United States. Congress. House. Committee on Government Operations. Government Information (page images at HathiTrust)
- The administration's clipper chip key escrow encryption program : hearing before the Subcommittee on Technology and the Law of the Committee on the Judiciary, United States Senate, One Hundred Third Congress, second session ... May 3, 1994. (U.S. G.P.O. :, 1995), by United States. Congress. Senate. Committee on the Judiciary. Subcommittee on Technology and the Law (page images at HathiTrust)
- The encryption debate : criminals, terrorists, and the security needs of business and industry : hearing before the Subcommittee on Technology, Terrorism, and Government Information of the Committee on the Judiciary, United States Senate, One Hundred Fifth Congress, first session ... September 3, 1997. (U.S. G.P.O. :, 1998), by Terrorism United States. Congress. Senate. Committee on the Judiciary. Subcommittee on Technology (page images at HathiTrust)
- Encryption : individual right to privacy vs. national security : hearing before the Subcommittee on International Economic Policy and Trade of the Committee on International Relations, House of Representatives, One Hundred Fifth Congress, first session, May 8, 1997. (U.S. G.P.O. :, 1998), by United States. Congress. House. Committee on International Relations. Subcommittee on International Economic Policy and Trade (page images at HathiTrust)
- Cyberterrorism in the 21st century (U.S. G.P.O. :, 2004), by Technology United States. Congress. Senate. Committee on the Judiciary. Subcommittee on Terrorism (page images at HathiTrust)
- Securing electronic personal data : striking a balance between privacy and commercial and governmental use : hearing before the Committee on the Judiciary, United States Senate, One Hundred Ninth Congress, first session, April 13, 2005. (U.S. G.P.O. :, 2005), by United States Senate Committee on the Judiciary (page images at HathiTrust)
- The Computer Security Enhancement Act of 1997 to amend the National Institute of Standards and Technology Act to enhance the ability of the National Institute of Standards and Technology to improve computer security, and for other purposes : hearing before the Committee on Science, Subcommittee on Technology, U.S. House of Representatives, One Hundred Fifth Congress, first session, June 19, 1997. (U.S. G.P.O. :, 1997), by United States House Subcommittee on Technology (page images at HathiTrust)
- The role of computer security in protecting U.S. infrastructures : hearing before the Committee on Science, Subcommittee on Technology, U.S. House of Representatives, One Hundred Fifth Congress, first session, November 6, 1997. (U.S. G.P.O. :, 1998), by United States House Subcommittee on Technology (page images at HathiTrust)
- Technology development at the Federal Aviation Administration : computer and information technology challenges of the 21st century : hearing before the Committee on Science, Subcommittee on Technology, U.S. House of Representatives, One Hundred Fifth Congress, second session, August 6, 1998. (U.S. G.P.O. :, 1998), by United States House Subcommittee on Technology (page images at HathiTrust)
- The Melissa virus : inoculating our information technology from emerging threats : hearing before the Committee on Science, Subcommittee on Technology, U.S. House of Representatives, One Hundred Sixth Congress, first session, April 15, 1999. ([U.S. G.P.O.] :, 1999), by United States House Subcommittee on Technology and United States House Committee on Science and Technology (page images at HathiTrust)
- Computer security impact of Y2K : expanded risks or fraud? : joint hearing before the Subcommittee on Technology of the Committee on Science and the Subcommittee on Government Management, Information, and Technology of the Committee on Government Reform, House of Representatives, One Hundred Sixth Congress, first session, August 4, 1999. (U.S. G.P.O. :, 2000), by United States House Subcommittee on Technology and Information United States. Congress. House. Committee on Government Reform. Subcommittee on Government Management (page images at HathiTrust)
- Computer security in the federal government : hearing before the Subcommittee on Science, Technology, and Space of the Committee on Commerce, Science and Transportation, United States Senate, One Hundred Fifth Congress, second session, February 10, 1998. (U.S. G.P.O. :, 2000), by Science United States. Congress. Senate. Committee on Commerce (page images at HathiTrust)
