Cyberinfrastructure -- Security measuresSee also what's at your library, or elsewhere.
Broader terms:Narrower terms: |
Filed under: Cyberinfrastructure -- Security measures- Cyber Infrastructure Protection (3 volumes, 2011-2017), ed. by Tarek Nazir Saadawi, Louis Jordan, Vincent Boudreau, and John D. Colwell
Filed under: Cyberinfrastructure -- Security measures -- Government policy -- United States
Filed under: Cyberinfrastructure -- Security measures -- Research -- United States- S. 3018, the Securing Energy Infrastructure Act, and to examine protections designed to guard against energy disruptions : hearing before the Subcommittee on Public Lands, Forests, and Mining of the Committee on Energy and Natural Resources, United States Senate, One Hundred Fourteenth Congress, second session, July 12, 2016. (Washington : U.S. Government Publishing Office, 2017., 2017), by United States. Congress. Senate. Committee on Energy and Natural Resources. Subcommittee on Energy (page images at HathiTrust)
Filed under: Cyberinfrastructure -- Security measures -- United States- Cybersecurity : network threats and policy challenges : hearing before the Subcommittee on Communications, Technology, and the Internet of the Committee on Energy and Commerce, House of Representatives, One Hundred Eleventh Congress, first session, May 1, 2009. (U.S. G.P.O. :, 2012), by Technology United States. Congress. House. Committee on Energy and Commerce. Subcommittee on Communications (page images at HathiTrust)
- What should the Department of Defense's role in cyber be? : hearing before the Subcommittee on Emerging Threats and Capabilities of the Committee on Armed Services, House of Representatives, One Hundred Twelfth Congress, first session, hearing held February 11, 2011. (U.S. G.P.O. :, 2011), by United States. Congress. House. Committee on Armed Services. Subcommittee on Emerging Threats and Capabilities (page images at HathiTrust)
- Budget request for U.S. Cyber Command (U.S. G.P.O. :, 2011), by United States. Congress. House. Committee on Armed Services. Subcommittee on Emerging Threats and Capabilities (page images at HathiTrust)
- Cyber infrastructure protection. Volume II (Carlisle, PA : Strategic Studies Institute and U.S. Army War College Press, [2013], 2013), by Vincent Boudreau, Louis Jordan, Tarek Nazir Saadawi, Army War College (U.S.). Press, and Army War College (U.S.). Strategic Studies Institute (page images at HathiTrust)
- Examining the cyber threat to critical infrastructure and the American economy : hearing before the Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies of the Committee on Homeland Security, House of Representatives, One Hundred Twelfth Congress, first session, March 16, 2011 (U.S. G.P.O. :, 2012), by Infrastructure Protection United States. Congress. House. Committee on Homeland Security. Subcommittee on Cybersecurity (page images at HathiTrust)
- The cybersecurity partnership between the private sector and our government : protecting our national and economic security : joint hearing before the Committee on Commerce, Science, and Transportation and the Committee on Homeland Security and Governmental Affairs, United States Senate, One Hundred Thirteenth Congress, first session, March 7, 2013. ([publisher not identified], 2014), by United States Senate Committee on Commerce, Science, and Transportation and United States Senate Committee on Homeland Security and Governmental Affairs (page images at HathiTrust)
Items below (if any) are from related and broader terms.
