Computers -- Access control -- United StatesSee also what's at your library, or elsewhere.
Broader terms:Related term:Narrower terms: |
Filed under: Computers -- Access control -- United States Information Security and Privacy in Network Environments (Washington: GPO, 1994), by United States Congress Office of Technology Assessment Fourth Amendment and the Internet: Hearing Before the Subcommittee on the Constitution of the Committee on the Judiciary, House of Representatives, One Hundred Sixth Congress, Second Session, April 6, 2000 (Washington: GPO, 2000), by United States House Committee on the Judiciary Computer security requirements : guidance for applying the Department of Defense trusted computer system evaluation criteria in specific environments. (DOD Computer Security Center, 1989), by National Computer Security Center (U.S.) (page images at HathiTrust) Computer crime and computer security hearing before the Subcommittee on Crime of the Committee on the Judiciary, House of Representatives, Ninety-ninth Congress, first session, on H.R. 1001 and H.R. 930 ... May 23, 1985. (U.S. G.P.O., 1986), by United States. Congress. House. Committee on the Judiciary. Subcommittee on Crime (page images at HathiTrust) Technical rationale behind CSC-STD-003-85, computer security requirements : guidance for applying the Department of Defense trusted computer system evaluation criteria in specfic environments. (Deptartment of Defense, Computer Security Center., 1988), by National Computer Security Center (U.S.) and United States Department of Defense (page images at HathiTrust) Many states did not comply with 30-day notice of data-verification provisions (The Office, 1991), by United States General Accounting Office and United States. Congress. Senate. Committee on Governmental Affairs. Subcommittee on Oversight of Government Management (page images at HathiTrust) Security and Freedom through Encryption Act (U.S. G.P.O. :, 1998), by United States House Committee on National Security (page images at HathiTrust) HR 850, the Security and Freedom through Encryption (SAFE) Act (U.S. G.P.O. :, 2000), by United States House Committee on International Relations (page images at HathiTrust) Information security in the federal government : one year into the Federal Information Security Management Act : hearing before the Subcommittee on Technology, Information Policy, Intergovernmental Relations, and the Census of the Committee on Government Reform, House of Representatives, One Hundred Eighth Congress, second session, March 16, 2004. (U.S. G.P.O. :, 2004), by Information Policy United States. Congress. House. Committee on Government Reform. Subcommittee on Technology (page images at HathiTrust) The Cyber Initiative : hearing before the Committee on Homeland Security, House of Representatives, One Hundred Tenth Congress, second session, February 28, 2008. (U.S. G.P.O. :, 2008), by United States House Committee on Homeland Security (page images at HathiTrust) Investigating cybersecurity vulnerabilities at the Department of Homeland Security (U.S. G.P.O. :, 2009), by Cybersecurity United States. Congress. House. Committee on Homeland Security. Subcommittee on Emerging Threats (page images at HathiTrust) US encryption policy (U.S. G.P.O. :, 2000), by United States House Committee on Armed Services (page images at HathiTrust) The federal role in electronic authentication : hearing before the Subcommittee on Domestic and International Monetary Policy of the Committee on Banking and Financial Services, House of Representatives, One Hundred Fifth Congress, first session, July 9, 1997. (U.S. G.P.O. :, 1997), by United States. Congress. House. Committee on Banking and Financial Services. Subcommittee on Domestic and International Monetary Policy (page images at HathiTrust) The Security and Freedom through Encryption (SAFE) Act : hearing before the Subcommittee on Telecommunications, Trade, and Consumer Protection of the Committee on Commerce, House of Representatives, One Hundred Fifth Congress, first session, on H.R. 695, September 4, 1997. (U.S. G.P.O. :, 1997), by Trade United States. Congress. House. Committee on Commerce. Subcommittee on Telecommunications (page images at HathiTrust) HR 695, Security and Freedom through Encryption (SAFE) Act (U.S. G.P.O. :, 1998), by United States. Congress. House. Committee on International Relations. Subcommittee on International Economic Policy and Trade (page images at HathiTrust) HR 695, Security and Freedom through Encryption (SAFE) Act (U.S. G.P.O. :, 1998), by United States House Committee on International Relations (page images at HathiTrust) The Security and Freedom through Encryption (SAFE) Act : hearing before the Subcommittee on Telecommunications, Trade, and Consumer Protection of the Committee on Commerce, House of Representatives, One Hundred Sixth Congress, first session, on H.R. 850, May 25, 1999. (U.S. G.P.O. :, 1999), by Trade United States. Congress. House. Committee on Commerce. Subcommittee on Telecommunications (page images at HathiTrust) Children's Internet Protection Act (U.S. G.P.O. :, 2000), by United States Senate Committee on Commerce, Science, and Transportation (page images at HathiTrust) Children's Internet Protection Act (U.S. G.P.O. :, 2001), by United States Senate Committee on Commerce, Science, and Transportation (page images at HathiTrust) Information security : hearing before the Committee on Governmental Affairs, United States Senate, One Hundred Fifth Congress, second session, September 23, 1998. (U.S. G.P.O. :, 1998), by United States Senate Committee on Governmental Affairs (page images at HathiTrust) Children's Internet Protection Act : report of the Committee on Commerce, Science, and