- Encryption : hearing before the Committee on Commerce, Science, and Transportation, United States Senate, One Hundred Fifth Congress, first session, March 19, 1997. (U.S. G.P.O. :, 1998), by United States Senate Committee on Commerce, Science, and Transportation (page images at HathiTrust)
- Millennium Digital Commerce Act, S. 761 : hearing before the Committee on Commerce, Science, and Transportation, United States Senate, One Hundred Sixth Congress, first session, May 27, 1999. (U.S. G.P.O. :, 2002), by United States Senate Committee on Commerce, Science, and Transportation (page images at HathiTrust)
- An introduction to computer security : the NIST handbook (U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 1995), by Barbara Guttman, Edward Roback, National Institute of Standards and Technology (U.S.), and United States. Department of Commerce. Technology Administration (page images at HathiTrust)
- Weak computer security in government : is the public at risk? : hearing before the Committee on Governmental Affairs, United States Senate, One Hundred Fifth Congress, second session, May 19, 1998. (U.S. G.P.O. :, 1998), by United States Senate Committee on Governmental Affairs (page images at HathiTrust)
- Information security : hearing before the Committee on Governmental Affairs, United States Senate, One Hundred Fifth Congress, second session, September 23, 1998. (U.S. G.P.O. :, 1998), by United States Senate Committee on Governmental Affairs (page images at HathiTrust)
- How secure is our critical infrastructure? : hearing before the Committee on Governmental Affairs, United States Senate, One Hundred Seventh Congress, first session, September 12, 2001. (U.S. G.P.O. :, 2002), by United States Senate Committee on Governmental Affairs (page images at HathiTrust)
- [Need for multi-level computer security for use with the World Wide Military Command and Control System]. (General Accounting Office, 1978), by United States General Accounting Office (page images at HathiTrust)
- Ethical use of information technologies in education : important issues for America's schools (U.S. Dept. of Justice, Office of Justice Programs, National Institute of Justice :, 1992), by Jay P. Sivin, Ellen R. Bialo, United States. Dept. of Education, Inc Institute for Law and Justice, and National Institute of Justice (U.S.) (page images at HathiTrust)
- Computer Security Enhancement Act of 1997 : report of the Committee on Commerce, Science, and Transportation on H.R. 1903. (U.S. G.P.O., 1998), by United States Senate Committee on Commerce, Science, and Transportation (page images at HathiTrust)
- Millennium Digital Commerce Act : report of the Committee on Commerce, Science, and Transportation on S. 761. (U.S. G.P.O., 1999), by United States Senate Committee on Commerce, Science, and Transportation (page images at HathiTrust)
- Government Information Security Act of 1999 : report of the Committee on Governmental Affairs, United States Senate, to accompany S. 1993, to reform government information security by strengthening information security practices throughout the federal government. (U.S. G.P.O., 2000), by United States Senate Committee on Governmental Affairs (page images at HathiTrust)
- Computer Security Enhancement Act of 1997 : report (to accompany H.R. 1903) (including cost estimate of the Congressional Budget Office). (U.S. G.P.O., 1997), by United States. Congress. House. Committee on Science (page images at HathiTrust)
- Computer Security Enhancement Act of 2000 : report (to accompany H.R. 2413) (including cost estimate of the Congressional Budget Office). (U.S. G.P.O., 2000), by United States. Congress. House. Committee on Science (page images at HathiTrust)
- Making federal computers secure : overseeing effective information security management : third report (U.S. G.P.O., 2002), by United State House Committee on Government Reform (page images at HathiTrust)
- I LOVE YOU virus and its impact on the U.S. financial services industry (U.S. G.P.O. :, 2000), by Housing United States. Congress. Senate. Committee on Banking (page images at HathiTrust)