Filed under: Cyberinfrastructure- Data Information Literacy: Librarians, Data, and the Education of a New Generation of Researchers (West Lafayette, IN: Purdue University Press, c2015), ed. by Jake Carlson and Lisa Johnston (PDF with commentary at Purdue)
- "Rome Wasn't Digitized in a Day": Building a Cyberinfrastructure for Digital Classicists (Washington: Council on Library and Information Resources, 2011), by Alison Babeau (PDF with commentary at clir.org)
- Cyberinfrastructure Vision for 21st Century Discovery (2007), by National Science Foundation (U.S.) (PDF files at nsf.gov)
- Our Cultural Commonwealth: The Report of the American Council of Learned Societies Commission on Cyberinfrastructure for the Humanities and Social Sciences (2006), by American Council of Learned Societies (PDF with commentary at acls.org)
- Making strategic sense of cyber power : why the sky is not falling (Carlisle, PA : Strategic Studies Institute and U.S. Army War College Press, [2013], 2013), by Colin S. Gray, Army War College (U.S.). Press, and Army War College (U.S.). Strategic Studies Institute (page images at HathiTrust)
Filed under: Cyberinfrastructure -- Law and legislation -- United StatesFiled under: Cyberinfrastructure -- United StatesFiled under: Computational grids (Computer systems)- Chimera : a grid-embedding technique (Arnold Air Force Base, Tennessee : Arnold Engineering Development Center, Air Force Systems Command, United States Air Force, 1986., 1986), by J. A. Benek, F. C. Dougherty, J. L. Steger, Ames Research Center, Calspan Corporation, United States. Air Force. Arnold Air Force Base, and Arnold Engineering Development Center (page images at HathiTrust)
- PEGSUS 4.0 User's Manual (Arnold Air Force Base, Tennessee : Arnold Engineering Development Center, Air Force Systems Command, United States Air Force, 1991., 1991), by N. E. Suhs, R. W. Tramel, Calspan Corporation, Arnold Engineering Development Center, and United States. Air Force. Systems Command (page images at HathiTrust)
- Development and application of advanced algorithms for the simulation of viscous compressible flows with moving bodies in three dimensions (Arlington, Virginia : Air Force Office of Scientific Research, Air Research and Development Command, United States Air Force, 2004., 2004), by Rainald Löhner, Chi Yang, George Mason University, and United States. Air Force. Office of Scientific Research (page images at HathiTrust)
- Geometry and grid modeling for numerical simulation (Wright Patterson Air Force Base, Ohio : Air Vehicles Directorte, Air Force Research Laboratory, Air Force Materiel Command, 2005., 2005), by John P. Steinbrenner, J. P. Abelanet, Pat J. Yagle, Todd Michal, Lockheed Martin Astronautics (Firm), Boeing Company, and Ohio). Air Vehicles Directorate Air Force Research Laboratory (Wright-Patterson Air Force Base (page images at HathiTrust)
Filed under: Security systems- Report on the meeting of October 14-16, 1975. (Advisory Council, 1976), by United States. Private Security Advisory Council (page images at HathiTrust)
- Anthrax detection : agencies need to validate sampling activities in order to increase confidence in negative results : report to the Chairman, Subcommittee on National Security, emerging Threats, and International Relations, House Committee on Government Reform, House of Representatives (United States Government Accountability Office, 2005), by United States Government Accountability Office and Emerging Threats United States. Congress. House. Committee on Government Reform. Subcommittee on National Security (page images at HathiTrust)
- Investigation of charges by Senator Andrew F. Schoeppel : hearings before the Committee on Interior and Insular Affairs, United States Senate, Eighty-first Congress, second session on investigation of charges by Senator Andrew F. Schoeppel, Washington, D.C., September 7, 8, 11, 13, and 14, 1950. (G.P.O., 1950), by United States. Congress. Senate. Committee on Interior and Insular Affairs (page images at HathiTrust)
- Avvertimenti cristiani ("Lo Statuto,", 1896), by Argisto Giuffredi and Luigi Natoli (page images at HathiTrust)
- Break-ins at the Electric Boat Shipyard, Groton, Conn. : report of the Investigations Subcommittee of the Committee on Armed Services, House of Representatives, Ninety-seventh Congress, second session. (U.S. G.P.O., 1982), by United States. Congress. House. Committee on Armed Services. Subcommittee on Investigations (page images at HathiTrust)