Transportation on S. 97. (U.S. G.P.O., 1999), by United States Senate Committee on Commerce, Science, and Transportation (page images at HathiTrust) Security and Freedom through Encryption (SAFE) Act : report together with additional view (to accompany H.R. 695) (including cost estimate of the Congressional Budget Office). (U.S. G.P.O., 1997), by United States House Committee on the Judiciary (page images at HathiTrust) Protection of National Security and Public Safety Act (U.S. G.P.O., 1999), by United States House Committee on the Judiciary, United States House Permanent Select Committee on Intelligence, United States House Committee on International Relations, United States House Committee on Armed Services, and United States. Congress. House. Committee on Commerce (page images at HathiTrust) Making federal computers secure : overseeing effective information security management : third report (U.S. G.P.O., 2002), by United State House Committee on Government Reform (page images at HathiTrust) HR 4246, the Cyber Security Information Act of 2000 (U.S. G.P.O. :, 2001), by Information United States. Congress. House. Committee on Government Reform. Subcommittee on Government Management (page images at HathiTrust) Encryption security in a high tech era : hearing before the Subcommittee on International Economic Policy and Trade of the Committee on International Relations, House of Representatives, One Hundred Sixth Congress, first session, Tuesday, May 18, 1999. (U.S. G.P.O. :, 2000), by United States. Congress. House. Committee on International Relations. Subcommittee on International Economic Policy and Trade (page images at HathiTrust) Security and Freedom through Encryption (SAFE) Act : hearing before the Committee on the Judiciary, House of Representatives, One Hundred Fourth Congress, second session, on H.R. 3011 ... September 25, 1996. (U.S. G.P.O. :, 1996), by United States House Committee on the Judiciary (page images at HathiTrust) Security and Freedom through Encryption (SAFE) Act : hearing before the Subcommittee on Courts and Intellectual Property of the Committee on the Judiciary, House of Representatives, One Hundred Fifth Congress, first session, on H.R. 695 ... March 20, 1997. (U.S. G.P.O. :, 1997), by United States. Congress. House. Committee on the Judiciary. Subcommittee on Courts and Intellectual Property (page images at HathiTrust) Security and Freedom through Encryption (SAFE) Act : hearing before the Subcommittee on Courts and Intellectual Property of the Committee on the Judiciary, House of Representatives, One Hundred Sixth Congress, first session, on H.R. 850, March 4, 1999. (U.S. G.P.O. :, 2000), by United States. Congress. House. Committee on the Judiciary. Subcommittee on Courts and Intellectual Property (page images at HathiTrust) Critical information infrastructure protection : the threat is real : hearing before the Subcommittee on Technology, Terrorism, and Government Information of the Committee on the Judiciary, United States Senate, One Hundred Sixth Congress, first session, on examining the protection efforts being made against foreign-based threats to United States critical computer infrastructure, October 6, 1999. (U.S. G.P.O. :, 2001), by Terrorism United States. Congress. Senate. Committee on the Judiciary. Subcommittee on Technology (page images at HathiTrust) Cyber crime : updating the Computer Fraud and Abuse Act to protect cyber space and combat emerging threats : hearing before the Committee on the Judiciary, United States Senate, One Hundred Twelfth Congress, first session, September 7, 2011 (U.S. G.P.O. :, 2011), by United States Senate Committee on the Judiciary (page images at HathiTrust) Computer attacks at Department of Defense pose increasing risks (The Office, 1996), by United States General Accounting Office (page images at HathiTrust) Federal certification authority liability and policy : law and policy of certificate-based key and digital signatures (U.S. Dept. of Commerce, National Institute of Standards and Technology, 1994), by Michael S. Baum and National Institute of Standards and Technology (U.S.) (page images at HathiTrust) Searching and seizing computers and obtaining electronic evidence in criminal investigations (Office of Legal Education, Executive Office for United States Attorneys, 2001), by Orin S. Kerr and United States. Department of Justice. Computer Crime and Intellectual Property Section (page images at HathiTrust) Computers, crimes, clues and controls (The Council?, 1986), by President's Council on Integrity and Efficiency (U.S.). Prevention Committee (page images at HathiTrust) Citizen control over records held by third parties (Congressional Research Service, Library of Congress, 1978), by Sarah P. Collins and Library of Congress. Congressional Research Service (page images at HathiTrust)
Filed under: Computers -- Access control -- United States -- Code words S. 1726, Promotion of Commerce Online in the Digital Era Act of 1996, or "Pro-CODE Act" : hearing before the Subcommittee on Science, Technology, and Space of the Committee on Commerce, Science, and Transportation, United States Senate, One Hundred Fourth Congress, second session, June 12, 1996. (U.S. G.P.O. :, 1996), by Science United States. Congress. Senate. Committee on Commerce (page images at HathiTrust)
Filed under: Computers -- Access control -- New Mexico -- Los AlamosFiled under: Computers -- Access control -- Government policy -- United StatesFiled under: Computers -- Access control -- Keystroke timing authentication -- Standards -- United StatesFiled under: Computers -- Access control -- Passwords -- Standards -- United States
Items below (if any) are from related and broader terms.