- Security in the information age : new challenges, new strategies (U.S. Congress, Joint Economic Committee, 2002), by United States. Congress. Joint Economic Committee (page images at HathiTrust)
- Improving information security (U.S. G.P.O. :, 2003), by United States. Congress. House. Committee on Financial Services. Subcommittee on Financial Institutions and Consumer Credit and United States. Congress. House. Committee on Financial Services. Subcommittee on Oversight and Investigations (page images at HathiTrust)
- Computer security in the federal government : how do the agencies rate? : hearing before the Subcommittee on Government Efficiency, Financial Management and Intergovernmental Relations of the Committee on Government Reform, House of Representatives, One Hundred Seventh Congress, first session, November 9, 2001. (U.S. G.P.O. :, 2002), by Financial Management United States. Congress. House. Committee on Government Reform. Subcommittee on Government Efficiency (page images at HathiTrust)
- Computer Security Research and Training Act of 1985 : hearing before a subcommittee of the Committee on Government Operations, House of Representatives, Ninety-ninth Congress, first session, on H.R. 2889 ... September 18, 1985. (U.S. G.P.O. :, 1986), by United States. Congress. House. Committee on Government Operations. Legislation and National Security Subcommittee (page images at HathiTrust)
- Computer security at the Drug Enforcement Administration : hearing before the Government Information, Justice, and Agriculture Subcommittee of the Committee on Government Operations, House of Representatives, One Hundred Second Congress, second session, September 30, 1992. (U.S. G.P.O. :, 1993), by Justice United States. Congress. House. Committee on Government Operations. Government Information (page images at HathiTrust)
- Enhancing computer security : what tools work best : hearing before the Subcommittee on Government Management, Information, and Technology of the Committee on Government Reform, House of Representatives, One Hundred Sixth Congress, second session, March 29, 2000. (U.S. G.P.O. :, 2001), by Information United States. Congress. House. Committee on Government Reform. Subcommittee on Government Management (page images at HathiTrust)
- Computer security report card : hearing before the Subcommittee on Government Management, Information, and Technology of the Committee on Government Reform, House of Representatives, One Hundred Sixth Congress, second session, September 11, 2000. (U.S. G.P.O. :, 2001), by Information United States. Congress. House. Committee on Government Reform. Subcommittee on Government Management (page images at HathiTrust)
- Worm and virus defense : how can we protect the nation's computers from these threats? : hearing before the Subcommittee on Technology, Information Policy, Intergovernmental Relations and the Census of the Committee on Government Reform, House of Representatives, One Hundred Eighth Congress, first session, September 10, 2003. (U.S. G.P.O. :, 2004), by Information Policy United States. Congress. House. Committee on Government Reform. Subcommittee on Technology (page images at HathiTrust)
- Oversight of the State Department : technology modernization and computer security : hearing before the Committee on International Relations, House of Representatives, One Hundred Sixth Congress, second session, June 22, 2000. (U.S. G.P.O. :, 2001), by United States House Committee on International Relations (page images at HathiTrust)
- Oversight and authorization of the Justice Management Division, U.S. Department of Justice : hearing before the Subcommittee on Economic and Commercial Law of the Committee on the Judiciary, House of Representatives, One Hundred Second Congress, first session, June 27, 1991. (U.S. G.P.O. :, 1991), by United States. Congress. House. Committee on the Judiciary. Subcommittee on Economic and Commercial Law (page images at HathiTrust)
- FBI's Carnivore program (U.S. G.P.O. :, 2000), by United States. Congress. House. Committee on the Judiciary. Subcommittee on the Constitution (page images at HathiTrust)
- Cyber Security Enhancement Act of 2001 : hearing before the Subcommittee on Crime of the Committee on the Judiciary, House of Representatives, One Hundred Seventh Congress, second session on H.R. 3482, February 12, 2002. (U.S. G.P.O. :, 2002), by United States. Congress. House. Committee on the Judiciary. Subcommittee on Crime (page images at HathiTrust)