- Reference manual to mitigate potential terrorist attacks against buildings : providing protection to people and building. (FEMA, 2003), by Michael Chipley, United States Department of Homeland Security, and United States Federal Emergency Management Agency (page images at HathiTrust)
- To protect personnel, information, and critical resources (The Command, 1998), by United States. Army Air Forces. Matériel Command (page images at HathiTrust)
Filed under: Security systems -- California
Filed under: Security systems -- Catalogs
Filed under: Security systems -- Congresses- The role of behavioral science in physical security : proceedings of the second annual symposium, March 23-24, 1977 (U.S. Dept. of Commerce, National Bureau of Standards :, 1978), by Symposium on The Role of Behavioral Science in Physical Security (2nd : 1977 : National Bureau of Standards), Joel J. Kramer, United States. National Bureau of Standards, United States. Defense Nuclear Agency. Intelligence and Security Directorate, Center for Consumer Product Technology (U.S.). Consumer Sciences Division, and Law Enforcement Standards Laboratory (page images at HathiTrust)
- The Role of behavioral science in physical security : proceedings of the third annual symposium, May 2-4, 1978 (U.S. Dept. of Commerce, National Bureau of Standards :, 1979), by Va.) Symposium on The Role of Behavioral Science in Physical Security (3rd : 1978 : Arlington, Joel J. Kramer, United States. National Bureau of Standards, and Center for Consumer Product Technology (U.S.) (page images at HathiTrust)
Filed under: Security systems -- Economic aspects
Filed under: Security systems -- Evaluation
Filed under: Security systems -- Mexico- Making Things Stick: Surveillance Technologies and Mexico's War on Crime (Oakland, CA: University of California Press, c2016), by Keith Guzik
Filed under: Security systems -- United States- Report on the meeting of October 14-16, 1975. (Advisory Council, 1976), by United States. Private Security Advisory Council (page images at HathiTrust)
- Commercial security test design. (Dept. of Justice, Law Enforcement Assistance Administration, National Institute of Law Enforcement and Criminal Justice, 1979), by National Institute of Law Enforcement and Criminal Justice (page images at HathiTrust)
- Report on the meeting of April 21-23, 1976 (Dept. of Justice, Law Enforcement Assistance Administration, Private Security Advisory Council, 1976), by United States. Private Security Advisory Council (page images at HathiTrust)
- The growing role of private security (U.S. Dept. of Justice, National Institute of Justice, 1984), by William C. Cunningham, Todd H. Taylor, and National Institute of Justice (U.S.) (page images at HathiTrust)
- Ballot security and accountability (National Clearinghouse on Election Administration, Federal Election Commission, 1995), by Marie Garber, William C. Kimberling, and National Clearinghouse on Election Administration (U.S.) (page images at HathiTrust)
- Joint Security Commission : hearing before the Select Committee on Intelligence of the United States Senate, One Hundred Third Congress, second session ... Thursday, March 3, 1994. (U.S. G.P.O. :, 1995), by United States Senate Select Committee on Intelligence (page images at HathiTrust)
Filed under: Automobiles -- Anti-theft devices- Preliminary study of the effectiveness of auto anti-theft devices (Dept. of Justice, Law Enforcement Assistance Administration, National Institute of Law Enforcement and Criminal Justice : for sale by the Supt. of Docs., U.S. Govt. Print. Off., 1976), by Aerospace Corporation, David Barry, United States. National Bureau of Standards, and National Institute of Law Enforcement and Criminal Justice (page images at HathiTrust)
- Guidelines manual, vehicle theft countermeasures in the issuance of certificates of vehicle title (The Administration ;, 1977), by Michael DiMiceli, Hugo B. Becker, and United States. National Highway Traffic Safety Administration (page images at HathiTrust)
- A manual of anti-theft guidelines for state motor vehicle titling programs (Dept. of Transportation, National Highway Traffic Safety Administration ;, 1980), by United States. National Highway Traffic Safety Administration (page images at HathiTrust)