Filed under: Computers -- United States -- Access control A Guide to Understanding Trusted Distribution in Trusted Systems (version 1, 1988), by National Computer Security Center (U.S.) (HTML at fas.org) A Guide to Understanding Identification and Authentication in Trusted Systems, by National Computer Security Center (U.S.) (HTML at fas.org) Trusted Database Management System Interpretation of the Trusted Computer System Evaluation Criteria, by National Computer Security Center (U.S.) (HTML at fas.org) A Guide to understanding trusted distribution in trusted systems (The Center ;, 1988), by National Computer Security Center (U.S.) (page images at HathiTrust) Trusted database management system interpretation of the trusted computer system evaluation criteria. (National Computer Security Center ;, 1991), by National Computer Security Center (U.S.) (page images at HathiTrust) Computer Matching and Privacy Protection Act of 1987 hearing before a subcommittee of the Committee on Government Operations, House of Representatives, One hundredth Congress, first session, on S. 496 ... June 23, 1987. (U.S. G.P.O., 1987), by Justice United States. Congress. House. Committee on Government Operations. Government Information (page images at HathiTrust) Department of Defense trusted computer system evaluation criteria. (Dept. of Defense, 1987), by United States. Dept. of Defense (page images at HathiTrust) Military and civilian control of computer security issues : hearing before the Legislation and National Security Subcommittee of the Committee on Government Operations, House of Representatives, One Hundred First Congress, first session, May 4, 1989. (U.S. G.P.O. :, 1989), by United States. Congress. House. Committee on Government Operations. Legislation and National Security Subcommittee (page images at HathiTrust) Computer Matching and Privacy Protection Act of 1986 : hearing before the Subcommittee on Oversight of Government Management of the Committee on Governmental Affairs, United States Senate, Ninety-ninth Congress, second session, on S. 2756 ... September 16, 1986. (U.S. G.P.O. :, 1986), by United States. Congress. Senate. Committee on Governmental Affairs. Subcommittee on Oversight of Government Management (page images at HathiTrust) GAO survey, federal government computer security : hearing before the Subcommittee on Transportation, Aviation, and Materials of the Committee on Science, Space, and Technology, House of Representatives, One hundredth Congress, first session, May 19, 1987. (U.S. G.P.O. :, 1987), by Space United States. Congress. House. Committee on Science (page images at HathiTrust) Computer fraud legislation : hearing before the Subcommittee on Criminal Law of the Committee on the Judiciary, United States Senate, Ninety-ninth Congress, first session, on S. 440 ... and S. 1678 ... October 30, 1985. (U.S. G.P.O. :, 1986), by United States. Congress. Senate. Committee on the Judiciary. Subcommittee on Criminal Law (page images at HathiTrust) Computer crime and computer security : hearing before the Subcommittee on Crime of the Committee on the Judiciary, House of Representatives, Ninety-ninth Congress, first session, on H.R. 1001 and H.R. 930 ... May 23, 1985. (U.S. G.P.O. :, 1986), by United States. Congress. House. Committee on the Judiciary. Subcommittee on Crime (page images at HathiTrust) Implementation of the Computer Security Act : hearing before the Subcommittee on Transportation, Aviation, and Materials of the Committee on Science, Space, and Technology, House of Representatives, One Hundredth Congress, second session, September 22, 1988. (U.S. G.P.O. :, 1989), by Space United States. Congress. House. Committee on Science (page images at HathiTrust) Implementation of the Computer Security Act : hearing before the Subcommittee on Transportation, Aviation, and Materials and the Subcommittee on Science, Research, and Technology of the Committee on Science, Space, and Technology, U.S. House of Representatives, One Hundred First Congress, first session, March 21, 1989. (U.S. G.P.O. :, 1989), by Space United States. Congress. House. Committee on Science and Space United States. Congress. House. Committee on Science (page images at HathiTrust) The Computer Fraud and Abuse Act of 1986 : hearing before the Committee on the Judiciary, United States Senate, Ninety-ninth