- Cyber attacks : the national protection plan and its privacy implications : hearing before the Subcommittee on Technology, Terrorism, and Government Information of the Committee on the Judiciary, One Hundred Sixth Congress, second session, on examining the vulnerability of U.S. systems to cyber attack, focusing on the administration's national plan for information systems protection and its implications regarding privacy, February 1, 2000. (U.S. G.P.O. :, 2001), by Terrorism United States. Congress. Senate. Committee on the Judiciary. Subcommittee on Technology (page images at HathiTrust)
- Hearing two on information technology (U.S. G.P.O. :, 2000), by United States. Congress. House. Committee on Veterans' Affairs. Subcommittee on Oversight and Investigations (page images at HathiTrust)
- Hearing three on information technology (U.S. G.P.O. :, 2001), by United States. Congress. House. Committee on Veterans' Affairs. Subcommittee on Oversight and Investigations (page images at HathiTrust)
- Executive guide : information security management : learning from leading organizations : exposure draft (The Office, 1997), by United States. General Accounting Office. Accounting and Information Management Division (page images at HathiTrust)
- Internet security : hearing before the Subcommittee on Communications of the Committee on Commerce, Science, and Transportation, United States Senate, One Hundred Sixth Congress, second session, March 8, 2000. (U.S. G.P.O. :, 2003), by Science United States. Congress. Senate. Committee on Commerce (page images at HathiTrust)
- Protecting America's critical infrastructure : how secure are government computer systems? : hearing before the Subcommittee on Oversight and Investigations of the Committee on Energy and Commerce, House of Representatives, One Hundred Seventh Congress, first session, April 5, 2001. (U.S. G.P.O. :, 2001), by United States. Congress. House. Committee on Energy and Commerce. Subcommittee on Oversight and Investigations (page images at HathiTrust)
- How secure is sensitive Commerce Department data and operations? : a review of the department's computer security policies and practices : hearing before the Subcommittee on Oversight and Investigations of the Committee on Energy and Commerce, House of Representatives, One Hundred Seventh Congress, first session, August 3, 2001. (U.S. G.P.O. :, 2001), by United States. Congress. House. Committee on Energy and Commerce. Subcommittee on Oversight and Investigations (page images at HathiTrust)
- Cyber security : private-sector efforts addressing cyber threats : hearing before the Subcommittee on Commerce, Trade, and Consumer Protection, Committee on Energy and Commerce, House of Representatives, One Hundred Seventh Congress, first session, November 15, 2001. (U.S. G.P.O. :, 2002), by Trade United States. Congress. House. Committee on Energy and Commerce. Subcommittee on Commerce (page images at HathiTrust)
- Security in the information age : new challenges, new strategies : compendium of papers submitted to the Joint Economic Committee, Congress of the United States. ([U.S. G.P.O.] :, 2002), by United States. Congress. Joint Economic Committee (page images at HathiTrust)
- Lessons learned from the Government Information Security Reform Act of 2000 : hearing before the Subcommittee on Government Efficiency, Financial Management and Intergovernmental Relations of the Committee on Government Reform, House of Representatives, One Hundred Seventh Congress, second session, March 6, 2002. (U.S. G.P.O. :, 2002), by Financial Management United States. Congress. House. Committee on Government Reform. Subcommittee on Government Efficiency (page images at HathiTrust)
- "Cyber attack : improving prevention and prosecution" : hearing before the Subcommittee on Technology, Terrorism, and Government Information of the Committee on the Judiciary, United States Senate, One Hundred Sixth Congress, second session, on examining how to combat cyber attacks by improving prevention and prosecution, Scottsdale, AZ, April 21, 2000. (U.S. G.P.O. :, 2001), by Terrorism United States. Congress. Senate. Committee on the Judiciary. Subcommittee on Technology (page images at HathiTrust)