Filed under: Computer security- Bounty Everything: Hackers and the Making of the Global Bug Marketplace (New York: Data and Society, 2022), by Ryan Ellis and Yuan Stevens (PDF with commentary at datasociety.net)
- The Huawei and Snowden Questions: Can Electronic Equipment from Untrusted Vendors be Verified? Can an Untrusted Vendor Build Trust into Electronic Equipment? (Cham et al.: Springer Open, c2018), by Olav Lysne (PDF and Epub with commentary at SpringerLink)
- UNIX System Security: A Guide for Users and System Administrators (originally published 1992; free electronic edition 2014), by David A. Curry (multiple formats with commentary at bitsinthewind.com)
- Hacking the Xbox: An Introduction to Reverse Engineering (unlimited edition, 2013), by Andrew Huang (PDF with commentary at No Starch Press)
- Managing Risk and Information Security: Protect to Enable (c2013), by Malcolm Harkins (multiple formats with commentary at SpringerLink)
- Security Engineering: A Guide to Building Dependable Distributed Systems (second edition, 2008), by Ross Anderson (PDF files with commentary in the UK)
- Computers at Risk: Safe Computing in the Information Age (1991), by National Research Council Computer Science and Telecommunications Board (page images with commentary at NAP)
- A Guide to Writing the Security Features User's Guide for Trusted Systems (version 1; 1991), by David M. Chizmadia (text at fas.org)
- The Dark Visitor: Inside the World of Chinese Hackers (c2007), by Scott Henderson (PDF at lulu.com)
- Introduction to the New Mainframe: Security (Poughkeepsie, NY: IBM International Technical Support Organization, 2007), by Rica Weller, Ross Clements, Ken Dugdale, Per Fremstad, Helmut Hellner, Olegario Hernandez, William C. Johnston, Patrick Kappeler, Linda Kochersberger, Abey Tedla, Jeff Thompson, and Ashwin Venkatraman (multiple formats at ibm.com)
- A Guide to Understanding Data Remanence in Automated Information Systems (version 2; 1991), by James K. Goldson (HTML at fas.org)
- The End of Trust (McSweeney's #54; 2018), ed. by McSweeney's (Firm) (PDF at eff.org)
- Intrusion Detection Systems With Snort: Advanced IDS Techniques Using Snort, Apache, MySQL, PHP, and ACID (c2003), by Rafeeq Ur Rehman (PDF at pearsoncmg.com)
- Open Source Security Tools: Practical Applications for Security, by Tony Howlett (PDF at pearsoncmg.com)
- Securing Java: Getting Down to Business with Mobile Code, by Gary McGraw and Ed Felten (illustrated HTML with commentary at securingjava.com)
- Cracking Codes with Python, by Al Sweigart (illustrated HTML with commentary at inventwithpython.com)
- For the Record: Protecting Electronic Health Information, by National Research Council Computer Science and Telecommunications Board (HTML and page images at NAP)
- A guide to understanding identification and authentication in trusted systems. (National Computer Security Center, 1991), by James Anderson, Rayford Vaughn, and National Computer Security Center (U.S.) (page images at HathiTrust)
- Federal computer systems protection act : hearings before the Subcommittee on Criminal Laws and Procedures of the Committee on the Judiciary, United States Senate, Ninety-fifth Congress, second session, on S. 1766, June 21 and 22, 1978. (U.S. Govt. Print. Off. :, 1979), by United States. Congress. Senate. Committee on the Judiciary. Subcommittee on Criminal Laws and Procedures (page images at HathiTrust)
- Security self-assessment guide for information technology system (U.S. Department of Commerce, Computer Security Division, Information Technology, National Institute of Standards and Technology, 2001), by Marianne Swanson (page images at HathiTrust)
- User authentication (Association of Research Libraries, Office of Leadership and Management Services, 2001), by Richard Bleiler, Terry Plum, and Association of Research Libraries. Office of Leadership and Management Services (page images at HathiTrust; US access only)
- The SRI hierarchical development methodology (HDM) and its application to the development of secure software (U.S. Dept. of Commerce, National Bureau of Standards :, 1980), by Karl N. Levitt, Lawrence Robinson, Peter Neumann, Institute for Computer Sciences and Technology, and United States. National Bureau of Standards (page images at HathiTrust)