Congress, second session on S. 2281 ... April 16, 1986. (U.S. Govt. Print. Off. :, 1986), by United States Senate Committee on the Judiciary (page images at HathiTrust) Computer security in the federal government and the private sector : hearings before the Subcommittee on Oversight of Government Management of the Committee on Governmental Affairs, United States Senate, Ninety-eighth Congress, first session, October 25 and 26, 1983. (U.S. G.P.O., 1983), by United States. Congress. Senate. Committee on Governmental Affairs. Subcommittee on Oversight of Government Management (page images at HathiTrust) Computer Matching and Privacy Protection Act of 1987 : hearing before a subcommittee of the Committee on Government Operations, House of Representatives, One hundredth Congress, first session, on S. 496 ... June 23, 1987. (U.S. G.P.O. :, 1987), by Justice United States. Congress. House. Committee on Government Operations. Government Information (page images at HathiTrust) FBI's Carnivore program (U.S. G.P.O. :, 2000), by United States. Congress. House. Committee on the Judiciary. Subcommittee on the Constitution (page images at HathiTrust) Computer security : governmentwide planning process had limited impact : report to the Chairman, Committee on Science, Space, and Technology, House of Representatives (GAO, 1990), by Space United States. Congress. House. Committee on Science and United States General Accounting Office (page images at HathiTrust) Computers and privacy : how the government obtains, verifies, uses, and protects personal data : briefing report to the chairman, Subcommittee on Telecommunications and Finance, Committee on Energy and Commerce, House of Representatives (The Office, 1990), by United States General Accounting Office (page images at HathiTrust) Computer and communications security and privacy : hearing before the Subcommittee on Transportation, Aviation, and Materials of the Committee on Science and Technology, U.S. House of Representatives, Ninety-eighth Congress, second session, September 24, 1984. (U.S. G.P.O., 1985), by Aviation United States. Congress. House. Committee on Science and Technology. Subcommittee on Transportation (page images at HathiTrust) Federal government computer security : hearings before the Subcommittee on Transportation, Aviation, and Materials and the Subcommittee on Science, Research, and Technology of the Committee on Science and Technology, House of Representatives, Ninety-ninth Congress, first session, October 29, 30, 1985. (U.S. G.P.O., 1986), by Aviation United States. Congress. House. Committee on Science and Technology. Subcommittee on Transportation and Research United States. Congress. House. Committee on Science and Technology. Subcommittee on Science (page images at HathiTrust) Computers and their role in energy research : current status and future needs : hearings before the Subcommittee on Energy Development and Applications and the Subcommittee on Energy Research and Production of the Committee on Science and Technology, U.S. House of Representatives, Ninety-eighth Congress, first session, June 14 and 15, 1983. (U.S. G.P.O., 1983), by United States. Congress. House. Committee on Science and Technology. Subcommittee on Energy Development and Applications and United States. Congress. House. Committee on Science and Technology. Subcommittee on Energy Research and Production (page images at HathiTrust) 1986 National Bureau of Standards authorization : hearings before the Subcommittee on Science, Research, and Technology of the Committee on Science and Technology, House of Representatives, Ninety-ninth Congress, first session, February 26, 28; March 6, 1985. (U.S. G.P.O., 1985), by Research United States. Congress. House. Committee on Science and Technology. Subcommittee on Science (page images at HathiTrust) Defending secrets, sharing data : new locks and keys for electronic information (Congress of the U.S., Office of Technology Assessment, 1987), by United States Congress Office of Technology Assessment (page images at HathiTrust) Computer and communications security and privacy : report (U.S. G.P.O., 1984), by Aviation United States. Congress. House. Committee on Science and Technology. Subcommittee on Transportation (page images at HathiTrust)
More items available under broader and related terms at left. |