- Cyber attacks : removing roadblocks to investigation and information sharing : hearing before the Subcommittee on Technology, Terrorism, and Government Information of the Committee on the Judiciary, United States Senate, One Hundred Sixth Congress, second session, on examining the incidence of cyber attacks on the nation's information systems, focusing on removing roadblocks to investigation and information sharing, March 28, 2000. (U.S. G.P.O., 2001), by Terrorism United States. Congress. Senate. Committee on the Judiciary. Subcommittee on Technology (page images at HathiTrust)
- Computer security lapses : should FAA be grounded? : hearing before the Committee on Science, House of Representatives, One Hundred Sixth Congress, second session, September 27, 2000. (U.S. G.P.O. :, 2001), by United States. Congress. House. Committee on Science (page images at HathiTrust)
- Cyber terrorism, a view from the Gilmore Commission (U.S. G.P.O. :, 2002), by United States. Congress. House. Committee on Science (page images at HathiTrust)
- Cyber security, how can we protect American computer networks from attack? (U.S. G.P.O. :, 2002), by United States. Congress. House. Committee on Science (page images at HathiTrust)
- Homeland security : the federal and New York response : hearing before the Committee on Science, House of Representatives, One Hundred Seventh Congress, second session, June 24, 2002. (U.S. G.P.O. :, 2003), by United States. Congress. House. Committee on Science (page images at HathiTrust)
- Cyber security research and development : hearing before the Committee on Science, House of Representatives, One Hundred Eighth Congress, first session, May 14, 2003. (U.S. G.P.O. :, 2003), by United States. Congress. House. Committee on Science (page images at HathiTrust)
- HR 2413, the Computer Security Enhancement Act of 1999 (U.S. G.P.O. :, 2000), by United States House Subcommittee on Technology (page images at HathiTrust)
- The need for privacy protections : perspectives from the administration and the Federal Trade Commission : hearing before the Committee on Commerce, Science, and Transportation, United States Senate, One Hundred Twelfth Congress, second session, May 9, 2012. (Washington : U.S. Government Printing Office, 2013., 2013), by United States Senate Committee on Commerce, Science, and Transportation (page images at HathiTrust)
- Consumer online privacy : hearing before the Committee on Commerce, Science, and Transportation, United States Senate, One Hundred Eleventh Congress, second session, July 27, 2010. (U.S. G.P.O. :, 2011), by United States Senate Committee on Commerce, Science, and Transportation (page images at HathiTrust)
- Impact and policy implications of spyware on consumers and businesses : hearing before the Committee on Commerce, Science, and Transportation, United States Senate, One Hundred Tenth Congress, second session, June 11, 2008. (U.S. G.P.O. :, 2012), by United States Senate Committee on Commerce, Science, and Transportation (page images at HathiTrust)
- The state of online consumer privacy : hearing before the Committee on Commerce, Science, and Transportation, United States Senate, One Hundred Twelfth Congress, first session, March 16, 2011. (U.S. G.P.O. :, 2012), by United States Senate Committee on Commerce, Science, and Transportation (page images at HathiTrust)
- National Infrastructure Protection Center (NIPC) : a public-private partnership to protect America's critical infrastructures. (U.S. Dept. of Justice, Federal Bureau of Investigation, 2002), by United States Federal Bureau of Investigation and National Infrastructure Protection Center (U.S.) (page images at HathiTrust)
- Security in cyberspace : hearings before the Permanent Subcommittee on Investigations of the Committee on Governmental Affairs, United States Senate, One Hundred Fourth Congress, second session, May 22, June 5, 25, and July 16, 1996. (U.S. G.P.O. :, 1996), by United States. Congress. Senate. Committee on Governmental Affairs. Permanent Subcommittee on Investigations (page images at HathiTrust)
- Information systems security (The Institute, 1994), by National Institute of Standards and Technology (U.S.) (page images at HathiTrust)