- Considerations in the selection of security measures for automatic data processing systems (U.S. Dept. of Commerce, National Bureau of Standards :, 1978), by Michel J. Orceyre, Gloria R. Bolotsky, Robert H. Courtney, United States. National Bureau of Standards, Institute for Computer Sciences and Technology, and International Business Machines Corporation (page images at HathiTrust)
- An analysis of computer security safeguards for detecting and preventing intentional computer misuse (U.S. Dept. of Commerce, National Bureau of Standards :, 1978), by Brian Ruder, Robert P. Blanc, J. D. Madden, United States. National Bureau of Standards, Institute for Computer Sciences and Technology, and Stanford Research Institute (page images at HathiTrust)
- The network security center : a system level approach to computer network security (Dept. of Commerce, National Bureau of Standards :, 1978), by Frank Heinrich, United States. National Bureau of Standards, Institute for Computer Sciences and Technology, and System Development Corporation (page images at HathiTrust)
- Design alternatives for computer network security (U.S. Dept. of Commerce, National Bureau of Standards, 1978), by Gerald D. Cole, Dennis K. Branstad, United States. National Bureau of Standards, and Institute for Computer Sciences and Technology (page images at HathiTrust)
- The encryption debate : criminals, terrorists, and the security needs of business and industry : hearing before the Subcommittee on Technology, Terrorism, and Government Information of the Committee on the Judiciary, United States Senate, One Hundred Fifth Congress, first session ... September 3, 1997. (U.S. G.P.O. :, 1998), by Terrorism United States. Congress. Senate. Committee on the Judiciary. Subcommittee on Technology (page images at HathiTrust)
- Internet security : hearing before the Subcommittee on Science of the Committee on Science, Space, and Technology, U.S. House of Representatives, One Hundred Third Congress, secondsession, March 22, 1994. (U.S. G.P.O. :, 1994), by Space United States. Congress. House. Committee on Science (page images at HathiTrust)
- Secure communications : hearing before the Subcommittee on Technology of the Committee on Science, U.S. House of Representatives, One Hundred Fifth Congress, first session, February 11, 1997. (U.S. G.P.O. :, 1997), by United States House Subcommittee on Technology (page images at HathiTrust)
- 15th National Computer Security Conference : October 13-16, 1992, Baltimore Convention Center, Baltimore, MD : proceedings. (National Institute of Standards and Technology, National Computer Security Center :, 1992), by Md.) National Computer Security Conference (15th : 1992 : Baltimore, National Computer Security Center (U.S.), and National Institute of Standards and Technology (U.S.) (page images at HathiTrust)
- Security in the information age : new challenges, new strategies (U.S. Congress, Joint Economic Committee, 2002), by United States. Congress. Joint Economic Committee (page images at HathiTrust)
- The state of online consumer privacy : hearing before the Committee on Commerce, Science, and Transportation, United States Senate, One Hundred Twelfth Congress, first session, March 16, 2011. (U.S. G.P.O. :, 2012), by United States Senate Committee on Commerce, Science, and Transportation (page images at HathiTrust)
- Information systems security (The Institute, 1994), by National Institute of Standards and Technology (U.S.) (page images at HathiTrust)
- Cyber attack: Is the nation at risk? : hearing before the Committee on Governmental Affairs, United States Senate, One Hundred Fifth Congress, second session, June 24, 1998 (1998), by United States Senate Committee on Governmental Affairs (page images at HathiTrust)
- Computer crime and security ([Washington, D.C.] : The Library of Congress, Congressional Research Service, Major Issues System, [1980], 1980), by Louise Giovane Becker and Library of Congress. Congressional Research Service (page images at HathiTrust)
- A Guide to understanding security modeling in trusted systems. (National Computer Security Center, 1993), by National Computer Security Center (U.S.) (page images at HathiTrust)
More items available under broader and related terms at left. |