- Cybersecurity : next steps to protect our critical infrastructure : hearing before the Committee on Commerce, Science, and Transportation, United States Senate, One Hundred Eleventh Congress, second session, February 23, 2010 (U.S. G.P.O. :, 2010), by United States Senate Committee on Commerce, Science, and Transportation (page images at HathiTrust)
- Information systems security ([Washington, D.C.?] : The Department, [1994], 1994), by National Institute of Standards and Technology (U.S.) (page images at HathiTrust)
- Protecting the electric grid from cybersecurity threats : hearing before the Subcommittee on Energy and Air Quality of the Committee on Energy and Commerce, House of Representatives, One Hundred Tenth Congress, second session, September 11, 2008 (U.S. G.P.O. :, 2008), by United States. Congress. House. Committee on Energy and Commerce. Subcommittee on Energy and Air Quality (page images at HathiTrust)
- Cybersecurity : assessing the immediate threat to the United States : hearing before the Subcommittee on National Security, Homeland Defense, and Foreign Operations of the Committee on Oversight and Government Reform, House of Representatives, One Hundred Twelfth Congress, first session, May 25, 2011 (U.S. G.P.O. :, 2011), by Homeland Defense United States. Congress. House. Committee on Oversight and Government Reform. Subcommittee on National Security (page images at HathiTrust)
- Cyber attack: Is the nation at risk? : hearing before the Committee on Governmental Affairs, United States Senate, One Hundred Fifth Congress, second session, June 24, 1998 (1998), by United States Senate Committee on Governmental Affairs (page images at HathiTrust)
- Cyber terrorism, a view from the Gilmore Commission (U.S. G.P.O. :, 2002), by United States. Congress. House. Committee on Science (page images at HathiTrust)
- Electronic Communications Privacy Act (ECPA). Part II : geolocation privacy and surveillance : hearing before the Subcommittee on Crime, Terrorism, Homeland Security, and Investigations of the Committee on the Judiciary, House of Representatives, One Hundred Thirteenth Congress, first session, April 25, 2013 (Washington : U.S. Government Printing Office, 2013, 2013), by Terrorism United States. Congress. House. Committee on the Judiciary. Subcommittee on Crime (page images at HathiTrust)
- Cyber security : protecting your small business : hearing before the Subcommittee on Healthcare and Technology of the Committee on Small Business, United States House of Representatives, One Hundred Twelfth Congress, first session, hearing held December 1, 2011 (U.S. G.P.O. :, 2012), by United States. Congress. House. Committee on Small Business. Subcommittee on Healthcare and Technology (page images at HathiTrust)
- The role of small businesses in strengthening cybersecurity efforts in the United States : hearing before the Committee on Small Business and Entrepreneurship, United States Senate, One Hundred Twelfth Congress, first session, July 25, 2011 (U.S. G.P.O. :, 2012), by United States. Congress. Senate. Committee on Small Business and Entrepreneurship (page images at HathiTrust)
- Protecting personal consumer information from cyber attacks and data breaches : hearing before the Committee on Commerce, Science, and Transportation, United States Senate, One Hundred Thirteenth Congress, second session, March 26, 2014. (s.n., 2014), by United States Senate Committee on Commerce, Science, and Transportation (page images at HathiTrust)
- Computer attacks at Department of Defense pose increasing risks (The Office, 1996), by United States General Accounting Office (page images at HathiTrust)
- Responses to questions on FAA's computer security and Year 2000 program (General Accounting Office, 1998), by United States. General Accounting Office. Accounting and Information Management Division (page images at HathiTrust)
- Federal certification authority liability and policy : law and policy of certificate-based key and digital signatures (U.S. Dept. of Commerce, National Institute of Standards and Technology, 1994), by Michael S. Baum and National Institute of Standards and Technology (U.S.) (page images at HathiTrust)
- Cyber security : a crisis of prioritization (National Coordination Office for Information Technology Research and Development, 2005), by United States. President's Information Technology Advisory Committee (page images at HathiTrust)
More items available under narrower terms. |